From 49cedb0a06c9837193c4f06b29c933de594434a2 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Tue, 13 Apr 2021 12:16:50 +0500
Subject: [PATCH 01/20] Device Health Monitoring
Device health monitoring is also available in Windows 10 Pro version 1903 and later
https://docs.microsoft.com/en-us/mem/analytics/troubleshoot#bkmk_2016281112
https://docs.microsoft.com/en-us/mem/intune/configuration/windows-health-monitoring
Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/9339
---
.../mdm/policy-csp-devicehealthmonitoring.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md
index 60d4832fae..35190895c9 100644
--- a/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md
+++ b/windows/client-management/mdm/policy-csp-devicehealthmonitoring.md
@@ -51,7 +51,7 @@ manager: dansimp
Business |
From ca3dc27a1b80d596826273116d3749b0d5851647 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Tue, 13 Apr 2021 12:21:46 +0500
Subject: [PATCH 02/20] IPv4 is not optional
For WIP, IPv4 is not optional, but mandatory to be configured.
Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/9208
---
.../create-wip-policy-using-intune-azure.md | 2 --
1 file changed, 2 deletions(-)
diff --git a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
index c10b2990b3..ca584f750a 100644
--- a/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
+++ b/windows/security/information-protection/windows-information-protection/create-wip-policy-using-intune-azure.md
@@ -507,8 +507,6 @@ contoso.internalproxy1.com;contoso.internalproxy2.com
### IPv4 ranges
-Starting with Windows 10, version 1703, this field is optional.
-
Specify the addresses for a valid IPv4 value range within your intranet.
These addresses, used with your Network domain names, define your corporate network boundaries.
Classless Inter-Domain Routing (CIDR) notation isn’t supported.
From 9fafb9767beb886fb7b0a0deb612308337d60f02 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Mon, 3 May 2021 09:30:34 +0500
Subject: [PATCH 03/20] Update policy-csp-localpoliciessecurityoptions.md
---
.../mdm/policy-csp-localpoliciessecurityoptions.md | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
index a0b1076deb..8d384e1020 100644
--- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
+++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
@@ -7,7 +7,7 @@ ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
-ms.date: 09/27/2019
+ms.date: 05/02/2021
ms.reviewer:
manager: dansimp
---
@@ -1045,9 +1045,7 @@ GP Info:
-Valid values:
-- 0 - disabled
-- 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit)
+Valid values: from 0 to 599940, where the value is the amount of inactivity time (in seconds), after which the session will be locked. If it is set to zero (0), the setting is disabled.
@@ -3467,4 +3465,4 @@ Footnotes:
- 7 - Available in Windows 10, version 1909.
- 8 - Available in Windows 10, version 2004.
-
\ No newline at end of file
+
From 4e0b331d0c6b08c0b875d9319a8b0ece7b85f668 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Tue, 4 May 2021 16:11:39 +0500
Subject: [PATCH 04/20] Update
windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../mdm/policy-csp-localpoliciessecurityoptions.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
index 8d384e1020..8beeba2c2e 100644
--- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
+++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md
@@ -1045,7 +1045,7 @@ GP Info:
-Valid values: from 0 to 599940, where the value is the amount of inactivity time (in seconds), after which the session will be locked. If it is set to zero (0), the setting is disabled.
+Valid values: From 0 to 599940, where the value is the amount of inactivity time (in seconds) after which the session will be locked. If it is set to zero (0), the setting is disabled.
From 33813715be906532b5f00daea8b0c148288b4955 Mon Sep 17 00:00:00 2001
From: Dan Pandre <54847950+DanPandre@users.noreply.github.com>
Date: Wed, 5 May 2021 18:16:11 -0400
Subject: [PATCH 05/20] Document ProxyServers property
---
windows/client-management/mdm/surfacehub-csp.md | 7 ++++++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/surfacehub-csp.md b/windows/client-management/mdm/surfacehub-csp.md
index ff96d2c80a..745f408e3b 100644
--- a/windows/client-management/mdm/surfacehub-csp.md
+++ b/windows/client-management/mdm/surfacehub-csp.md
@@ -61,9 +61,9 @@ SurfaceHub
--------SleepTimeout
--------AllowSessionResume
--------AllowAutoProxyAuth
+--------ProxyServers
--------DisableSigninSuggestions
--------DoNotShowMyMeetingsAndFiles
-----ProxyServers
----Management
--------GroupName
--------GroupSid
@@ -571,6 +571,11 @@ SurfaceHub
If this setting is true, the device account will be used for proxy authentication. If false, a separate account will be used.
The data type is boolean. Supported operation is Get and Replace.
+
+**Properties/ProxyServers**
+
Added in KB4499162 for Windows 10, version 1703. Specifies FQDNs of proxy servers to provide device account credentials to before any user interaction (if AllowAutoProxyAuth is enabled). This is a semi-colon separated list of server names, without any additional prefixes (e.g. https://).
+
+
The data type is string. Supported operation is Get and Replace.
**Properties/DisableSigninSuggestions**
Added in Windows 10, version 1703. Specifies whether to disable auto-populating of the sign-in dialog with invitees from scheduled meetings.
From 50e97e88a9b9bf5347ffa18cdaceeefd05ac04a5 Mon Sep 17 00:00:00 2001
From: Dan Pandre <54847950+DanPandre@users.noreply.github.com>
Date: Fri, 7 May 2021 09:25:49 -0400
Subject: [PATCH 06/20] Removed locale from links
---
windows/client-management/mdm/surfacehub-csp.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/surfacehub-csp.md b/windows/client-management/mdm/surfacehub-csp.md
index 745f408e3b..9755457f60 100644
--- a/windows/client-management/mdm/surfacehub-csp.md
+++ b/windows/client-management/mdm/surfacehub-csp.md
@@ -573,7 +573,7 @@ SurfaceHub
The data type is boolean. Supported operation is Get and Replace.
**Properties/ProxyServers**
-
Added in KB4499162 for Windows 10, version 1703. Specifies FQDNs of proxy servers to provide device account credentials to before any user interaction (if AllowAutoProxyAuth is enabled). This is a semi-colon separated list of server names, without any additional prefixes (e.g. https://).
+
Added in KB4499162 for Windows 10, version 1703. Specifies FQDNs of proxy servers to provide device account credentials to before any user interaction (if AllowAutoProxyAuth is enabled). This is a semi-colon separated list of server names, without any additional prefixes (e.g. https://).
The data type is string. Supported operation is Get and Replace.
From 37fbfbcde78be2867fa411c950656bd4b249e49b Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Thu, 20 May 2021 21:17:52 +0530
Subject: [PATCH 07/20] added Allow Update Compliance Processing
as per user feedback issue #9540, so I added **Allow Update Compliance Processing** policy-related settings in this article, after looking at GPO in windows 10 pre release build 21h1 19043.985.
---
.../mdm/policy-csp-system.md | 78 ++++++++++++++++++-
1 file changed, 77 insertions(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index 3615cb2e3f..a9ccc9b578 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -49,6 +49,9 @@ manager: dansimp
System/AllowTelemetry
+
+ System/AllowUpdateComplianceProcessing
+
System/AllowUserToResetPhone
@@ -791,6 +794,77 @@ ADMX Info:
+
+
+
+**System/AllowUpdateComplianceProcessing**
+
+
+
+
+ Windows Edition |
+ Supported? |
+
+
+ Home |
+  |
+
+
+ Pro |
+ 6 |
+
+
+ Business |
+ 6 |
+
+
+ Enterprise |
+ 6 |
+
+
+ Education |
+ 6 |
+
+
+
+
+
+
+
+[Scope](./policy-configuration-service-provider.md#policy-scope):
+
+> [!div class = "checklist"]
+> * Device
+
+
+
+
+
+Allows IT admins to enable diagnostic data from this device to be processed by Update Compliance.
+
+If you enable this setting, Enables data flow through Update Compliance's data processing system and indicates a device's explicit enrollment to the service.
+
+If you disable or do not configure this policy setting, diagnostic data from this device will not be processed by Update Compliance.
+
+
+
+ADMX Info:
+- GP English name: *Allow Update Compliance Processing*
+- GP name: *AllowUpdateComplianceProcessing*
+- GP element: *AllowUpdateComplianceProcessing*
+- GP path: *Data Collection and Preview Builds*
+- GP ADMX file name: *DataCollection.admx*
+
+
+
+The following list shows the supported values:
+
+- 0 - Disabled.
+- 16 - Enabled.
+
+
+
+
@@ -1778,5 +1852,7 @@ Footnotes:
- 6 - Available in Windows 10, version 1903.
- 7 - Available in Windows 10, version 1909.
- 8 - Available in Windows 10, version 2004.
+- 9 - Available in Windows 10, version 20H2.
+- 10 - Available in Windows 10, version 21H1.
-
\ No newline at end of file
+
From 9a024df7b281dda143f89bd32ad6300ba49d2ce2 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Thu, 20 May 2021 22:43:25 +0530
Subject: [PATCH 08/20] Update
windows/client-management/mdm/policy-csp-system.md
accepted
Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
---
windows/client-management/mdm/policy-csp-system.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index a9ccc9b578..787fbbbb2a 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -50,7 +50,7 @@ manager: dansimp
System/AllowTelemetry
- System/AllowUpdateComplianceProcessing
+ System/AllowUpdateComplianceProcessing
System/AllowUserToResetPhone
From 6c0242ca208802d1ba7b4430892d63942287f0b0 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 21 May 2021 14:16:50 +0530
Subject: [PATCH 09/20] Update
windows/client-management/mdm/policy-csp-system.md
accepted
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
windows/client-management/mdm/policy-csp-system.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index 787fbbbb2a..828bc97b2a 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -842,7 +842,7 @@ ADMX Info:
Allows IT admins to enable diagnostic data from this device to be processed by Update Compliance.
-If you enable this setting, Enables data flow through Update Compliance's data processing system and indicates a device's explicit enrollment to the service.
+If you enable this setting, it enables data flow through Update Compliance's data processing system and indicates a device's explicit enrollment to the service.
If you disable or do not configure this policy setting, diagnostic data from this device will not be processed by Update Compliance.
From 64de74b17d47d461eb6c47200e47bac57946e5b8 Mon Sep 17 00:00:00 2001
From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com>
Date: Fri, 21 May 2021 14:29:06 +0530
Subject: [PATCH 10/20] made boot to System/BootStartDriverInitialization
as per user feedback from @illfated under issue #9554 , so i made sentence **System/BootStartDriverInitialization** to bold.
---
windows/client-management/mdm/policy-csp-system.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md
index 3615cb2e3f..3a5f16aba7 100644
--- a/windows/client-management/mdm/policy-csp-system.md
+++ b/windows/client-management/mdm/policy-csp-system.md
@@ -852,6 +852,7 @@ The following list shows the supported values:
+
**System/BootStartDriverInitialization**
@@ -1779,4 +1780,4 @@ Footnotes:
- 7 - Available in Windows 10, version 1909.
- 8 - Available in Windows 10, version 2004.
-
\ No newline at end of file
+
From 582ad407f366210a6cb504cb3ef6879df9fcd154 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Wed, 26 May 2021 14:49:40 +0500
Subject: [PATCH 11/20] Minor correction to remove the confusion
I have made a minor addition to the content to clarify the confusion.
Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/9461
---
.../client-management/mdm/policy-csp-admx-windowsexplorer.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md b/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md
index 234f5f9d6c..352dd76846 100644
--- a/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md
+++ b/windows/client-management/mdm/policy-csp-admx-windowsexplorer.md
@@ -4521,7 +4521,7 @@ ADMX Info:
Available in the latest Windows 10 Insider Preview Build. Prevents users from using My Computer to gain access to the content of selected drives.
-If you enable this setting, users can browse the directory structure of the selected drives in My Computer or File Explorer, but they cannot open folders and access the contents. Also, they cannot use the Run dialog box or the Map Network Drive dialog box to view the directories on these drives.
+If you enable this setting, users can browse the directory structure of the selected drives in My Computer or File Explorer, but they cannot open folders and access the contents (open the files in the folders or see the files in the folders). Also, they cannot use the Run dialog box or the Map Network Drive dialog box to view the directories on these drives.
To use this setting, select a drive or combination of drives from the drop-down list. To allow access to all drive directories, disable this setting or select the "Do not restrict drives" option from the drop-down list.
@@ -5356,4 +5356,4 @@ ADMX Info:
> [!NOTE]
> These policies are currently only available as part of a Windows Insider release.
-
\ No newline at end of file
+
From 0ea039011830844a17359aa17bffc66723a54bbd Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Wed, 2 Jun 2021 14:29:53 +0500
Subject: [PATCH 12/20] Update in Changing the PIN
Made some update in Changing the PIN
Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/9475
---
.../virtual-smart-card-use-virtual-smart-cards.md | 10 +++++++---
1 file changed, 7 insertions(+), 3 deletions(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index cb9d870d46..f5d0883f98 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -80,8 +80,12 @@ A TPM-based virtual smart card is labeled **Security Device** in the user interf
## Changing the PIN
-The PIN for virtual smart card can be changed by pressing Ctrl+Alt+Del, and then selecting the TPM virtual smart card under **Sign in options**.
-
+The PIN for virtual smart card can be changed by following steps:
+- Log on with the old pin or password.
+- Press Ctrl+Alt+Del and choose **Change a password**.
+- Click ""Sign-in Options**.
+- Click the **Virtual smart card icon**.
+- Change the pin.
## Resolving issues
### TPM not provisioned
@@ -100,4 +104,4 @@ Sometimes, due to frequent incorrect PIN attempts from a user, the TPM may enter
## See also
-For information about authentication, confidentiality, and data integrity use cases, see [Virtual Smart Card Overview](virtual-smart-card-overview.md).
\ No newline at end of file
+For information about authentication, confidentiality, and data integrity use cases, see [Virtual Smart Card Overview](virtual-smart-card-overview.md).
From 25357cb87705dcbf13ab85c73d1ea4b63c3ef7a6 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Thu, 3 Jun 2021 12:31:32 +0500
Subject: [PATCH 13/20] Update
windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../virtual-smart-card-use-virtual-smart-cards.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index f5d0883f98..2f1de3fc17 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -80,7 +80,7 @@ A TPM-based virtual smart card is labeled **Security Device** in the user interf
## Changing the PIN
-The PIN for virtual smart card can be changed by following steps:
+The PIN for a virtual smart card can be changed by following these steps:
- Log on with the old pin or password.
- Press Ctrl+Alt+Del and choose **Change a password**.
- Click ""Sign-in Options**.
From 4ef7ceea33e8ba652093dc5811671988f4f1393d Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Thu, 3 Jun 2021 12:31:44 +0500
Subject: [PATCH 14/20] Update
windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../virtual-smart-card-use-virtual-smart-cards.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index 2f1de3fc17..cceae7c4f2 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -84,7 +84,7 @@ The PIN for a virtual smart card can be changed by following these steps:
- Log on with the old pin or password.
- Press Ctrl+Alt+Del and choose **Change a password**.
- Click ""Sign-in Options**.
-- Click the **Virtual smart card icon**.
+- Select the virtual smart card icon.
- Change the pin.
## Resolving issues
From a7784d3a272f98ff0aec9770d5c8a6c66388a544 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Thu, 3 Jun 2021 12:31:55 +0500
Subject: [PATCH 15/20] Update
windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../virtual-smart-card-use-virtual-smart-cards.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index cceae7c4f2..d277d08df6 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -85,7 +85,7 @@ The PIN for a virtual smart card can be changed by following these steps:
- Press Ctrl+Alt+Del and choose **Change a password**.
- Click ""Sign-in Options**.
- Select the virtual smart card icon.
-- Change the pin.
+- Enter and confirm the new PIN.
## Resolving issues
### TPM not provisioned
From 22efa0b924843377e2dfebfb9938a6517abf6525 Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Thu, 3 Jun 2021 12:32:04 +0500
Subject: [PATCH 16/20] Update
windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../virtual-smart-card-use-virtual-smart-cards.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index d277d08df6..018f2a2982 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -81,7 +81,7 @@ A TPM-based virtual smart card is labeled **Security Device** in the user interf
## Changing the PIN
The PIN for a virtual smart card can be changed by following these steps:
-- Log on with the old pin or password.
+- Sign in with the old PIN or password.
- Press Ctrl+Alt+Del and choose **Change a password**.
- Click ""Sign-in Options**.
- Select the virtual smart card icon.
From f2b739ce779bf465bd3461d6270df9e580c89a6e Mon Sep 17 00:00:00 2001
From: ImranHabib <47118050+joinimran@users.noreply.github.com>
Date: Thu, 3 Jun 2021 12:32:11 +0500
Subject: [PATCH 17/20] Update
windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
.../virtual-smart-card-use-virtual-smart-cards.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
index 018f2a2982..789da743aa 100644
--- a/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
+++ b/windows/security/identity-protection/virtual-smart-cards/virtual-smart-card-use-virtual-smart-cards.md
@@ -83,7 +83,7 @@ A TPM-based virtual smart card is labeled **Security Device** in the user interf
The PIN for a virtual smart card can be changed by following these steps:
- Sign in with the old PIN or password.
- Press Ctrl+Alt+Del and choose **Change a password**.
-- Click ""Sign-in Options**.
+- Select **Sign-in Options**.
- Select the virtual smart card icon.
- Enter and confirm the new PIN.
## Resolving issues
From 560d09e0e55760ffc4b97bf4242133b7203d0af2 Mon Sep 17 00:00:00 2001
From: Kim Klein
Date: Mon, 7 Jun 2021 15:26:17 -0700
Subject: [PATCH 18/20] Added a section for supplemental policies.
---
.../select-types-of-rules-to-create.md | 10 ++++++++++
1 file changed, 10 insertions(+)
diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
index add268e0ee..f5e5b8c109 100644
--- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
+++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
@@ -71,6 +71,16 @@ You can set several rule options within a WDAC policy. Table 1 describes each ru
| **18 Disabled:Runtime FilePath Rule Protection** | This option disables the default runtime check that only allows FilePath rules for paths that are only writable by an administrator. NOTE: This option is only supported on Windows 10, version 1903, and above. |
| **19 Enabled:Dynamic Code Security** | Enables policy enforcement for .NET applications and dynamically loaded libraries. NOTE: This option is only supported on Windows 10, version 1803, and above. |
+### The following options are valid for supplemental policies. However, number 5 is not implemented as it is reserved for future work, and number 7 is not supported.
+| Rule option | Description |
+|------------ | ----------- |
+| 5 | Enabled: Inherit Default Policy |
+| **6** | **Enabled: Unsigned System Integrity Policy** |
+| 7 | Allowed: Debug Policy Augmented |
+| **13** | **Enabled: Managed Installer** |
+| **14** | **Enabled: Intelligent Security Graph Authorization** |
+| **18** | **Disabled: Runtime FilePath Rule Protection** |
+
## Windows Defender Application Control file rule levels
File rule levels allow administrators to specify the level at which they want to trust their applications. This level of trust could be as granular as the hash of each binary or as general as a CA certificate. You specify file rule levels when using WDAC PowerShell cmdlets to create and modify policies.
From 066d6aafe79323432eec25fcd9b80bc49a6cc1cf Mon Sep 17 00:00:00 2001
From: Kim Klein
Date: Tue, 8 Jun 2021 09:38:41 -0700
Subject: [PATCH 19/20] Removed the heading format for the new text
and also swapped out "number" for "option."
---
.../select-types-of-rules-to-create.md | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
index f5e5b8c109..7a56e31130 100644
--- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
+++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md
@@ -71,7 +71,8 @@ You can set several rule options within a WDAC policy. Table 1 describes each ru
| **18 Disabled:Runtime FilePath Rule Protection** | This option disables the default runtime check that only allows FilePath rules for paths that are only writable by an administrator. NOTE: This option is only supported on Windows 10, version 1903, and above. |
| **19 Enabled:Dynamic Code Security** | Enables policy enforcement for .NET applications and dynamically loaded libraries. NOTE: This option is only supported on Windows 10, version 1803, and above. |
-### The following options are valid for supplemental policies. However, number 5 is not implemented as it is reserved for future work, and number 7 is not supported.
+The following options are valid for supplemental policies. However, option 5 is not implemented as it is reserved for future work, and option 7 is not supported.
+
| Rule option | Description |
|------------ | ----------- |
| 5 | Enabled: Inherit Default Policy |
From ccb70b243bcf508a3355b1d1194b5577eedb6c00 Mon Sep 17 00:00:00 2001
From: Marysia Kaminska <85372436+marysiakam9889@users.noreply.github.com>
Date: Tue, 8 Jun 2021 16:35:35 -0700
Subject: [PATCH 20/20] Update defender-ddf.md
adding new csp's for Defender Update controls: DisableGradualRelease, DefinitionUpdatesChannel, EngineUpdatesChannel, and PlatformUpdatesChannel
---
windows/client-management/mdm/defender-ddf.md | 180 ++++++++++++++++++
1 file changed, 180 insertions(+)
diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md
index a63f4dec92..b4c21b747a 100644
--- a/windows/client-management/mdm/defender-ddf.md
+++ b/windows/client-management/mdm/defender-ddf.md
@@ -757,6 +757,186 @@ The XML below is the current version for this CSP.
+
+ DisableGradualRelease
+
+
+
+
+
+
+
+ Enable this policy to disable gradual rollout of Defender updates.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ 99.9.99999
+ 1.3
+
+
+
+ 1
+ Gradual release is disabled
+
+
+ 0
+ Gradual release is enabled
+
+
+
+
+
+ DefinitionUpdatesChannel
+
+
+
+
+
+
+
+ Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ 99.9.99999
+ 1.3
+
+
+
+ 0
+ Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
+
+
+ 4
+ Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
+
+
+ 5
+ Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
+
+
+
+
+
+ EngineUpdatesChannel
+
+
+
+
+
+
+
+ Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ 99.9.99999
+ 1.3
+
+
+
+ 0
+ Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
+
+
+ 2
+ Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
+
+
+ 3
+ Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
+
+
+ 4
+ Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
+
+
+ 5
+ Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
+
+
+
+
+
+ PlatformUpdatesChannel
+
+
+
+
+
+
+
+ Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ 99.9.99999
+ 1.3
+
+
+
+ 0
+ Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
+
+
+ 2
+ Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
+
+
+ 3
+ Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
+
+
+ 4
+ Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
+
+
+ 5
+ Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
+
+
+
+
Scan