mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-15 10:23:37 +00:00
Acrolinx enhancement
This commit is contained in:
@ -144,7 +144,7 @@ manager: dansimp
|
||||
|
||||
This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software.
|
||||
|
||||
If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable.
|
||||
If you enable or don't configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -201,9 +201,9 @@ To enable this behavior, you must complete two steps:
|
||||
|
||||
Windows diagnostic data is collected when the Allow Telemetry policy setting is set to 1 – **Required (Basic)** or above.
|
||||
|
||||
If you disable or do not configure this setting, Microsoft will be the controller of the Windows diagnostic data collected from the device and processed in accordance with Microsoft’s [privacy statement](https://go.microsoft.com/fwlink/?LinkId=521839) unless you have enabled policies like Allow Update Compliance Processing or Allow Desktop Analytics Processing.
|
||||
If you disable or don't configure this setting, Microsoft will be the controller of the Windows diagnostic data collected from the device and processed in accordance with Microsoft’s [privacy statement](https://go.microsoft.com/fwlink/?LinkId=521839) unless you have enabled policies like Allow Update Compliance Processing or Allow Desktop Analytics Processing.
|
||||
|
||||
Configuring this setting does not change the Windows diagnostic data collection level set for the device or the operation of optional analytics processor services like Desktop Analytics and Update Compliance.
|
||||
Configuring this setting doesn't change the Windows diagnostic data collection level set for the device or the operation of optional analytics processor services like Desktop Analytics and Update Compliance.
|
||||
|
||||
See the documentation at [ConfigureWDD](https://aka.ms/ConfigureWDD) for information on this and other policies that will result in Microsoft being the processor of Windows diagnostic data.
|
||||
|
||||
@ -248,11 +248,11 @@ To enable this behavior, you must complete three steps:
|
||||
2. Set **AllowTelemetry** to 1 – **Required (Basic)** or above
|
||||
3. Set the Configure the Commercial ID setting for your Desktop Analytics workspace
|
||||
|
||||
This setting has no effect on devices unless they are properly enrolled in Desktop Analytics.
|
||||
This setting has no effect on devices unless they're properly enrolled in Desktop Analytics.
|
||||
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
|
||||
If you disable or do not configure this policy setting, devices will not appear in Desktop Analytics.
|
||||
If you disable or don't configure this policy setting, devices won't appear in Desktop Analytics.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
@ -289,7 +289,7 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy allows the device name to be sent to Microsoft as part of Windows diagnostic data. If you disable or do not configure this policy setting, then device name will not be sent to Microsoft as part of Windows diagnostic data.
|
||||
This policy allows the device name to be sent to Microsoft as part of Windows diagnostic data. If you disable or don't configure this policy setting, then device name won't be sent to Microsoft as part of Windows diagnostic data.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -385,7 +385,7 @@ The following list shows the supported values:
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
> [!NOTE]
|
||||
> This policy is not supported in Windows 10, version 1607.
|
||||
> This policy isn't supported in Windows 10, version 1607.
|
||||
|
||||
This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior.
|
||||
|
||||
@ -430,11 +430,11 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally installed fonts.
|
||||
Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows doesn't connect to an online font provider and only enumerates locally installed fonts.
|
||||
|
||||
This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled).
|
||||
This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value isn't set by default, so the default behavior is true (enabled).
|
||||
|
||||
This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content.
|
||||
This setting is used by lower-level components for text display and fond handling and hasn't direct effect on web browsers, which may download web fonts used in web content.
|
||||
|
||||
> [!NOTE]
|
||||
> Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service.
|
||||
@ -458,7 +458,7 @@ The following list shows the supported values:
|
||||
<!--Validation-->
|
||||
To verify if System/AllowFontProviders is set to true:
|
||||
|
||||
- After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com.
|
||||
- After a client machine is rebooted, check whether there's any network traffic from client machine to fs.microsoft.com.
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
@ -513,9 +513,9 @@ ADMX Info:
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Force Location Off. All Location Privacy settings are toggled off and grayed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
|
||||
- 0 – Force Location Off. All Location Privacy settings are toggled off and grayed out. Users can't change the settings, and no apps are allowed access to the Location service, including Cortana and Search.
|
||||
- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off.
|
||||
- 2 – Force Location On. All Location Privacy settings are toggled on and grayed out. Users cannot change the settings and all consent permissions will be automatically suppressed.
|
||||
- 2 – Force Location On. All Location Privacy settings are toggled on and grayed out. Users can't change the settings and all consent permissions will be automatically suppressed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
@ -531,7 +531,7 @@ This policy setting configures an Azure Active Directory joined device so that M
|
||||
|
||||
For customers who enroll into the Microsoft Managed Desktop service, this policy will be enabled by default to allow Microsoft to process data for operational and analytic needs. For more information, see [Privacy and personal data](/microsoft-365/managed-desktop/service-description/privacy-personal-data.md).
|
||||
|
||||
This setting has no effect on devices unless they are properly enrolled in Microsoft Managed Desktop.
|
||||
This setting has no effect on devices unless they're properly enrolled in Microsoft Managed Desktop.
|
||||
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
|
||||
@ -575,7 +575,7 @@ Most restricted value is 0.
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card.
|
||||
- 0 – SD card use isn't allowed and USB drives are disabled. This setting doesn't prevent programmatic access to the storage card.
|
||||
- 1 (default) – Allow a storage card.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
@ -611,7 +611,7 @@ The following list shows the supported values:
|
||||
<!--Description-->
|
||||
Allows the device to send diagnostic and usage telemetry data, such as Watson.
|
||||
|
||||
For more information about diagnostic data, including what is and what is not collected by Windows, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization).
|
||||
For more information about diagnostic data, including what is and what isn't collected by Windows, see [Configure Windows diagnostic data in your organization](/windows/privacy/configure-windows-diagnostic-data-in-your-organization).
|
||||
|
||||
The following list shows the supported values for Windows 8.1:
|
||||
- 0 - Not allowed.
|
||||
@ -623,19 +623,19 @@ In Windows 10, you can configure this policy setting to decide what level of dia
|
||||
|
||||
The following list shows the supported values for Windows 10 version 1809 and older, choose the value that is applicable to your OS version (older OS values are displayed in the brackets):
|
||||
|
||||
- 0 – **Off (Security)** This turns Windows diagnostic data off.
|
||||
- 0 – **Off (Security)** This value turns Windows diagnostic data off.
|
||||
|
||||
> [!NOTE]
|
||||
> This value is only applicable to Windows 10 Enterprise, Windows 10 Education, Windows 10 IoT Core (IoT Core), HoloLens 2, and Windows Server 2016 (and later versions). Using this setting on other devices editions of Windows is equivalent to setting the value of 1.
|
||||
|
||||
- 1 – **Required (Basic)** Sends basic device info, including quality-related data, app compatibility, and other similar data to keep the device secure and up-to-date.
|
||||
|
||||
- 2 – (**Enhanced**) Sends the same data as a value of 1, plus additional insights, including how Windows apps are used, how they perform, and advanced reliability data, such as limited crash dumps.
|
||||
- 2 – (**Enhanced**) Sends the same data as a value of 1, plus extra insights, including how Windows apps are used, how they perform, and advanced reliability data, such as limited crash dumps.
|
||||
|
||||
> [!NOTE]
|
||||
> **Enhanced** is no longer an option for Windows Holographic, version 21H1.
|
||||
|
||||
- 3 – **Optional (Full)** Sends the same data as a value of 2, plus additional data necessary to identify and fix problems with devices such as enhanced error logs.
|
||||
- 3 – **Optional (Full)** Sends the same data as a value of 2, plus extra data necessary to identify and fix problems with devices such as enhanced error logs.
|
||||
|
||||
Most restrictive value is 0.
|
||||
|
||||
@ -689,7 +689,7 @@ To enable this behavior, you must complete three steps:
|
||||
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
|
||||
If you disable or do not configure this policy setting, devices will not appear in Update Compliance.
|
||||
If you disable or don't configure this policy setting, devices won't appear in Update Compliance.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -771,7 +771,7 @@ To enable this behavior, you must complete three steps:
|
||||
|
||||
When these policies are configured, Windows diagnostic data collected from the device will be subject to Microsoft processor commitments.
|
||||
|
||||
If you disable or do not configure this policy setting, devices enrolled to the Windows Update for Business deployment service will not be able to take advantage of some deployment service features.
|
||||
If you disable or don't configure this policy setting, devices enrolled to the Windows Update for Business deployment service won't be able to take advantage of some deployment service features.
|
||||
|
||||
<hr/>
|
||||
|
||||
@ -810,16 +810,16 @@ The following list shows the supported values:
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting allows you to specify which boot-start drivers are initialized based on a classification determined by an Early Launch Antimalware boot-start driver. The Early Launch Antimalware boot-start driver can return the following classifications for each boot-start driver:
|
||||
- Good: The driver has been signed and has not been tampered with.
|
||||
- Bad: The driver has been identified as malware. It is recommended that you do not allow known bad drivers to be initialized.
|
||||
- Bad, but required for boot: The driver has been identified as malware, but the computer cannot successfully boot without loading this driver.
|
||||
- Unknown: This driver has not been attested to by your malware detection application and has not been classified by the Early Launch Antimalware boot-start driver.
|
||||
- Good: The driver has been signed and hasn't been tampered with.
|
||||
- Bad: The driver has been identified as malware. It's recommended that you don't allow known bad drivers to be initialized.
|
||||
- Bad, but required for boot: The driver has been identified as malware, but the computer can't successfully boot without loading this driver.
|
||||
- Unknown: This driver hasn't been attested to by your malware detection application and hasn't been classified by the Early Launch Antimalware boot-start driver.
|
||||
|
||||
If you enable this policy setting you will be able to choose which boot-start drivers to initialize the next time the computer is started.
|
||||
If you enable this policy setting, you'll be able to choose which boot-start drivers to initialize the next time the computer is started.
|
||||
|
||||
If you disable or do not configure this policy setting, the boot start drivers determined to be Good, Unknown or Bad but Boot Critical are initialized and the initialization of drivers determined to be Bad is skipped.
|
||||
If you disable or don't configure this policy setting, the boot start drivers determined to be Good, Unknown or Bad but Boot Critical are initialized and the initialization of drivers determined to be Bad is skipped.
|
||||
|
||||
If your malware detection application does not include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized.
|
||||
If your malware detection application doesn't include an Early Launch Antimalware boot-start driver or if your Early Launch Antimalware boot-start driver has been disabled, this setting has no effect and all boot-start drivers are initialized.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
@ -921,9 +921,9 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting determines whether a device shows notifications about telemetry levels to people on first logon or when changes occur in Settings.
|
||||
This policy setting determines whether a device shows notifications about telemetry levels to people on first sign in or when changes occur in Settings.
|
||||
If you set this policy setting to "Disable telemetry change notifications", telemetry level notifications stop appearing.
|
||||
If you set this policy setting to "Enable telemetry change notifications" or don't configure this policy setting, telemetry notifications appear at first logon and when changes occur in Settings.
|
||||
If you set this policy setting to "Enable telemetry change notifications" or don't configure this policy setting, telemetry notifications appear at first sign in and when changes occur in Settings.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1075,7 +1075,7 @@ ADMX Info:
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting controls whether users can enable and launch the Diagnostic Data Viewer from the Diagnostic & Feedback Settings page.
|
||||
If you enable this policy setting, the Diagnostic Data Viewer will not be enabled in Settings page, and it will prevent the viewer from showing diagnostic data collected by Microsoft from the device.
|
||||
If you enable this policy setting, the Diagnostic Data Viewer won't be enabled in Settings page, and it will prevent the viewer from showing diagnostic data collected by Microsoft from the device.
|
||||
If you disable or don't configure this policy setting, the Diagnostic Data Viewer will be enabled in Settings page.
|
||||
|
||||
<!--/Description-->
|
||||
@ -1126,7 +1126,7 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy.
|
||||
This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or don't configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1169,13 +1169,13 @@ ADMX Info:
|
||||
<!--Description-->
|
||||
Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting:
|
||||
|
||||
* Users cannot access OneDrive from the OneDrive app or file picker.
|
||||
* Microsoft Store apps cannot access OneDrive using the WinRT API.
|
||||
* OneDrive does not appear in the navigation pane in File Explorer.
|
||||
* OneDrive files are not kept in sync with the cloud.
|
||||
* Users cannot automatically upload photos and videos from the camera roll folder.
|
||||
* Users can't access OneDrive from the OneDrive app or file picker.
|
||||
* Microsoft Store apps can't access OneDrive using the WinRT API.
|
||||
* OneDrive doesn't appear in the navigation pane in File Explorer.
|
||||
* OneDrive files aren't kept in sync with the cloud.
|
||||
* Users can't automatically upload photos and videos from the camera roll folder.
|
||||
|
||||
If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
|
||||
If you disable or don't configure this policy setting, apps and features can work with OneDrive file storage.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1194,11 +1194,11 @@ The following list shows the supported values:
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Validation-->
|
||||
To validate on Desktop, do the following:
|
||||
To validate on Desktop, do the following steps:
|
||||
|
||||
1. Enable policy.
|
||||
2. Restart machine.
|
||||
3. Verify that OneDrive.exe is not running in Task Manager.
|
||||
3. Verify that OneDrive.exe isn't running in Task Manager.
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
@ -1234,11 +1234,11 @@ Allows you to disable System Restore.
|
||||
|
||||
This policy setting allows you to turn off System Restore.
|
||||
|
||||
System Restore enables users, in the event of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume.
|
||||
System Restore enables users, in case of a problem, to restore their computers to a previous state without losing personal data files. By default, System Restore is turned on for the boot volume.
|
||||
|
||||
If you enable this policy setting, System Restore is turned off, and the System Restore Wizard cannot be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled.
|
||||
If you enable this policy setting, System Restore is turned off, and the System Restore Wizard can't be accessed. The option to configure System Restore or create a restore point through System Protection is also disabled.
|
||||
|
||||
If you disable or do not configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection.
|
||||
If you disable or don't configure this policy setting, users can perform System Restore and configure System Restore settings through System Protection.
|
||||
|
||||
Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available.
|
||||
|
||||
@ -1287,14 +1287,14 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
When filing feedback in the Feedback Hub, diagnostic logs are collected for certain types of feedback. We now offer the option for users to save it locally, in addition to sending it to Microsoft. This policy will allow enterprises to mandate that all diagnostics are saved locally for use in internal investigations.
|
||||
When feedback in the Feedback Hub is being filed, diagnostic logs are collected for certain types of feedback. We now offer the option for users to save it locally, in addition to sending it to Microsoft. This policy will allow enterprises to mandate that all diagnostics are saved locally for use in internal investigations.
|
||||
|
||||
<!--/Description-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - False. The Feedback Hub will not always save a local copy of diagnostics that may be created when a feedback is submitted. The user will have the option to do so.
|
||||
- 1 - True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted.
|
||||
- 0 (default) - False. The Feedback Hub won't always save a local copy of diagnostics that may be created when feedback is submitted. The user will have the option to do so.
|
||||
- 1 - True. The Feedback Hub should always save a local copy of diagnostics that may be created when feedback is submitted.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
@ -1326,9 +1326,9 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting specifies whether diagnostic log data can be collected when more information is needed to troubleshoot a problem. It is sent only if we have permission to collect optional diagnostic data, and only if the device meets the criteria for additional data collection.
|
||||
This policy setting specifies whether diagnostic log data can be collected when more information is needed to troubleshoot a problem. It's sent only if we have permission to collect optional diagnostic data, and only if the device meets the criteria for more data collection.
|
||||
|
||||
If you disable or do not configure this policy setting, we may occasionally collect advanced diagnostic data if the user has opted to send optional diagnostic data.
|
||||
If you disable or don't configure this policy setting, we may occasionally collect advanced diagnostic data if the user has opted to send optional diagnostic data.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1375,11 +1375,11 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting limits the type of dumps that can be collected when more information is needed to troubleshoot a problem. These dumps are not sent unless we have permission to collect optional diagnostic data.
|
||||
This policy setting limits the type of dumps that can be collected when more information is needed to troubleshoot a problem. These dumps aren't sent unless we have permission to collect optional diagnostic data.
|
||||
|
||||
By enabling this policy setting, Windows Error Reporting is limited to sending kernel mini dumps and user mode triage dumps only.
|
||||
With this policy setting being enabled, Windows Error Reporting is limited to sending kernel mini dumps and user mode triage dumps only.
|
||||
|
||||
If you disable or do not configure this policy setting, we may occasionally collect full or heap dumps if the user has opted to send optional diagnostic data.
|
||||
If you disable or don't configure this policy setting, we may occasionally collect full or heap dumps if the user has opted to send optional diagnostic data.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1441,11 +1441,11 @@ To enable this behavior, you must complete two steps:
|
||||
- For Windows 10 version 19H1 and later: set **AllowTelemetry** to Optional (Full)
|
||||
|
||||
|
||||
When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: <a href="/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields" data-raw-source="[Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields)">Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics</a>.
|
||||
When you configure these policy settings, a basic level of diagnostic data plus other events that are required for Windows Analytics are sent to Microsoft. These events are documented here: <a href="/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields" data-raw-source="[Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](/windows/privacy/enhanced-diagnostic-data-windows-analytics-events-and-fields)">Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics</a>.
|
||||
|
||||
Enabling enhanced diagnostic data in the Allow Telemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send Required (Basic) or Optional (Full) diagnostic data to Microsoft.
|
||||
Enabling enhanced diagnostic data in the Allow Telemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus enhanced level telemetry data. This setting has no effect on computers configured to send Required (Basic) or Optional (Full) diagnostic data to Microsoft.
|
||||
|
||||
If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy.
|
||||
If you disable or don't configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1486,9 +1486,9 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device.
|
||||
Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there's no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data won't be transmitted and will remain on the local device.
|
||||
|
||||
If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration.
|
||||
If you disable or don't configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
@ -1531,9 +1531,9 @@ ADMX Info:
|
||||
<!--Description-->
|
||||
This policy setting allows you to turn off File History.
|
||||
|
||||
If you enable this policy setting, File History cannot be activated to create regular, automatic backups.
|
||||
If you enable this policy setting, File History can't be activated to create regular, automatic backups.
|
||||
|
||||
If you disable or do not configure this policy setting, File History can be activated to create regular, automatic backups.
|
||||
If you disable or don't configure this policy setting, File History can be activated to create regular, automatic backups.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
|
Reference in New Issue
Block a user