mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'main' into vp-csp-2309-2
This commit is contained in:
commit
3121141495
@ -48,7 +48,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"externalReference": [],
|
"externalReference": [],
|
||||||
|
@ -66,7 +66,7 @@
|
|||||||
"garycentric",
|
"garycentric",
|
||||||
"v-stsavell",
|
"v-stsavell",
|
||||||
"beccarobins",
|
"beccarobins",
|
||||||
"v-stchambers"
|
"Stacyrch140"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"fileMetadata": {
|
"fileMetadata": {
|
||||||
|
@ -106,7 +106,7 @@ Employees can claim apps that admins added to the private store by doing the fol
|
|||||||
### Get and remove private store apps
|
### Get and remove private store apps
|
||||||
**To claim an app from the private store**
|
**To claim an app from the private store**
|
||||||
|
|
||||||
1. Sign in to your computer with your Azure Active Directory (AD) credentials, and start the Microsoft Store app.
|
1. Sign in to your computer with your Microsoft Entra credentials, and start the Microsoft Store app.
|
||||||
2. Click the private store tab.
|
2. Click the private store tab.
|
||||||
3. Click the app you want to install, and then click **Install**.
|
3. Click the app you want to install, and then click **Install**.
|
||||||
|
|
||||||
|
@ -62,7 +62,7 @@ If an employee makes an in-app purchase, they'll make it with their personal Mic
|
|||||||
Microsoft Store supports two options to license apps: online and offline.
|
Microsoft Store supports two options to license apps: online and offline.
|
||||||
|
|
||||||
### Online licensing
|
### Online licensing
|
||||||
Online licensing is the default licensing model and is similar to the model used by Microsoft Store. Online licensed apps require customers and devices to connect to Microsoft Store service to acquire an app and its license. License management is enforced based on the user's Azure AD identity and maintained by Microsoft Store as well as the management tool. By default app updates are handled by Windows Update.
|
Online licensing is the default licensing model and is similar to the model used by Microsoft Store. Online licensed apps require customers and devices to connect to Microsoft Store service to acquire an app and its license. License management is enforced based on the user's Microsoft Entra identity and maintained by Microsoft Store as well as the management tool. By default app updates are handled by Windows Update.
|
||||||
|
|
||||||
Distribution options for online-licensed apps include the ability to:
|
Distribution options for online-licensed apps include the ability to:
|
||||||
|
|
||||||
|
@ -27,16 +27,16 @@ ms.date: 05/24/2023
|
|||||||
|
|
||||||
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
||||||
|
|
||||||
Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
Your management tool needs to be installed and configured with Microsoft Entra ID, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
||||||
|
|
||||||
**To configure a management tool in Azure AD**
|
**To configure a management tool in Microsoft Entra ID**
|
||||||
|
|
||||||
1. Sign in to the Azure Portal as an Administrator.
|
1. Sign in to the Azure Portal as an Administrator.
|
||||||
2. Click **Azure Active Directory**, and then choose your directory.
|
2. Click **Microsoft Entra ID**, and then choose your directory.
|
||||||
4. Click **Mobility (MDM and MAM)**.
|
4. Click **Mobility (MDM and MAM)**.
|
||||||
3. Click **+Add Applications**, find the application, and add it to your directory.
|
3. Click **+Add Applications**, find the application, and add it to your directory.
|
||||||
|
|
||||||
After your management tool is added to your Azure AD directory, you can configure it to work with Microsoft Store. You can configure multiple management tools - just repeat the following procedure.
|
After your management tool is added to your Microsoft Entra directory, you can configure it to work with Microsoft Store. You can configure multiple management tools - just repeat the following procedure.
|
||||||
|
|
||||||
**To configure a management tool in Microsoft Store for Business**
|
**To configure a management tool in Microsoft Store for Business**
|
||||||
|
|
||||||
|
@ -61,7 +61,7 @@ Employees can claim apps that admins added to the private store by doing the fol
|
|||||||
|
|
||||||
**To claim an app from the private store**
|
**To claim an app from the private store**
|
||||||
|
|
||||||
1. Sign in to your computer with your Azure Active Directory (AD) credentials, and start Microsoft Store app.
|
1. Sign in to your computer with your Microsoft Entra credentials, and start Microsoft Store app.
|
||||||
2. Click the **private store** tab.
|
2. Click the **private store** tab.
|
||||||
3. Click the app you want to install, and then click **Install**.
|
3. Click the app you want to install, and then click **Install**.
|
||||||
|
|
||||||
|
@ -27,9 +27,9 @@ ms.date: 05/24/2023
|
|||||||
|
|
||||||
You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content.
|
You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content.
|
||||||
|
|
||||||
Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store.
|
Your MDM tool needs to be installed and configured in Microsoft Entra ID, in the same Microsoft Entra directory used with Microsoft Store.
|
||||||
|
|
||||||
In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business).
|
In Microsoft Entra management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Microsoft Entra ID, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](/mem/intune/apps/windows-store-for-business).
|
||||||
|
|
||||||
Microsoft Store services provide:
|
Microsoft Store services provide:
|
||||||
|
|
||||||
@ -40,9 +40,9 @@ Microsoft Store services provide:
|
|||||||
|
|
||||||
MDM tool requirements:
|
MDM tool requirements:
|
||||||
|
|
||||||
- Must be an Azure Active Directory (AD) application to authenticate against the Store for Business services.
|
- Must be a Microsoft Entra application to authenticate against the Store for Business services.
|
||||||
- Must be configured in Azure AD, and Microsoft Store.
|
- Must be configured in Microsoft Entra ID, and Microsoft Store.
|
||||||
- Azure AD identity is required to authorize Microsoft Store services.
|
- Microsoft Entra identity is required to authorize Microsoft Store services.
|
||||||
|
|
||||||
## Distribute offline-licensed apps
|
## Distribute offline-licensed apps
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ Offline-licensed apps offer an alternative to online apps, and provide additiona
|
|||||||
|
|
||||||
- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD).
|
- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD).
|
||||||
|
|
||||||
- **Your employees do not have Azure Active Directory (AD) accounts** - Azure AD accounts are required for employees that install apps assigned to them from Microsoft Store or that claim apps from a private store.
|
- **Your employees do not have Microsoft Entra accounts** - Microsoft Entra accounts are required for employees that install apps assigned to them from Microsoft Store or that claim apps from a private store.
|
||||||
|
|
||||||
## Distribution options for offline-licensed apps
|
## Distribution options for offline-licensed apps
|
||||||
|
|
||||||
|
@ -67,7 +67,10 @@
|
|||||||
"v-dihans",
|
"v-dihans",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"v-stsavell",
|
"v-stsavell",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"fileMetadata": {},
|
"fileMetadata": {},
|
||||||
|
@ -30,7 +30,7 @@ Welcome to the Microsoft Store for Business and Education! You can use Microsoft
|
|||||||
>
|
>
|
||||||
> - As of April 14, 2021, all apps that charge a base price above free are no longer available to buy in the Microsoft Store for Business and Education. If you've already bought a paid app, you can still use it, but no new purchases are possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you can't buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use from the private store. Apps with a base price of "free" are still available. This change doesn't impact apps in the Microsoft Store on Windows 10.
|
> - As of April 14, 2021, all apps that charge a base price above free are no longer available to buy in the Microsoft Store for Business and Education. If you've already bought a paid app, you can still use it, but no new purchases are possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you can't buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use from the private store. Apps with a base price of "free" are still available. This change doesn't impact apps in the Microsoft Store on Windows 10.
|
||||||
>
|
>
|
||||||
> - Also as of April 14, 2021, you must sign in with your Azure Active Directory (Azure AD) account before you browse Microsoft Store for Business and Education.
|
> - Also as of April 14, 2021, you must sign in with your Microsoft Entra account before you browse Microsoft Store for Business and Education.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
@ -40,5 +40,5 @@ Welcome to the Microsoft Store for Business and Education! You can use Microsoft
|
|||||||
| [Find and acquire apps](find-and-acquire-apps-overview.md) | Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. |
|
| [Find and acquire apps](find-and-acquire-apps-overview.md) | Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization. |
|
||||||
| [Manage apps](manage-apps-microsoft-store-for-business-overview.md) | Manage settings and access to apps in Microsoft Store for Business and Education. |
|
| [Manage apps](manage-apps-microsoft-store-for-business-overview.md) | Manage settings and access to apps in Microsoft Store for Business and Education. |
|
||||||
| [Device Guard signing portal](device-guard-signing-portal.md) | Device Guard signing is a Device Guard feature that is available in the Microsoft Store for Business and Education. It gives admins a single place to sign catalog files and code integrity policies. After admins have created catalog files for unsigned apps and signed the catalog files, they can add the signers to a code integrity policy. You can merge the code integrity policy with your existing policy to include your custom signing certificate. This allows you to trust the catalog files. |
|
| [Device Guard signing portal](device-guard-signing-portal.md) | Device Guard signing is a Device Guard feature that is available in the Microsoft Store for Business and Education. It gives admins a single place to sign catalog files and code integrity policies. After admins have created catalog files for unsigned apps and signed the catalog files, they can add the signers to a code integrity policy. You can merge the code integrity policy with your existing policy to include your custom signing certificate. This allows you to trust the catalog files. |
|
||||||
| [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md) | You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant |
|
| [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md) | You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant |
|
||||||
| [Troubleshoot Microsoft Store for Business and Education](troubleshoot-microsoft-store-for-business.md) | Troubleshooting topics for Microsoft Store for Business and Education. |
|
| [Troubleshoot Microsoft Store for Business and Education](troubleshoot-microsoft-store-for-business.md) | Troubleshooting topics for Microsoft Store for Business and Education. |
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage settings for Microsoft Store for Business and Microsoft Store for Education (Windows 10)
|
title: Manage settings for Microsoft Store for Business and Microsoft Store for Education (Windows 10)
|
||||||
description: You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
description: You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant.
|
||||||
ms.assetid: E3283D77-4DB2-40A9-9479-DDBC33D5A895
|
ms.assetid: E3283D77-4DB2-40A9-9479-DDBC33D5A895
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
@ -25,7 +25,7 @@ ms.date: 05/24/2023
|
|||||||
> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286).
|
> - The retirement of Microsoft Store for Business and Microsoft Store for Education has been postponed. We will update this notice when a new retirement date is announced. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Update to Intune integration with the Microsoft Store on Windows](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/update-to-endpoint-manager-integration-with-the-microsoft-store/ba-p/3585077) and [FAQ: Supporting Microsoft Store experiences on managed devices](https://techcommunity.microsoft.com/t5/windows-management/faq-supporting-microsoft-store-experiences-on-managed-devices/m-p/3585286).
|
||||||
> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed).
|
> - In April 2023 the Microsoft Store for Business tab was removed from Microsoft Store apps on Windows 10 and Windows 11 PCs. An interaction with existing MDM and GPO policies may lead to customers seeing errors when accessing the Microsoft Store app. For more information see [Microsoft Store for Business tab removed](manage-access-to-private-store.md#microsoft-store-for-business-tab-removed).
|
||||||
|
|
||||||
You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
You can add users and groups, as well as update some of the settings associated with the Microsoft Entra tenant.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
@ -34,5 +34,3 @@ You can add users and groups, as well as update some of the settings associated
|
|||||||
| [Update Microsoft Store for Business and Education account settings](update-microsoft-store-for-business-account-settings.md) | **Billing - Account profile** in Microsoft Store for Business shows information about your organization that you can update. Payment options can be managed on **Billing - Payment methods**, and offline license settings can be managed on **Settings - Shop**. |
|
| [Update Microsoft Store for Business and Education account settings](update-microsoft-store-for-business-account-settings.md) | **Billing - Account profile** in Microsoft Store for Business shows information about your organization that you can update. Payment options can be managed on **Billing - Payment methods**, and offline license settings can be managed on **Settings - Shop**. |
|
||||||
| [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md) | Microsoft Store for Business manages permissions with a set of roles. You can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md) and to groups.|
|
| [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md) | Microsoft Store for Business manages permissions with a set of roles. You can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md) and to groups.|
|
||||||
| [Understand your invoice](billing-understand-your-invoice-msfb.md) | Information on invoices for products and services bought under the Microsoft Customer Agreement.|
|
| [Understand your invoice](billing-understand-your-invoice-msfb.md) | Information on invoices for products and services bought under the Microsoft Customer Agreement.|
|
||||||
|
|
||||||
|
|
||||||
|
@ -27,21 +27,25 @@ ms.date: 05/24/2023
|
|||||||
|
|
||||||
Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups.
|
Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups.
|
||||||
|
|
||||||
## Why Azure AD accounts?
|
<a name='why-azure-ad-accounts'></a>
|
||||||
|
|
||||||
|
## Why Microsoft Entra accounts?
|
||||||
For organizations planning to use the private store feature with Store for Business, we recommend that you also configure cloud domain join. This provides a seamless integration between the identity your admin and employees will use to sign in to Windows and Microsoft Store for Business.
|
For organizations planning to use the private store feature with Store for Business, we recommend that you also configure cloud domain join. This provides a seamless integration between the identity your admin and employees will use to sign in to Windows and Microsoft Store for Business.
|
||||||
|
|
||||||
Azure AD is an Azure service that provides identity and access management capabilities using the cloud. It is primarily designed to provide this service for cloud- or web-based applications that need to access your local Active Directory information. Azure AD identity and access management includes:
|
Microsoft Entra ID is an Azure service that provides identity and access management capabilities using the cloud. It is primarily designed to provide this service for cloud- or web-based applications that need to access your local Active Directory information. Microsoft Entra identity and access management includes:
|
||||||
|
|
||||||
- Single sign-on to any cloud and on-premises web app.
|
- Single sign-on to any cloud and on-premises web app.
|
||||||
- Works with multiple platforms and devices.
|
- Works with multiple platforms and devices.
|
||||||
- Integrate with on-premises Active Directory.
|
- Integrate with on-premises Active Directory.
|
||||||
|
|
||||||
For more information on Azure AD, see [About Office 365 and Azure Active Directory](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
For more information on Microsoft Entra ID, see [About Office 365 and Microsoft Entra ID](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
||||||
|
|
||||||
## Add user accounts to your Azure AD directory
|
<a name='add-user-accounts-to-your-azure-ad-directory'></a>
|
||||||
If you created a new Azure AD directory when you signed up for Store for Business, you'll have a directory set up with one user account - the global administrator. That global administrator can add user accounts to your Azure AD directory. However, adding user accounts to your Azure AD directory will not give those employees access to Store for Business. You'll need to assign Store for Business roles to your employees. For more information, see [Roles and permissions in the Store for Business.](roles-and-permissions-microsoft-store-for-business.md)
|
|
||||||
|
|
||||||
You can use the [Office 365 admin dashboard](https://portal.office.com/adminportal) or [Azure management portal](https://portal.azure.com/) to add user accounts to your Azure AD directory. If you'll be using Azure management portal, you'll need an active subscription to [Azure management portal](https://go.microsoft.com/fwlink/p/?LinkId=708617).
|
## Add user accounts to your Microsoft Entra directory
|
||||||
|
If you created a new Microsoft Entra directory when you signed up for Store for Business, you'll have a directory set up with one user account - the global administrator. That global administrator can add user accounts to your Microsoft Entra directory. However, adding user accounts to your Microsoft Entra directory will not give those employees access to Store for Business. You'll need to assign Store for Business roles to your employees. For more information, see [Roles and permissions in the Store for Business.](roles-and-permissions-microsoft-store-for-business.md)
|
||||||
|
|
||||||
|
You can use the [Office 365 admin dashboard](https://portal.office.com/adminportal) or [Azure management portal](https://portal.azure.com/) to add user accounts to your Microsoft Entra directory. If you'll be using Azure management portal, you'll need an active subscription to [Azure management portal](https://go.microsoft.com/fwlink/p/?LinkId=708617).
|
||||||
|
|
||||||
For more information, see:
|
For more information, see:
|
||||||
- [Add user accounts using Office 365 admin dashboard](/microsoft-365/admin/add-users)
|
- [Add user accounts using Office 365 admin dashboard](/microsoft-365/admin/add-users)
|
||||||
|
@ -36,7 +36,7 @@ You can use the PowerShell module to:
|
|||||||
- Perform bulk operations with .csv files - automates license management for customers with larger numbers of licenses
|
- Perform bulk operations with .csv files - automates license management for customers with larger numbers of licenses
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Assigning apps to groups is not supported via this module. Instead, we recommend leveraging the Azure Active Directory Or MSOnline Modules to save members of a group to a CSV file and follow instructions below on how to use CSV file to manage assignments.
|
>Assigning apps to groups is not supported via this module. Instead, we recommend leveraging the Microsoft Entra ID Or MSOnline Modules to save members of a group to a CSV file and follow instructions below on how to use CSV file to manage assignments.
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
To use the Microsoft Store for Business and Education PowerShell module, you'll need:
|
To use the Microsoft Store for Business and Education PowerShell module, you'll need:
|
||||||
|
@ -36,7 +36,7 @@ Designed for organizations, Microsoft Store for Business and Microsoft Store for
|
|||||||
## Features
|
## Features
|
||||||
Organizations or schools of any size can benefit from using Microsoft Store for Business or Microsoft Store for Education:
|
Organizations or schools of any size can benefit from using Microsoft Store for Business or Microsoft Store for Education:
|
||||||
|
|
||||||
- **Scales to fit the size of your business** - For smaller businesses, with Azure AD accounts or Office 365 accounts and Windows 10 devices, you can quickly have an end-to-end process for acquiring and distributing content using the Store for Business. For larger businesses, all the capabilities of the Store for Business are available to you, or you can integrate Microsoft Store for Business with management tools, for greater control over access to apps and app updates. You can use existing work or school accounts.
|
- **Scales to fit the size of your business** - For smaller businesses, with Microsoft Entra accounts or Office 365 accounts and Windows 10 devices, you can quickly have an end-to-end process for acquiring and distributing content using the Store for Business. For larger businesses, all the capabilities of the Store for Business are available to you, or you can integrate Microsoft Store for Business with management tools, for greater control over access to apps and app updates. You can use existing work or school accounts.
|
||||||
- **Bulk app acquisition** - Acquire apps in volume from Microsoft Store for Business.
|
- **Bulk app acquisition** - Acquire apps in volume from Microsoft Store for Business.
|
||||||
- **Centralized management** – Microsoft Store provides centralized management for inventory, billing, permissions, and order history. You can use Microsoft Store to view, manage and distribute items purchased from:
|
- **Centralized management** – Microsoft Store provides centralized management for inventory, billing, permissions, and order history. You can use Microsoft Store to view, manage and distribute items purchased from:
|
||||||
- **Microsoft Store for Business** – Apps acquired from Microsoft Store for Business
|
- **Microsoft Store for Business** – Apps acquired from Microsoft Store for Business
|
||||||
@ -63,21 +63,21 @@ You'll need this software to work with Store for Business and Education.
|
|||||||
- Admins working with Store for Business and Education need a browser compatible with Microsoft Store running on a PC or mobile device. Supported browsers include: Internet Explorer 10 or later, or current versions of Microsoft Edge, Chrome or Firefox. JavaScript must be supported and enabled.
|
- Admins working with Store for Business and Education need a browser compatible with Microsoft Store running on a PC or mobile device. Supported browsers include: Internet Explorer 10 or later, or current versions of Microsoft Edge, Chrome or Firefox. JavaScript must be supported and enabled.
|
||||||
- Employees using apps from Store for Business and Education need at least Windows 10, version 1511 running on a PC or mobile device.
|
- Employees using apps from Store for Business and Education need at least Windows 10, version 1511 running on a PC or mobile device.
|
||||||
|
|
||||||
Microsoft Azure Active Directory (AD) accounts for your employees:
|
Microsoft Entra accounts for your employees:
|
||||||
|
|
||||||
- Admins need Azure AD accounts to sign up for Store for Business and Education, and then to sign in, get apps, distribute apps, and manage app licenses. You can sign up for Azure AD accounts as part of signing up for Store for Business and Education.
|
- Admins need Microsoft Entra accounts to sign up for Store for Business and Education, and then to sign in, get apps, distribute apps, and manage app licenses. You can sign up for Microsoft Entra accounts as part of signing up for Store for Business and Education.
|
||||||
- Employees need Azure AD account when they access Store for Business content from Windows devices.
|
- Employees need Microsoft Entra account when they access Store for Business content from Windows devices.
|
||||||
- If you use a management tool to distribute and manage online-licensed apps, all employees will need an Azure AD account
|
- If you use a management tool to distribute and manage online-licensed apps, all employees will need a Microsoft Entra account
|
||||||
- For offline-licensed apps, Azure AD accounts are not required for employees.
|
- For offline-licensed apps, Microsoft Entra accounts are not required for employees.
|
||||||
- Admins can add or remove user accounts in the Microsoft 365 admin center, even if you don't have an Office 365 subscription. You can access the Office 365 admin portal directly from the Store for Business and Education.
|
- Admins can add or remove user accounts in the Microsoft 365 admin center, even if you don't have an Office 365 subscription. You can access the Office 365 admin portal directly from the Store for Business and Education.
|
||||||
|
|
||||||
For more information on Azure AD, see [About Office 365 and Azure Active Directory](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
For more information on Microsoft Entra ID, see [About Office 365 and Microsoft Entra ID](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
||||||
|
|
||||||
### Optional
|
### Optional
|
||||||
|
|
||||||
While not required, you can use a management tool to distribute and manage apps. Using a management tool allows you to distribute content, scope app availability, and control when app updates are installed. This might make sense for larger organizations that already use a management tool. A couple of things to note about management tools:
|
While not required, you can use a management tool to distribute and manage apps. Using a management tool allows you to distribute content, scope app availability, and control when app updates are installed. This might make sense for larger organizations that already use a management tool. A couple of things to note about management tools:
|
||||||
|
|
||||||
- Need to integrate with Windows 10 management framework and Azure AD.
|
- Need to integrate with Windows 10 management framework and Microsoft Entra ID.
|
||||||
- Need to sync with the Store for Business inventory to distribute apps.
|
- Need to sync with the Store for Business inventory to distribute apps.
|
||||||
|
|
||||||
## How does the Store for Business and Education work?
|
## How does the Store for Business and Education work?
|
||||||
@ -88,7 +88,7 @@ The first step for getting your organization started with Store for Business and
|
|||||||
|
|
||||||
## Set up
|
## Set up
|
||||||
|
|
||||||
After your admin signs up for the Store for Business and Education, they can assign roles to other employees in your company or school. The admin needs Azure AD User Admin permissions to assign Microsoft Store for Business and Education roles. These are the roles and their permissions.
|
After your admin signs up for the Store for Business and Education, they can assign roles to other employees in your company or school. The admin needs Microsoft Entra user Admin permissions to assign Microsoft Store for Business and Education roles. These are the roles and their permissions.
|
||||||
|
|
||||||
| Permission | Account settings | Acquire apps | Distribute apps | Device Guard signing |
|
| Permission | Account settings | Acquire apps | Distribute apps | Device Guard signing |
|
||||||
| ---------- | ---------------- | ------------ | --------------- | -------------------- |
|
| ---------- | ---------------- | ------------ | --------------- | -------------------- |
|
||||||
@ -100,7 +100,7 @@ After your admin signs up for the Store for Business and Education, they can ass
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Currently, the Basic purchaser role is only available for schools using Microsoft Store for Education. For more information, see [Microsoft Store for Education permissions](/education/windows/education-scenarios-store-for-business?toc=%2fmicrosoft-store%2feducation%2ftoc.json#manage-domain-settings).
|
> Currently, the Basic purchaser role is only available for schools using Microsoft Store for Education. For more information, see [Microsoft Store for Education permissions](/education/windows/education-scenarios-store-for-business?toc=%2fmicrosoft-store%2feducation%2ftoc.json#manage-domain-settings).
|
||||||
|
|
||||||
In some cases, admins will need to add Azure Active Directory (AD) accounts for their employees. For more information, see [Manage user accounts and groups](manage-users-and-groups-microsoft-store-for-business.md).
|
In some cases, admins will need to add Microsoft Entra accounts for their employees. For more information, see [Manage user accounts and groups](manage-users-and-groups-microsoft-store-for-business.md).
|
||||||
|
|
||||||
Also, if your organization plans to use a management tool, you'll need to configure your management tool to sync with Store for Business and Education.
|
Also, if your organization plans to use a management tool, you'll need to configure your management tool to sync with Store for Business and Education.
|
||||||
|
|
||||||
@ -130,7 +130,7 @@ App distribution is handled through two channels, either through the Microsoft S
|
|||||||
**Distribute with Store for Business and Education**:
|
**Distribute with Store for Business and Education**:
|
||||||
- Email link – After purchasing an app, Admins can send employees a link in an email message. Employees can click the link to install the app.
|
- Email link – After purchasing an app, Admins can send employees a link in an email message. Employees can click the link to install the app.
|
||||||
- Curate private store for all employees – A private store can include content you've purchased from Microsoft Store for Business, and your line-of-business apps that you've submitted to Microsoft Store for Business. Apps in your private store are available to all of your employees. They can browse the private store and install apps when needed.
|
- Curate private store for all employees – A private store can include content you've purchased from Microsoft Store for Business, and your line-of-business apps that you've submitted to Microsoft Store for Business. Apps in your private store are available to all of your employees. They can browse the private store and install apps when needed.
|
||||||
- To use the options above users must be signed in with an Azure AD account on a Windows 10 device. Licenses are assigned as individuals install apps.
|
- To use the options above users must be signed in with a Microsoft Entra account on a Windows 10 device. Licenses are assigned as individuals install apps.
|
||||||
|
|
||||||
**Using a management tool** – For larger organizations that want a greater level of control over how apps are distributed and managed, a management tools provides other distribution options:
|
**Using a management tool** – For larger organizations that want a greater level of control over how apps are distributed and managed, a management tools provides other distribution options:
|
||||||
- Scoped content distribution – Ability to scope content distribution to specific groups of employees.
|
- Scoped content distribution – Ability to scope content distribution to specific groups of employees.
|
||||||
@ -366,7 +366,7 @@ This table summarize what customers can purchase, depending on which Microsoft S
|
|||||||
|
|
||||||
## Privacy notice
|
## Privacy notice
|
||||||
|
|
||||||
Store for Business and Education services get names and email addresses of people in your organization from Azure Active Directory. This information is needed for these admin functions:
|
Store for Business and Education services get names and email addresses of people in your organization from Microsoft Entra ID. This information is needed for these admin functions:
|
||||||
- Granting and managing permissions
|
- Granting and managing permissions
|
||||||
- Managing app licenses
|
- Managing app licenses
|
||||||
- Distributing apps to people (names appear in a list that admins can select from)
|
- Distributing apps to people (names appear in a list that admins can select from)
|
||||||
|
@ -32,7 +32,7 @@ Microsoft Store for Business and Microsoft Store for Education use a set of noti
|
|||||||
|
|
||||||
| Store area | Notification message | Customer impact |
|
| Store area | Notification message | Customer impact |
|
||||||
| ---------- | -------------------- | --------------- |
|
| ---------- | -------------------- | --------------- |
|
||||||
| General | We're on it. Something happened on our end with the Store. Waiting a bit might help. | You might be unable to sign in. There might be an intermittent Azure AD outage. |
|
| General | We're on it. Something happened on our end with the Store. Waiting a bit might help. | You might be unable to sign in. There might be an intermittent Microsoft Entra outage. |
|
||||||
| Manage | We're on it. Something happened on our end with management for apps and software. We're working to fix the problem. | You might be unable to manage inventory, including viewing inventory, distributing apps, assigning licenses, or viewing and managing order history. |
|
| Manage | We're on it. Something happened on our end with management for apps and software. We're working to fix the problem. | You might be unable to manage inventory, including viewing inventory, distributing apps, assigning licenses, or viewing and managing order history. |
|
||||||
| Shop | We're on it. Something happened on our end with purchasing. We're working to fix the problem. | Shop might not be available. You might not be able to purchase new, or additional licenses. |
|
| Shop | We're on it. Something happened on our end with purchasing. We're working to fix the problem. | Shop might not be available. You might not be able to purchase new, or additional licenses. |
|
||||||
| Private store | We're on it. Something happened on our end with your organization's private store. People in your organization can't download apps right now. We're working to fix the problem. | People in your organization might not be able to view the private store, or get apps. |
|
| Private store | We're on it. Something happened on our end with your organization's private store. People in your organization can't download apps right now. We're working to fix the problem. | People in your organization might not be able to view the private store, or get apps. |
|
||||||
|
@ -42,18 +42,18 @@ You'll need this software to work with Microsoft Store for Business or Education
|
|||||||
- IT Pros that are administering Microsoft Store for Business and Education need a browser compatible with Microsoft Store for Business and Education running on a PC or mobile device. Supported browsers include: Internet Explorer 10 or later, Microsoft Edge, or current versions of Chrome or Firefox. Javascript needs to be supported and enabled.
|
- IT Pros that are administering Microsoft Store for Business and Education need a browser compatible with Microsoft Store for Business and Education running on a PC or mobile device. Supported browsers include: Internet Explorer 10 or later, Microsoft Edge, or current versions of Chrome or Firefox. Javascript needs to be supported and enabled.
|
||||||
- Employees using apps from Microsoft Store for Business and Education need at least Windows 10, version 1511 running on a PC or mobile device.
|
- Employees using apps from Microsoft Store for Business and Education need at least Windows 10, version 1511 running on a PC or mobile device.
|
||||||
|
|
||||||
Microsoft Azure Active Directory (AD) or Office 365 accounts for your employees:
|
Microsoft Entra ID or Office 365 accounts for your employees:
|
||||||
- IT Pros need Azure AD or Office 365 accounts to sign up for Microsoft Store for Business and Education, and then to sign in, get apps, distribute apps, and manage app licenses.
|
- IT Pros need Microsoft Entra ID or Office 365 accounts to sign up for Microsoft Store for Business and Education, and then to sign in, get apps, distribute apps, and manage app licenses.
|
||||||
- Employees need Azure AD accounts when they access Microsoft Store for Business or Education content from Windows-based devices.
|
- Employees need Microsoft Entra accounts when they access Microsoft Store for Business or Education content from Windows-based devices.
|
||||||
- If you use a management tool to distribute and manage online-licensed apps, all employees will need an Azure AD account.
|
- If you use a management tool to distribute and manage online-licensed apps, all employees will need a Microsoft Entra account.
|
||||||
|
|
||||||
For more information on Azure AD, see [About Office 365 and Azure Active Directory](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
For more information on Microsoft Entra ID, see [About Office 365 and Microsoft Entra ID](/previous-versions//dn509517(v=technet.10)), and [Intro to Azure: identity and access](https://go.microsoft.com/fwlink/p/?LinkId=708611).
|
||||||
|
|
||||||
### Optional
|
### Optional
|
||||||
|
|
||||||
While not required, you can use a management tool to distribute and manage apps. Using a management tool allows you to distribute content, scope app availability, and control when app updates are installed. This might make sense for larger organizations that already use a management tool. If you're considering using management tools, check with the management tool vendor to see if they support Microsoft Store for Business and Education. The management tool will need to:
|
While not required, you can use a management tool to distribute and manage apps. Using a management tool allows you to distribute content, scope app availability, and control when app updates are installed. This might make sense for larger organizations that already use a management tool. If you're considering using management tools, check with the management tool vendor to see if they support Microsoft Store for Business and Education. The management tool will need to:
|
||||||
|
|
||||||
- Integrate with the Windows 10 management framework and Azure AD.
|
- Integrate with the Windows 10 management framework and Microsoft Entra ID.
|
||||||
- Sync with Microsoft Store for Business and Education inventory to distribute apps.
|
- Sync with Microsoft Store for Business and Education inventory to distribute apps.
|
||||||
|
|
||||||
## Proxy configuration
|
## Proxy configuration
|
||||||
@ -73,4 +73,3 @@ If your organization restricts computers on your network from connecting to the
|
|||||||
starting with Windows 10, version 1607)
|
starting with Windows 10, version 1607)
|
||||||
|
|
||||||
Store for Business requires Microsoft Windows HTTP Services (WinHTTP) to install, or update apps.
|
Store for Business requires Microsoft Windows HTTP Services (WinHTTP) to install, or update apps.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Roles and permissions in Microsoft Store for Business and Education (Windows 10)
|
title: Roles and permissions in Microsoft Store for Business and Education (Windows 10)
|
||||||
description: The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
description: The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Microsoft Entra tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
||||||
keywords: roles, permissions
|
keywords: roles, permissions
|
||||||
ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE
|
ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
@ -29,9 +29,9 @@ ms.date: 05/24/2023
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> As of April 14th, 2021, only free apps are available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Microsoft Entra tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
||||||
|
|
||||||
Microsoft Store for Business and Education has a set of roles that help admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access the Store. Global Administrators and global user accounts that are used with other Microsoft services, such as Azure, or Office 365 can sign in to Microsoft Store. Global user accounts have some permissions in Microsoft Store, and Microsoft Store has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store.
|
Microsoft Store for Business and Education has a set of roles that help admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Microsoft Entra account to access the Store. Global Administrators and global user accounts that are used with other Microsoft services, such as Azure, or Office 365 can sign in to Microsoft Store. Global user accounts have some permissions in Microsoft Store, and Microsoft Store has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store.
|
||||||
|
|
||||||
## Global user account permissions in Microsoft Store
|
## Global user account permissions in Microsoft Store
|
||||||
|
|
||||||
@ -49,7 +49,7 @@ This table lists the global user accounts and the permissions they have in Micro
|
|||||||
|
|
||||||
## Microsoft Store roles and permissions
|
## Microsoft Store roles and permissions
|
||||||
|
|
||||||
Microsoft Store for Business has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access Microsoft Store.
|
Microsoft Store for Business has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Microsoft Entra account to access Microsoft Store.
|
||||||
|
|
||||||
This table lists the roles and their permissions.
|
This table lists the roles and their permissions.
|
||||||
|
|
||||||
@ -100,4 +100,4 @@ These permissions allow people to:
|
|||||||
|
|
||||||
<!---  -->
|
<!---  -->
|
||||||
|
|
||||||
4. If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md).
|
4. If you don't find the name you want, you might need to add people to your Microsoft Entra directory. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md).
|
||||||
|
@ -32,7 +32,7 @@ The Microsoft Store for Business and Education has a group of settings that admi
|
|||||||
| Allow users to shop | Configure whether or not people in your organization or school can see and use the shop function in Store for Business or Store for Education. For more information, see [Allow users to shop](acquire-apps-microsoft-store-for-business.md#allow-users-to-shop). | **Settings - Shop** |
|
| Allow users to shop | Configure whether or not people in your organization or school can see and use the shop function in Store for Business or Store for Education. For more information, see [Allow users to shop](acquire-apps-microsoft-store-for-business.md#allow-users-to-shop). | **Settings - Shop** |
|
||||||
| Make everyone a Basic Purchaser | Allow everyone in your organization to automatically become a Basic Purchaser. This allows them to purchase apps and manage them. For more information, see [Make everyone a Basic Purchaser](/education/windows/education-scenarios-store-for-business#basic-purchaser-role). | **Settings - Shop** |
|
| Make everyone a Basic Purchaser | Allow everyone in your organization to automatically become a Basic Purchaser. This allows them to purchase apps and manage them. For more information, see [Make everyone a Basic Purchaser](/education/windows/education-scenarios-store-for-business#basic-purchaser-role). | **Settings - Shop** |
|
||||||
| App request | Configure whether or not people in your organization can request apps for admins to purchase. For more information, see [Distribute offline apps](acquire-apps-microsoft-store-for-business.md). | **Settings - Shop** |
|
| App request | Configure whether or not people in your organization can request apps for admins to purchase. For more information, see [Distribute offline apps](acquire-apps-microsoft-store-for-business.md). | **Settings - Shop** |
|
||||||
| Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md). | **Settings - Distribute** |
|
| Management tools | Management tools that are synced with Microsoft Entra ID are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md). | **Settings - Distribute** |
|
||||||
| Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Settings - Devices** |
|
| Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Settings - Devices** |
|
||||||
| Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md). | **Permissions - Roles**, **Permissions - Purchasing roles**, and **Permissions - Blocked basic purchasers** |
|
| Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md). | **Permissions - Roles**, **Permissions - Purchasing roles**, and **Permissions - Blocked basic purchasers** |
|
||||||
| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions - Line-of-business apps** |
|
| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions - Line-of-business apps** |
|
||||||
|
@ -36,5 +36,5 @@ IT admins can sign up for Microsoft Store for Business and Education, and get st
|
|||||||
| ----- | ----------- |
|
| ----- | ----------- |
|
||||||
| [Microsoft Store for Business and Education overview](./microsoft-store-for-business-overview.md) | Learn about Microsoft Store for Business. |
|
| [Microsoft Store for Business and Education overview](./microsoft-store-for-business-overview.md) | Learn about Microsoft Store for Business. |
|
||||||
| [Prerequisites for Microsoft Store for Business and Education](./prerequisites-microsoft-store-for-business.md) | There are a few prerequisites for using [Microsoft Store for Business and Education.](/microsoft-store/prerequisites-microsoft-store-for-business) |
|
| [Prerequisites for Microsoft Store for Business and Education](./prerequisites-microsoft-store-for-business.md) | There are a few prerequisites for using [Microsoft Store for Business and Education.](/microsoft-store/prerequisites-microsoft-store-for-business) |
|
||||||
| [Roles and permissions in Microsoft Store for Business and Education](./roles-and-permissions-microsoft-store-for-business.md)| The first person to sign in to Microsoft Store for Business and Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. |
|
| [Roles and permissions in Microsoft Store for Business and Education](./roles-and-permissions-microsoft-store-for-business.md)| The first person to sign in to Microsoft Store for Business and Education must be a Global Admin of the Microsoft Entra tenant. Once the Global Admin has signed in, they can give permissions to others employees. |
|
||||||
| [Settings reference: Microsoft Store for Business and Education](./settings-reference-microsoft-store-for-business.md) | Microsoft Store for Business and Education has a group of settings that admins use to manage the store. |
|
| [Settings reference: Microsoft Store for Business and Education](./settings-reference-microsoft-store-for-business.md) | Microsoft Store for Business and Education has a group of settings that admins use to manage the store. |
|
||||||
|
@ -37,7 +37,7 @@ Before purchasing apps that have a fee, you need to add or update your organizat
|
|||||||
|
|
||||||
We use the Business address to calculate sales tax. If your organization's address has already been entered for other commercial purchases through Microsoft Store, or through other online purchases such as Office 365 or Azure subscriptions, then we'll use the same address in Microsoft Store for Business and Microsoft Store for Education. If we don't have an address, we'll ask you to enter it during your first purchase.
|
We use the Business address to calculate sales tax. If your organization's address has already been entered for other commercial purchases through Microsoft Store, or through other online purchases such as Office 365 or Azure subscriptions, then we'll use the same address in Microsoft Store for Business and Microsoft Store for Education. If we don't have an address, we'll ask you to enter it during your first purchase.
|
||||||
|
|
||||||
We need an email address in case we need to contact you about your Microsoft Store for Business and for Education account. This email account should reach the admin for your organization's Office 365 or Azure AD tenant that is used with Microsoft Store.
|
We need an email address in case we need to contact you about your Microsoft Store for Business and for Education account. This email account should reach the admin for your organization's Office 365 or Microsoft Entra tenant that is used with Microsoft Store.
|
||||||
|
|
||||||
**To update billing account information**
|
**To update billing account information**
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com)
|
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com)
|
||||||
|
@ -60,7 +60,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
],
|
],
|
||||||
"searchScope": ["Windows 10"]
|
"searchScope": ["Windows 10"]
|
||||||
},
|
},
|
||||||
|
@ -143,7 +143,7 @@
|
|||||||
href: cortana-at-work/set-up-and-test-cortana-in-windows-10.md
|
href: cortana-at-work/set-up-and-test-cortana-in-windows-10.md
|
||||||
- name: Cortana at work testing scenarios
|
- name: Cortana at work testing scenarios
|
||||||
href: cortana-at-work/cortana-at-work-testing-scenarios.md
|
href: cortana-at-work/cortana-at-work-testing-scenarios.md
|
||||||
- name: Test scenario 1 - Sign into Azure AD, enable the wake word, and try a voice query
|
- name: Test scenario 1 - Sign into Microsoft Entra ID, enable the wake word, and try a voice query
|
||||||
href: cortana-at-work/cortana-at-work-scenario-1.md
|
href: cortana-at-work/cortana-at-work-scenario-1.md
|
||||||
- name: Test scenario 2 - Run a Bing search with Cortana
|
- name: Test scenario 2 - Run a Bing search with Cortana
|
||||||
href: cortana-at-work/cortana-at-work-scenario-2.md
|
href: cortana-at-work/cortana-at-work-scenario-2.md
|
||||||
@ -163,7 +163,7 @@
|
|||||||
href: cortana-at-work/cortana-at-work-o365.md
|
href: cortana-at-work/cortana-at-work-o365.md
|
||||||
- name: Testing scenarios using Cortana in your business or organization
|
- name: Testing scenarios using Cortana in your business or organization
|
||||||
href: cortana-at-work/testing-scenarios-using-cortana-in-business-org.md
|
href: cortana-at-work/testing-scenarios-using-cortana-in-business-org.md
|
||||||
- name: Test scenario 1 - Sign into Azure AD, enable the wake word, and try a voice query
|
- name: Test scenario 1 - Sign into Microsoft Entra ID, enable the wake word, and try a voice query
|
||||||
href: cortana-at-work/test-scenario-1.md
|
href: cortana-at-work/test-scenario-1.md
|
||||||
- name: Test scenario 2 - Run a quick search with Cortana at work
|
- name: Test scenario 2 - Run a quick search with Cortana at work
|
||||||
href: cortana-at-work/test-scenario-2.md
|
href: cortana-at-work/test-scenario-2.md
|
||||||
|
@ -29,7 +29,7 @@ Your employees can use Cortana to help manage their day and be more productive b
|
|||||||
### Before you begin
|
### Before you begin
|
||||||
There are a few things to be aware of before you start using Cortana in Windows 10, versions 1909 and earlier.
|
There are a few things to be aware of before you start using Cortana in Windows 10, versions 1909 and earlier.
|
||||||
|
|
||||||
- **Azure Active Directory (Azure AD) account.** Before your employees can use Cortana in your org, they must be logged in using their Azure AD account through Cortana's notebook. They must also authorize Cortana to access Microsoft 365 on their behalf.
|
- **Microsoft Entra account.** Before your employees can use Cortana in your org, they must be logged in using their Microsoft Entra account through Cortana's notebook. They must also authorize Cortana to access Microsoft 365 on their behalf.
|
||||||
|
|
||||||
- **Office 365 Trust Center.** Cortana in Windows 10, version 1909 and earlier, isn't a service governed by the [Online Services Terms](https://www.microsoft.com/en-us/licensing/product-licensing/products). [Learn more about how Cortana in Windows 10, versions 1909 and earlier, treats your data](https://support.microsoft.com/en-us/help/4468233/cortana-and-privacy-microsoft-privacy).
|
- **Office 365 Trust Center.** Cortana in Windows 10, version 1909 and earlier, isn't a service governed by the [Online Services Terms](https://www.microsoft.com/en-us/licensing/product-licensing/products). [Learn more about how Cortana in Windows 10, versions 1909 and earlier, treats your data](https://support.microsoft.com/en-us/help/4468233/cortana-and-privacy-microsoft-privacy).
|
||||||
|
|
||||||
|
@ -38,15 +38,17 @@ Cortana requires a PC running Windows 10, version 1703 or later, and the followi
|
|||||||
| Software | Minimum version |
|
| Software | Minimum version |
|
||||||
|---------|---------|
|
|---------|---------|
|
||||||
|Client operating system | - Windows 10, version 2004 (recommended) <br> <br> - Windows 10, version 1703 (legacy version of Cortana) <br> <br> For more information on the differences between Cortana in Windows 10, version 2004 and earlier versions, see [**How is my data processed by Cortana**](#how-is-my-data-processed-by-cortana) below. |
|
|Client operating system | - Windows 10, version 2004 (recommended) <br> <br> - Windows 10, version 1703 (legacy version of Cortana) <br> <br> For more information on the differences between Cortana in Windows 10, version 2004 and earlier versions, see [**How is my data processed by Cortana**](#how-is-my-data-processed-by-cortana) below. |
|
||||||
|Azure Active Directory (Azure AD) | While all employees signing into Cortana need an Azure AD account, an Azure AD premium tenant isn't required. |
|
|Microsoft Entra ID | While all employees signing into Cortana need a Microsoft Entra account, a Microsoft Entra ID P1 or P2 tenant isn't required. |
|
||||||
|Additional policies (Group Policy and Mobile Device Management (MDM)) |There's a rich set of policies that can be used to manage various aspects of Cortana. Most of these policies will limit the abilities of Cortana but won't turn off Cortana. For example, if you turn **Speech** off, your employees won't be able to use the wake word ("Cortana") for hands-free activation or voice commands to easily ask for help. |
|
|Additional policies (Group Policy and Mobile Device Management (MDM)) |There's a rich set of policies that can be used to manage various aspects of Cortana. Most of these policies will limit the abilities of Cortana but won't turn off Cortana. For example, if you turn **Speech** off, your employees won't be able to use the wake word ("Cortana") for hands-free activation or voice commands to easily ask for help. |
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For Windows 11, Cortana is no longer pinned to the taskbar by default. You can still pin the Cortana app to the taskbar as you would any other app. In addition, the keyboard shortcut that launched Cortana (Win+C) no longer opens Cortana.
|
>For Windows 11, Cortana is no longer pinned to the taskbar by default. You can still pin the Cortana app to the taskbar as you would any other app. In addition, the keyboard shortcut that launched Cortana (Win+C) no longer opens Cortana.
|
||||||
|
|
||||||
## Signing in using Azure AD
|
<a name='signing-in-using-azure-ad'></a>
|
||||||
|
|
||||||
Your organization must have an Azure AD tenant and your employees' devices must all be Azure AD-joined for the best Cortana experience. (Users may also sign into Cortana with a Microsoft account, but won't be able to use their enterprise email or calendar.) For info about what an Azure AD tenant is, how to get your devices joined, and other Azure AD maintenance info, see [Azure Active Directory documentation.](/azure/active-directory/)
|
## Signing in using Microsoft Entra ID
|
||||||
|
|
||||||
|
Your organization must have a Microsoft Entra tenant and your employees' devices must all be Microsoft Entra joined for the best Cortana experience. (Users may also sign into Cortana with a Microsoft account, but won't be able to use their enterprise email or calendar.) For info about what a Microsoft Entra tenant is, how to get your devices joined, and other Microsoft Entra maintenance info, see [Microsoft Entra documentation.](/azure/active-directory/)
|
||||||
|
|
||||||
## How is my data processed by Cortana?
|
## How is my data processed by Cortana?
|
||||||
|
|
||||||
@ -54,7 +56,7 @@ Cortana's approach to integration with Microsoft 365 has changed with Windows 10
|
|||||||
|
|
||||||
### Cortana in Windows 10, version 2004 and later, or Windows 11
|
### Cortana in Windows 10, version 2004 and later, or Windows 11
|
||||||
|
|
||||||
Cortana enterprise services that can be accessed using Azure AD through Cortana meet the same enterprise-level privacy, security, and compliance promises as reflected in the [Online Services Terms (OST)](https://www.microsoft.com/en-us/licensing/product-licensing/products). To learn more, see [Cortana in Microsoft 365](/microsoft-365/admin/misc/cortana-integration?view=o365-worldwide#what-data-is-processed-by-cortana-in-office-365&preserve-view=true).
|
Cortana enterprise services that can be accessed using Microsoft Entra ID through Cortana meet the same enterprise-level privacy, security, and compliance promises as reflected in the [Online Services Terms (OST)](https://www.microsoft.com/en-us/licensing/product-licensing/products). To learn more, see [Cortana in Microsoft 365](/microsoft-365/admin/misc/cortana-integration?view=o365-worldwide#what-data-is-processed-by-cortana-in-office-365&preserve-view=true).
|
||||||
|
|
||||||
#### How does Microsoft store, retain, process, and use Customer Data in Cortana?
|
#### How does Microsoft store, retain, process, and use Customer Data in Cortana?
|
||||||
|
|
||||||
|
@ -72,7 +72,7 @@ For specific info about how to set, manage, and use each of these MDM policies t
|
|||||||
- **AllowMicrosoftAccountConnection**
|
- **AllowMicrosoftAccountConnection**
|
||||||
- **Group policy**: None
|
- **Group policy**: None
|
||||||
- **MDM policy CSP**: [Accounts/AllowMicrosoftAccountConnection](/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection)
|
- **MDM policy CSP**: [Accounts/AllowMicrosoftAccountConnection](/windows/client-management/mdm/policy-csp-accounts#accounts-allowmicrosoftaccountconnection)
|
||||||
- **Description**: Specifies whether to allow users to sign in using a Microsoft account (MSA) from Windows apps. If you only want to allow users to sign in with their Azure AD account, then disable this setting.
|
- **Description**: Specifies whether to allow users to sign in using a Microsoft account (MSA) from Windows apps. If you only want to allow users to sign in with their Microsoft Entra account, then disable this setting.
|
||||||
|
|
||||||
- **Allow search and Cortana to use location**
|
- **Allow search and Cortana to use location**
|
||||||
- **Group policy**: `Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location`
|
- **Group policy**: `Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location`
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Sign into Azure AD, enable the wake word, and try a voice query
|
title: Sign into Microsoft Entra ID, enable the wake word, and try a voice query
|
||||||
description: A test scenario walking you through signing in and managing the notebook.
|
description: A test scenario walking you through signing in and managing the notebook.
|
||||||
ms.prod: windows-client
|
ms.prod: windows-client
|
||||||
ms.collection: tier3
|
ms.collection: tier3
|
||||||
@ -13,14 +13,14 @@ ms.date: 12/31/2017
|
|||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
# Test scenario 1 – Sign into Azure AD, enable the wake word, and try a voice query
|
# Test scenario 1 – Sign into Microsoft Entra ID, enable the wake word, and try a voice query
|
||||||
<!--Using include for Cortana in Windows deprecation -->
|
<!--Using include for Cortana in Windows deprecation -->
|
||||||
[!INCLUDE [Deprecation of Cortana in Windows](./includes/cortana-deprecation.md)]
|
[!INCLUDE [Deprecation of Cortana in Windows](./includes/cortana-deprecation.md)]
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The wake word has been re-enabled in the latest version of Cortana in Windows. If you're on Windows 10, version 2004, be sure that you've updated to build 19041.329 or later to use the wake word with Cortana. For earlier builds, you can still click on the microphone button to use your voice with Cortana.
|
>The wake word has been re-enabled in the latest version of Cortana in Windows. If you're on Windows 10, version 2004, be sure that you've updated to build 19041.329 or later to use the wake word with Cortana. For earlier builds, you can still click on the microphone button to use your voice with Cortana.
|
||||||
|
|
||||||
1. Select the **Cortana** icon in the task bar and sign in using your Azure AD account.
|
1. Select the **Cortana** icon in the task bar and sign in using your Microsoft Entra account.
|
||||||
|
|
||||||
2. Select the "…" menu and select **Talking to Cortana**.
|
2. Select the "…" menu and select **Talking to Cortana**.
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ ms.technology: itpro-configure
|
|||||||
|
|
||||||
We've come up with a list of suggested testing scenarios that you can use to test Cortana in your organization. After you complete all the scenarios, you should be able to:
|
We've come up with a list of suggested testing scenarios that you can use to test Cortana in your organization. After you complete all the scenarios, you should be able to:
|
||||||
|
|
||||||
- [Sign into Azure AD, enable the Cortana wake word, and try a voice query](cortana-at-work-scenario-1.md)
|
- [Sign into Microsoft Entra ID, enable the Cortana wake word, and try a voice query](cortana-at-work-scenario-1.md)
|
||||||
- [Perform a Bing search with Cortana](cortana-at-work-scenario-2.md)
|
- [Perform a Bing search with Cortana](cortana-at-work-scenario-2.md)
|
||||||
- [Set a reminder](cortana-at-work-scenario-3.md)
|
- [Set a reminder](cortana-at-work-scenario-3.md)
|
||||||
- [Use Cortana to find free time on your calendar](cortana-at-work-scenario-4.md)
|
- [Use Cortana to find free time on your calendar](cortana-at-work-scenario-4.md)
|
||||||
|
@ -49,4 +49,4 @@ When a user enters a search query (by speech or text), Cortana evaluates if the
|
|||||||
Bing Answers is enabled by default for all users. However, admins can configure and change this setting for specific users and user groups in their organization.
|
Bing Answers is enabled by default for all users. However, admins can configure and change this setting for specific users and user groups in their organization.
|
||||||
|
|
||||||
## How the Bing Answer policy configuration is applied
|
## How the Bing Answer policy configuration is applied
|
||||||
Before a query is sent to Bing for a search of public results from Bing.com, the Bing Answers service checks with the Office Cloud Policy Service to see if there are any policy configurations that pertain to the user for allowing Bing Answers to respond to questions users ask Cortana. If the user is a member of an Azure Active Directory group that is assigned that policy configuration, then the appropriate policy settings are applied and a check is made again in 10 minutes.
|
Before a query is sent to Bing for a search of public results from Bing.com, the Bing Answers service checks with the Office Cloud Policy Service to see if there are any policy configurations that pertain to the user for allowing Bing Answers to respond to questions users ask Cortana. If the user is a member of a Microsoft Entra group that is assigned that policy configuration, then the appropriate policy settings are applied and a check is made again in 10 minutes.
|
||||||
|
@ -16,11 +16,11 @@ ms.technology: itpro-configure
|
|||||||
<!--Using include for Cortana in Windows deprecation -->
|
<!--Using include for Cortana in Windows deprecation -->
|
||||||
[!INCLUDE [Deprecation of Cortana in Windows](./includes/cortana-deprecation.md)]
|
[!INCLUDE [Deprecation of Cortana in Windows](./includes/cortana-deprecation.md)]
|
||||||
|
|
||||||
This scenario turns on Azure AD and lets your employee use Cortana to manage an entry in the notebook.
|
This scenario turns on Microsoft Entra ID and lets your employee use Cortana to manage an entry in the notebook.
|
||||||
|
|
||||||
## Sign in with your work or school account
|
## Sign in with your work or school account
|
||||||
|
|
||||||
This process helps you to sign out of a Microsoft Account and to sign into an Azure AD account.
|
This process helps you to sign out of a Microsoft Account and to sign into a Microsoft Entra account.
|
||||||
|
|
||||||
1. Click on the **Cortana** icon in the taskbar, then click the profile picture in the navigation to open Cortana settings.
|
1. Click on the **Cortana** icon in the taskbar, then click the profile picture in the navigation to open Cortana settings.
|
||||||
|
|
||||||
|
@ -28,7 +28,7 @@ This scenario helps you search for both general upcoming meetings, and specific
|
|||||||
|
|
||||||
This process helps you find your upcoming meetings.
|
This process helps you find your upcoming meetings.
|
||||||
|
|
||||||
1. Check to make sure your work calendar is connected and synchronized with your Azure AD account.
|
1. Check to make sure your work calendar is connected and synchronized with your Microsoft Entra account.
|
||||||
|
|
||||||
2. Click on the **Cortana** icon in the taskbar, and then click in the **Search** bar.
|
2. Click on the **Cortana** icon in the taskbar, and then click in the **Search** bar.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ This scenario helps you to send an email to a co-worker listed in your work addr
|
|||||||
|
|
||||||
This process helps you to send a quick message to a co-worker from the work address book.
|
This process helps you to send a quick message to a co-worker from the work address book.
|
||||||
|
|
||||||
1. Check to make sure your Microsoft Outlook or mail app is connected and synchronized with your Azure AD account.
|
1. Check to make sure your Microsoft Outlook or mail app is connected and synchronized with your Microsoft Entra account.
|
||||||
|
|
||||||
2. Click on the **Cortana** icon in the taskbar, and then click in the **Search** bar.
|
2. Click on the **Cortana** icon in the taskbar, and then click in the **Search** bar.
|
||||||
|
|
||||||
|
@ -60,7 +60,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"v-stchambers",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
],
|
],
|
||||||
"searchScope": ["Windows 10"]
|
"searchScope": ["Windows 10"]
|
||||||
},
|
},
|
||||||
|
@ -65,7 +65,7 @@ There are several kiosk configuration methods that you can choose from, dependin
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
The kiosk account can be a local standard user account, a local administrator account, a domain account, or an Azure Active Directory (Azure AD) account, depending on the method that you use to configure the kiosk. If you want people to sign in and authenticate on the device, you should use a multi-app kiosk configuration. The single-app kiosk configuration doesn't require people to sign in to the device, although they can sign in to the kiosk app if you select an app that has a sign-in method.
|
The kiosk account can be a local standard user account, a local administrator account, a domain account, or a Microsoft Entra account, depending on the method that you use to configure the kiosk. If you want people to sign in and authenticate on the device, you should use a multi-app kiosk configuration. The single-app kiosk configuration doesn't require people to sign in to the device, although they can sign in to the kiosk app if you select an app that has a sign-in method.
|
||||||
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
@ -79,9 +79,9 @@ You can use this method | For this edition | For this kiosk account type
|
|||||||
--- | --- | ---
|
--- | --- | ---
|
||||||
[Assigned access in Settings](kiosk-single-app.md#local) | Pro, Ent, Edu | Local standard user
|
[Assigned access in Settings](kiosk-single-app.md#local) | Pro, Ent, Edu | Local standard user
|
||||||
[Assigned access cmdlets](kiosk-single-app.md#powershell) | Pro, Ent, Edu | Local standard user
|
[Assigned access cmdlets](kiosk-single-app.md#powershell) | Pro, Ent, Edu | Local standard user
|
||||||
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | Pro (version 1709), Ent, Edu | Local standard user, Active Directory, Azure AD
|
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | Pro (version 1709), Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
[Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md#mdm) | Pro (version 1709), Ent, Edu | Local standard user, Azure AD
|
[Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md#mdm) | Pro (version 1709), Ent, Edu | Local standard user, Microsoft Entra ID
|
||||||
[Shell Launcher](kiosk-shelllauncher.md) v2 | Ent, Edu | Local standard user, Active Directory, Azure AD
|
[Shell Launcher](kiosk-shelllauncher.md) v2 | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
|
|
||||||
<span id="classic" />
|
<span id="classic" />
|
||||||
|
|
||||||
@ -89,9 +89,9 @@ You can use this method | For this edition | For this kiosk account type
|
|||||||
|
|
||||||
You can use this method | For this edition | For this kiosk account type
|
You can use this method | For this edition | For this kiosk account type
|
||||||
--- | --- | ---
|
--- | --- | ---
|
||||||
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | Ent, Edu | Local standard user, Active Directory, Azure AD
|
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
[Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md#mdm) | Pro (version 1709), Ent, Edu | Local standard user, Azure AD
|
[Microsoft Intune or other mobile device management (MDM)](kiosk-single-app.md#mdm) | Pro (version 1709), Ent, Edu | Local standard user, Microsoft Entra ID
|
||||||
[Shell Launcher](kiosk-shelllauncher.md) v1 and v2 | Ent, Edu | Local standard user, Active Directory, Azure AD
|
[Shell Launcher](kiosk-shelllauncher.md) v1 and v2 | Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
|
|
||||||
<span id="desktop" />
|
<span id="desktop" />
|
||||||
|
|
||||||
@ -99,9 +99,9 @@ You can use this method | For this edition | For this kiosk account type
|
|||||||
|
|
||||||
You can use this method | For this edition | For this kiosk account type
|
You can use this method | For this edition | For this kiosk account type
|
||||||
--- | --- | ---
|
--- | --- | ---
|
||||||
[XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Active Directory, Azure AD
|
[XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
[Microsoft Intune or other MDM](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Azure AD
|
[Microsoft Intune or other MDM](lock-down-windows-10-to-specific-apps.md) | Pro, Ent, Edu | Local standard user, Microsoft Entra ID
|
||||||
[MDM WMI Bridge Provider](kiosk-mdm-bridge.md) | Pro, Ent, Edu | Local standard user, Active Directory, Azure AD
|
[MDM WMI Bridge Provider](kiosk-mdm-bridge.md) | Pro, Ent, Edu | Local standard user, Active Directory, Microsoft Entra ID
|
||||||
|
|
||||||
## Summary of kiosk configuration methods
|
## Summary of kiosk configuration methods
|
||||||
|
|
||||||
@ -109,11 +109,11 @@ Method | App type | Account type | Single-app kiosk | Multi-app kiosk
|
|||||||
--- | --- | --- | :---: | :---:
|
--- | --- | --- | :---: | :---:
|
||||||
[Assigned access in Settings](kiosk-single-app.md#local) | UWP | Local account | ✔️ |
|
[Assigned access in Settings](kiosk-single-app.md#local) | UWP | Local account | ✔️ |
|
||||||
[Assigned access cmdlets](kiosk-single-app.md#powershell) | UWP | Local account | ✔️ |
|
[Assigned access cmdlets](kiosk-single-app.md#powershell) | UWP | Local account | ✔️ |
|
||||||
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | UWP, Windows desktop app | Local standard user, Active Directory, Azure AD | ✔️ |
|
[The kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✔️ |
|
||||||
[XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Active Directory, Azure AD | ✔️ | ✔️
|
[XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✔️ | ✔️
|
||||||
Microsoft Intune or other MDM [for full-screen single-app kiosk](kiosk-single-app.md#mdm) or [for multi-app kiosk with desktop](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Azure AD | ✔️ | ✔️
|
Microsoft Intune or other MDM [for full-screen single-app kiosk](kiosk-single-app.md#mdm) or [for multi-app kiosk with desktop](lock-down-windows-10-to-specific-apps.md) | UWP, Windows desktop app | Local standard user, Microsoft Entra ID | ✔️ | ✔️
|
||||||
[Shell Launcher](kiosk-shelllauncher.md) |Windows desktop app | Local standard user, Active Directory, Azure AD | ✔️ |
|
[Shell Launcher](kiosk-shelllauncher.md) |Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | ✔️ |
|
||||||
[MDM Bridge WMI Provider](kiosk-mdm-bridge.md) | UWP, Windows desktop app | Local standard user, Active Directory, Azure AD | | ✔️
|
[MDM Bridge WMI Provider](kiosk-mdm-bridge.md) | UWP, Windows desktop app | Local standard user, Active Directory, Microsoft Entra ID | | ✔️
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -29,7 +29,7 @@ When the assigned access kiosk configuration is applied on the device, certain p
|
|||||||
|
|
||||||
## Group Policy
|
## Group Policy
|
||||||
|
|
||||||
The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. These users include local users, domain users, and Azure Active Directory users.
|
The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. These users include local users, domain users, and Microsoft Entra users.
|
||||||
|
|
||||||
| Setting | Value |
|
| Setting | Value |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
|
@ -216,7 +216,7 @@ Logs can help you [troubleshoot issues](/troubleshoot/windows-client/shell-exper
|
|||||||
You may also want to set up **automatic logon** for your kiosk device. When your kiosk device restarts, from an update or power outage, you can sign in the assigned access account manually. Or, you can configure the device to sign in to the assigned access account automatically. Make sure that Group Policy settings applied to the device don't prevent automatic sign in.
|
You may also want to set up **automatic logon** for your kiosk device. When your kiosk device restarts, from an update or power outage, you can sign in the assigned access account manually. Or, you can configure the device to sign in to the assigned access account automatically. Make sure that Group Policy settings applied to the device don't prevent automatic sign in.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you are using a Windows client device restriction CSP to set "Preferred Azure AD tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile.
|
> If you are using a Windows client device restriction CSP to set "Preferred Microsoft Entra tenant domain", this will break the "User logon type" auto-login feature of the Kiosk profile.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
> If you use the [kiosk wizard in Windows Configuration Designer](kiosk-single-app.md#wizard) or [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) to configure your kiosk, you can set an account to sign in automatically in the wizard or XML.
|
||||||
|
@ -52,7 +52,7 @@ For sample XML configurations for the different app combinations, see [Samples f
|
|||||||
>
|
>
|
||||||
>- Shell Launcher doesn't support a custom shell with an application that launches a different process and exits. For example, you cannot specify **write.exe** in Shell Launcher. Shell Launcher launches a custom shell and monitors the process to identify when the custom shell exits. **Write.exe** creates a 32-bit wordpad.exe process and exits. Because Shell Launcher is not aware of the newly created wordpad.exe process, Shell Launcher will take action based on the exit code of **Write.exe**, such as restarting the custom shell.
|
>- Shell Launcher doesn't support a custom shell with an application that launches a different process and exits. For example, you cannot specify **write.exe** in Shell Launcher. Shell Launcher launches a custom shell and monitors the process to identify when the custom shell exits. **Write.exe** creates a 32-bit wordpad.exe process and exits. Because Shell Launcher is not aware of the newly created wordpad.exe process, Shell Launcher will take action based on the exit code of **Write.exe**, such as restarting the custom shell.
|
||||||
|
|
||||||
- A domain, Azure Active Directory, or local user account.
|
- A domain, Microsoft Entra ID, or local user account.
|
||||||
|
|
||||||
- A Windows application that is installed for that account. The app can be your own company application or a common app like Internet Explorer.
|
- A Windows application that is installed for that account. The app can be your own company application or a common app like Internet Explorer.
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ You have several options for configuring your single-app kiosk.
|
|||||||
|
|
||||||
You can use **Settings** to quickly configure one or a few devices as a kiosk.
|
You can use **Settings** to quickly configure one or a few devices as a kiosk.
|
||||||
|
|
||||||
When your kiosk is a local device that isn't managed by Active Directory or Azure Active Directory, there is a default setting that enables automatic sign-in after a restart. That means that when the device restarts, the last signed-in user will be signed in automatically. If the last signed-in user is the kiosk account, the kiosk app will be launched automatically after the device restarts.
|
When your kiosk is a local device that isn't managed by Active Directory or Microsoft Entra ID, there is a default setting that enables automatic sign-in after a restart. That means that when the device restarts, the last signed-in user will be signed in automatically. If the last signed-in user is the kiosk account, the kiosk app will be launched automatically after the device restarts.
|
||||||
|
|
||||||
- If you want the kiosk account to sign in automatically, and the kiosk app launched when the device restarts, then you don't need to do anything.
|
- If you want the kiosk account to sign in automatically, and the kiosk app launched when the device restarts, then you don't need to do anything.
|
||||||
|
|
||||||
@ -235,17 +235,17 @@ When you use the **Provision kiosk devices** wizard in Windows Configuration Des
|
|||||||
|
|
||||||
3. Enable account management:
|
3. Enable account management:
|
||||||
|
|
||||||
:::image type="content" source="images/account-management-details.png" alt-text="In Windows Configuration Designer, join Active Directory, Azure AD, or create a local admin account.":::
|
:::image type="content" source="images/account-management-details.png" alt-text="In Windows Configuration Designer, join Active Directory, Microsoft Entra ID, or create a local admin account.":::
|
||||||
|
|
||||||
If you want to enable account management, select **Account Management**, and configure the following settings:
|
If you want to enable account management, select **Account Management**, and configure the following settings:
|
||||||
|
|
||||||
- **Manage organization/school accounts**: Choose how devices are enrolled. Your options:
|
- **Manage organization/school accounts**: Choose how devices are enrolled. Your options:
|
||||||
- **Active Directory**: Enter the credentials for a least-privileged user account to join the device to the domain.
|
- **Active Directory**: Enter the credentials for a least-privileged user account to join the device to the domain.
|
||||||
- **Azure Active Directory**: Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). In your Azure AD tenant, the **maximum number of devices per user** setting determines how many times the bulk token in the wizard can be used.
|
- **Microsoft Entra ID**: Before you use a Windows Configuration Designer wizard to configure bulk Microsoft Entra enrollment, [set up Microsoft Entra join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). In your Microsoft Entra tenant, the **maximum number of devices per user** setting determines how many times the bulk token in the wizard can be used.
|
||||||
|
|
||||||
If you select this option, enter a friendly name for the bulk token you get using the wizard. Set an expiration date for the token. The maximum is 180 days from the date you get the token. Select **Get bulk token**. In **Let's get you signed in**, enter an account that has permissions to join a device to Azure AD, and then the password. Select **Accept** to give Windows Configuration Designer the necessary permissions.
|
If you select this option, enter a friendly name for the bulk token you get using the wizard. Set an expiration date for the token. The maximum is 180 days from the date you get the token. Select **Get bulk token**. In **Let's get you signed in**, enter an account that has permissions to join a device to Microsoft Entra ID, and then the password. Select **Accept** to give Windows Configuration Designer the necessary permissions.
|
||||||
|
|
||||||
You must run Windows Configuration Designer on Windows client to configure Azure AD enrollment using any of the wizards.
|
You must run Windows Configuration Designer on Windows client to configure Microsoft Entra enrollment using any of the wizards.
|
||||||
|
|
||||||
- **Local administrator**: If you select this option, enter a user name and password. If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password isn't changed during that period, the account might be locked out, and unable to sign in.
|
- **Local administrator**: If you select this option, enter a user name and password. If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password isn't changed during that period, the account might be locked out, and unable to sign in.
|
||||||
|
|
||||||
@ -323,7 +323,7 @@ When you use the **Provision kiosk devices** wizard in Windows Configuration Des
|
|||||||
>
|
>
|
||||||
>Account type:
|
>Account type:
|
||||||
> - Local standard user
|
> - Local standard user
|
||||||
> - Azure AD
|
> - Microsoft Entra ID
|
||||||
|
|
||||||
Microsoft Intune and other MDM services enable kiosk configuration through the [AssignedAccess configuration service provider (CSP)](/windows/client-management/mdm/assignedaccess-csp). Assigned Access has a `KioskModeApp` setting. In the `KioskModeApp` setting, you enter the user account name and the [AUMID](/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app) for the app to run in kiosk mode.
|
Microsoft Intune and other MDM services enable kiosk configuration through the [AssignedAccess configuration service provider (CSP)](/windows/client-management/mdm/assignedaccess-csp). Assigned Access has a `KioskModeApp` setting. In the `KioskModeApp` setting, you enter the user account name and the [AUMID](/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app) for the app to run in kiosk mode.
|
||||||
|
|
||||||
|
@ -311,7 +311,7 @@ The following example hides the taskbar:
|
|||||||
```
|
```
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Azure Active Directory account could potentially compromise confidential information.
|
>The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Microsoft Entra account could potentially compromise confidential information.
|
||||||
|
|
||||||
#### Configs
|
#### Configs
|
||||||
|
|
||||||
@ -322,8 +322,8 @@ The full multi-app assigned access experience can only work for non-admin users.
|
|||||||
You can assign:
|
You can assign:
|
||||||
|
|
||||||
- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only)
|
- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only)
|
||||||
- [An individual account, which can be local, domain, or Azure Active Directory (Azure AD)](#config-for-individual-accounts)
|
- [An individual account, which can be local, domain, or Microsoft Entra ID](#config-for-individual-accounts)
|
||||||
- [A group account, which can be local, Active Directory (domain), or Azure AD](#config-for-group-accounts) (Applies to Windows 10, version 1803 only).
|
- [A group account, which can be local, Active Directory (domain), or Microsoft Entra ID](#config-for-group-accounts) (Applies to Windows 10, version 1803 only).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request.
|
>Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request.
|
||||||
@ -365,7 +365,7 @@ Individual accounts are specified using `<Account>`.
|
|||||||
|
|
||||||
- Local account can be entered as `machinename\account` or `.\account` or just `account`.
|
- Local account can be entered as `machinename\account` or `.\account` or just `account`.
|
||||||
- Domain account should be entered as `domain\account`.
|
- Domain account should be entered as `domain\account`.
|
||||||
- Azure AD account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Azure AD email address. For example, `AzureAD\someone@contoso.onmicrosoft.com`
|
- Microsoft Entra account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Microsoft Entra ID email address. For example, `AzureAD\someone@contoso.onmicrosoft.com`
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so.
|
>Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so.
|
||||||
@ -373,7 +373,7 @@ Individual accounts are specified using `<Account>`.
|
|||||||
Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail.
|
Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For both domain and Azure AD accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Azure AD-joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access.
|
>For both domain and Microsoft Entra accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Configs>
|
<Configs>
|
||||||
@ -388,7 +388,7 @@ Before applying the multi-app configuration, make sure the specified user accoun
|
|||||||
|
|
||||||
Group accounts are specified using `<UserGroup>`. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in `<Config/>`, user A won't have the kiosk experience.
|
Group accounts are specified using `<UserGroup>`. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in `<Config/>`, user A won't have the kiosk experience.
|
||||||
|
|
||||||
- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Azure AD accounts that are added to the local group won't have the kiosk settings applied.
|
- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Microsoft Entra accounts that are added to the local group won't have the kiosk settings applied.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Config>
|
<Config>
|
||||||
@ -406,7 +406,7 @@ Group accounts are specified using `<UserGroup>`. Nested groups aren't supported
|
|||||||
</Config>
|
</Config>
|
||||||
```
|
```
|
||||||
|
|
||||||
- Azure AD group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in.
|
- Microsoft Entra group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Config>
|
<Config>
|
||||||
@ -416,7 +416,7 @@ Group accounts are specified using `<UserGroup>`. Nested groups aren't supported
|
|||||||
```
|
```
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If an Azure AD group is configured with a lockdown profile on a device, a user in the Azure AD group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out.
|
>If a Microsoft Entra group is configured with a lockdown profile on a device, a user in the Microsoft Entra group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out.
|
||||||
|
|
||||||
<span id="add-xml" />
|
<span id="add-xml" />
|
||||||
|
|
||||||
@ -588,7 +588,7 @@ When the multi-app assigned access configuration is applied on the device, certa
|
|||||||
|
|
||||||
### Group policy
|
### Group policy
|
||||||
|
|
||||||
The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. This list includes local users, domain users, and Azure Active Directory users.
|
The following local policies affect all **non-administrator** users on the system, regardless whether the user is configured as an assigned access user or not. This list includes local users, domain users, and Microsoft Entra users.
|
||||||
|
|
||||||
| Setting | Value |
|
| Setting | Value |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
|
@ -203,7 +203,7 @@ The following example hides the taskbar:
|
|||||||
```
|
```
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Azure Active Directory account could potentially compromise confidential information.
|
> The kiosk profile is designed for public-facing kiosk devices. We recommend that you use a local, non-administrator account. If the device is connected to your company network, using a domain or Microsoft Entra account could potentially compromise confidential information.
|
||||||
|
|
||||||
#### Configs
|
#### Configs
|
||||||
|
|
||||||
@ -214,8 +214,8 @@ The full multi-app assigned access experience can only work for non-admin users.
|
|||||||
You can assign:
|
You can assign:
|
||||||
|
|
||||||
- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only)
|
- [A local standard user account that signs in automatically](#config-for-autologon-account) (Applies to Windows 10, version 1803 only)
|
||||||
- [An individual account, which can be local, domain, or Azure Active Directory (Azure AD)](#config-for-individual-accounts)
|
- [An individual account, which can be local, domain, or Microsoft Entra ID](#config-for-individual-accounts)
|
||||||
- [A group account, which can be local, Active Directory (domain), or Azure AD](#config-for-group-accounts) (Applies to Windows 10, version 1803 only).
|
- [A group account, which can be local, Active Directory (domain), or Microsoft Entra ID](#config-for-group-accounts) (Applies to Windows 10, version 1803 only).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request.
|
> Configs that specify group accounts cannot use a kiosk profile, only a lockdown profile. If a group is configured to a kiosk profile, the CSP will reject the request.
|
||||||
@ -257,7 +257,7 @@ Individual accounts are specified using `<Account>`.
|
|||||||
|
|
||||||
- Local account can be entered as `machinename\account` or `.\account` or just `account`.
|
- Local account can be entered as `machinename\account` or `.\account` or just `account`.
|
||||||
- Domain account should be entered as `domain\account`.
|
- Domain account should be entered as `domain\account`.
|
||||||
- Azure AD account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Azure AD email address. For example, `AzureAD\someone@contoso.onmicrosoft.com`
|
- Microsoft Entra account must be specified in this format: `AzureAD\{email address}`. **AzureAD** must be provided _as is_, and consider it's a fixed domain name. Then follow with the Microsoft Entra ID email address. For example, `AzureAD\someone@contoso.onmicrosoft.com`
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so.
|
> Assigned access can be configured via WMI or CSP to run its applications under a domain user or service account, rather than a local account. However, use of domain user or service accounts introduces risks that an attacker subverting the assigned access application might gain access to sensitive domain resources that have been inadvertently left accessible to any domain account. We recommend that customers proceed with caution when using domain accounts with assigned access, and consider the domain resources potentially exposed by the decision to do so.
|
||||||
@ -265,7 +265,7 @@ Individual accounts are specified using `<Account>`.
|
|||||||
Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail.
|
Before applying the multi-app configuration, make sure the specified user account is available on the device, otherwise it will fail.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> For both domain and Azure AD accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Azure AD-joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access.
|
> For both domain and Microsoft Entra accounts, it's not required that target account is explicitly added to the device. As long as the device is AD-joined or Microsoft Entra joined, the account can be discovered in the domain forest or tenant that the device is joined to. For local accounts, it is required that the account exist before you configure the account for assigned access.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Configs>
|
<Configs>
|
||||||
@ -280,7 +280,7 @@ Before applying the multi-app configuration, make sure the specified user accoun
|
|||||||
|
|
||||||
Group accounts are specified using `<UserGroup>`. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in `<Config/>`, user A won't have the kiosk experience.
|
Group accounts are specified using `<UserGroup>`. Nested groups aren't supported. For example, if user A is member of Group 1, Group 1 is member of Group 2, and Group 2 is used in `<Config/>`, user A won't have the kiosk experience.
|
||||||
|
|
||||||
- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Azure AD accounts that are added to the local group won't have the kiosk settings applied.
|
- Local group: Specify the group type as **LocalGroup** and put the group name in Name attribute. Any Microsoft Entra accounts that are added to the local group won't have the kiosk settings applied.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Config>
|
<Config>
|
||||||
@ -298,7 +298,7 @@ Group accounts are specified using `<UserGroup>`. Nested groups aren't supported
|
|||||||
</Config>
|
</Config>
|
||||||
```
|
```
|
||||||
|
|
||||||
- Azure AD group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in.
|
- Microsoft Entra group: Use the group object ID from the Azure portal to uniquely identify the group in the Name attribute. You can find the object ID on the overview page for the group in **Users and groups** > **All groups**. Specify the group type as **AzureActiveDirectoryGroup**. The kiosk device must have internet connectivity when users that belong to the group sign-in.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Config>
|
<Config>
|
||||||
@ -308,7 +308,7 @@ Group accounts are specified using `<UserGroup>`. Nested groups aren't supported
|
|||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If an Azure AD group is configured with a lockdown profile on a device, a user in the Azure AD group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out.
|
> If a Microsoft Entra group is configured with a lockdown profile on a device, a user in the Microsoft Entra group must change their password (after the account has been created with default password on the portal) before they can sign in to this device. If the user uses the default password to sign in to the device, the user will be immediately signed out.
|
||||||
|
|
||||||
<span id="add-xml" />
|
<span id="add-xml" />
|
||||||
|
|
||||||
|
@ -22,9 +22,11 @@ When applying a provisioning package (PPKG) containing power settings, elevated
|
|||||||
|
|
||||||
To apply the power settings successfully with the [correct security context](/windows/win32/services/localsystem-account), place the PPKG in `%WINDIR%/Provisioning/Packages` directory, and reboot the device. For more information, see [Configure power settings](/windows-hardware/customize/power-settings/configure-power-settings).
|
To apply the power settings successfully with the [correct security context](/windows/win32/services/localsystem-account), place the PPKG in `%WINDIR%/Provisioning/Packages` directory, and reboot the device. For more information, see [Configure power settings](/windows-hardware/customize/power-settings/configure-power-settings).
|
||||||
|
|
||||||
## Unable to perform bulk enrollment in Azure AD
|
<a name='unable-to-perform-bulk-enrollment-in-azure-ad'></a>
|
||||||
|
|
||||||
When [enrolling devices into Azure AD using provisioning packages](https://techcommunity.microsoft.com/t5/intune-customer-success/bulk-join-a-windows-device-to-azure-ad-and-microsoft-endpoint/ba-p/2381400), the bulk token request will be rejected, if the user requesting a bulk token is not authorized to grant application consent. For more information, see [Configure how users consent to applications](/azure/active-directory/manage-apps/configure-user-consent).
|
## Unable to perform bulk enrollment in Microsoft Entra ID
|
||||||
|
|
||||||
|
When [enrolling devices into Microsoft Entra ID using provisioning packages](https://techcommunity.microsoft.com/t5/intune-customer-success/bulk-join-a-windows-device-to-azure-ad-and-microsoft-endpoint/ba-p/2381400), the bulk token request will be rejected, if the user requesting a bulk token is not authorized to grant application consent. For more information, see [Configure how users consent to applications](/azure/active-directory/manage-apps/configure-user-consent).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> When obtaining the bulk token, you should select "No, sign in to this app only" when prompted for authentication. If you select "OK" instead without also selecting "Allow my organization to manage my device", the bulk token request may be rejected.
|
> When obtaining the bulk token, you should select "No, sign in to this app only" when prompted for authentication. If you select "OK" instead without also selecting "Allow my organization to manage my device", the bulk token request may be rejected.
|
||||||
|
@ -44,12 +44,12 @@ The desktop wizard helps you configure the following settings in a provisioning
|
|||||||
- Configure the device for shared use
|
- Configure the device for shared use
|
||||||
- Remove pre-installed software
|
- Remove pre-installed software
|
||||||
- Configure Wi-Fi network
|
- Configure Wi-Fi network
|
||||||
- Enroll device in Active Directory or Azure Active Directory
|
- Enroll device in Active Directory or Microsoft Entra ID
|
||||||
- Create local administrator account
|
- Create local administrator account
|
||||||
- Add applications and certificates
|
- Add applications and certificates
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>You must run Windows Configuration Designer on Windows client to configure Azure Active Directory enrollment using any of the wizards.
|
>You must run Windows Configuration Designer on Windows client to configure Microsoft Entra enrollment using any of the wizards.
|
||||||
|
|
||||||
Provisioning packages can include management instructions and policies, installation of specific apps, customization of network connections and policies, and more.
|
Provisioning packages can include management instructions and policies, installation of specific apps, customization of network connections and policies, and more.
|
||||||
|
|
||||||
@ -100,17 +100,17 @@ Use the Windows Configuration Designer tool to create a provisioning package. [L
|
|||||||
|
|
||||||
3. Enable account management:
|
3. Enable account management:
|
||||||
|
|
||||||
:::image type="content" source="../images/account-management-details.png" alt-text="In Windows Configuration Designer, join Active Directory, Azure AD, or create a local admin account.":::
|
:::image type="content" source="../images/account-management-details.png" alt-text="In Windows Configuration Designer, join Active Directory, Microsoft Entra ID, or create a local admin account.":::
|
||||||
|
|
||||||
If you want to enable account management, select **Account Management**, and configure the following settings:
|
If you want to enable account management, select **Account Management**, and configure the following settings:
|
||||||
|
|
||||||
- **Manage organization/school accounts**: Choose how devices are enrolled. Your options:
|
- **Manage organization/school accounts**: Choose how devices are enrolled. Your options:
|
||||||
- **Active Directory**: Enter the credentials for a least-privileged user account to join the device to the domain.
|
- **Active Directory**: Enter the credentials for a least-privileged user account to join the device to the domain.
|
||||||
- **Azure Active Directory**: Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). In your Azure AD tenant, the **maximum number of devices per user** setting determines how many times the bulk token in the wizard can be used.
|
- **Microsoft Entra ID**: Before you use a Windows Configuration Designer wizard to configure bulk Microsoft Entra enrollment, [set up Microsoft Entra join in your organization](/azure/active-directory/active-directory-azureadjoin-setup). In your Microsoft Entra tenant, the **maximum number of devices per user** setting determines how many times the bulk token in the wizard can be used.
|
||||||
|
|
||||||
If you select this option, enter a friendly name for the bulk token you get using the wizard. Set an expiration date for the token. The maximum is 180 days from the date you get the token. Select **Get bulk token**. In **Let's get you signed in**, enter an account that has permissions to join a device to Azure AD, and then the password. Select **Accept** to give Windows Configuration Designer the necessary permissions.
|
If you select this option, enter a friendly name for the bulk token you get using the wizard. Set an expiration date for the token. The maximum is 180 days from the date you get the token. Select **Get bulk token**. In **Let's get you signed in**, enter an account that has permissions to join a device to Microsoft Entra ID, and then the password. Select **Accept** to give Windows Configuration Designer the necessary permissions.
|
||||||
|
|
||||||
You must run Windows Configuration Designer on Windows client to configure Azure AD enrollment using any of the wizards.
|
You must run Windows Configuration Designer on Windows client to configure Microsoft Entra enrollment using any of the wizards.
|
||||||
|
|
||||||
- **Local administrator**: If you select this option, enter a user name and password. If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password isn't changed during that period, the account might be locked out, and unable to sign in.
|
- **Local administrator**: If you select this option, enter a user name and password. If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password isn't changed during that period, the account might be locked out, and unable to sign in.
|
||||||
|
|
||||||
|
@ -47,7 +47,7 @@ Windows Configuration Designer can create provisioning packages for Windows clie
|
|||||||
- Windows Server 2008 R2
|
- Windows Server 2008 R2
|
||||||
|
|
||||||
>[!WARNING]
|
>[!WARNING]
|
||||||
>You must run Windows Configuration Designer on Windows client to configure Azure Active Directory enrollment using any of the wizards.
|
>You must run Windows Configuration Designer on Windows client to configure Microsoft Entra enrollment using any of the wizards.
|
||||||
|
|
||||||
## Install Windows Configuration Designer
|
## Install Windows Configuration Designer
|
||||||
|
|
||||||
|
@ -73,8 +73,8 @@ The following table describes settings that you can configure using the wizards
|
|||||||
| --- | --- | --- | --- | --- |
|
| --- | --- | --- | --- | --- |
|
||||||
| Set up device | Assign device name, enter product key to upgrade Windows, configure shared use, remove pre-installed software | ✔️ | ✔️ | ✔️ |
|
| Set up device | Assign device name, enter product key to upgrade Windows, configure shared use, remove pre-installed software | ✔️ | ✔️ | ✔️ |
|
||||||
| Set up network | Connect to a Wi-Fi network | ✔️ | ✔️ | ✔️ |
|
| Set up network | Connect to a Wi-Fi network | ✔️ | ✔️ | ✔️ |
|
||||||
| Account management | Enroll device in Active Directory, enroll device in Azure Active Directory, or create a local administrator account | ✔️ | ✔️ | ✔️ |
|
| Account management | Enroll device in Active Directory, enroll device in Microsoft Entra ID, or create a local administrator account | ✔️ | ✔️ | ✔️ |
|
||||||
| Bulk Enrollment in Azure AD | Enroll device in Azure Active Directory using Bulk Token</br></br> [Set up Azure AD join in your organization](/azure/active-directory/active-directory-azureadjoin-setup), before you use Windows Configuration Designer wizard to configure bulk Azure AD enrollment. | ✔️ | ✔️ | ✔️ |
|
| Bulk Enrollment in Microsoft Entra ID | Enroll device in Microsoft Entra ID using Bulk Token</br></br> [Set up Microsoft Entra join in your organization](/azure/active-directory/active-directory-azureadjoin-setup), before you use Windows Configuration Designer wizard to configure bulk Microsoft Entra enrollment. | ✔️ | ✔️ | ✔️ |
|
||||||
| Add applications | Install applications using the provisioning package. | ✔️ | ✔️ | ❌ |
|
| Add applications | Install applications using the provisioning package. | ✔️ | ✔️ | ❌ |
|
||||||
| Add certificates | Include a certificate file in the provisioning package. | ✔️ | ✔️ | ✔️ |
|
| Add certificates | Include a certificate file in the provisioning package. | ✔️ | ✔️ | ✔️ |
|
||||||
| Configure kiosk account and app | Create local account to run the kiosk mode app, specify the app to run in kiosk mode | ❌ | ✔️ | ❌ |
|
| Configure kiosk account and app | Create local account to run the kiosk mode app, specify the app to run in kiosk mode | ❌ | ✔️ | ❌ |
|
||||||
|
@ -105,7 +105,7 @@ For more information, see [Using PowerShell scripting with the WMI Bridge Provid
|
|||||||
|
|
||||||
## Guidance for accounts on shared PCs
|
## Guidance for accounts on shared PCs
|
||||||
|
|
||||||
- When a device is configured in *shared PC mode* with the default deletion policy, accounts will be cached automatically until disk space is low. Then, accounts will be deleted to reclaim disk space. This account management happens automatically. Both Azure AD and Active Directory domain accounts are managed in this way. Any accounts created through **Guest** and **Kiosk** will be deleted automatically at sign out.
|
- When a device is configured in *shared PC mode* with the default deletion policy, accounts will be cached automatically until disk space is low. Then, accounts will be deleted to reclaim disk space. This account management happens automatically. Both Microsoft Entra ID and Active Directory domain accounts are managed in this way. Any accounts created through **Guest** and **Kiosk** will be deleted automatically at sign out.
|
||||||
|
|
||||||
- Local accounts that already exist on a PC won't be deleted when turning on shared PC mode. New local accounts that are created using **Settings > Accounts > Other people > Add someone else to this PC** after shared PC mode is turned on won't be deleted. However, any new guest accounts created by the **Guest** and **Kiosk** options on the sign-in screen (if enabled) will automatically be deleted at sign out. To set a general policy on all local accounts, you can configure the following local Group Policy setting: **Computer Configuration** > **Administrative Templates** > **System** > **User Profiles**: **Delete User Profiles Older Than A Specified Number Of Days On System Restart**.
|
- Local accounts that already exist on a PC won't be deleted when turning on shared PC mode. New local accounts that are created using **Settings > Accounts > Other people > Add someone else to this PC** after shared PC mode is turned on won't be deleted. However, any new guest accounts created by the **Guest** and **Kiosk** options on the sign-in screen (if enabled) will automatically be deleted at sign out. To set a general policy on all local accounts, you can configure the following local Group Policy setting: **Computer Configuration** > **Administrative Templates** > **System** > **User Profiles**: **Delete User Profiles Older Than A Specified Number Of Days On System Restart**.
|
||||||
|
|
||||||
|
@ -15,7 +15,7 @@ ms.technology: itpro-configure
|
|||||||
|
|
||||||
# Accounts (Windows Configuration Designer reference)
|
# Accounts (Windows Configuration Designer reference)
|
||||||
|
|
||||||
Use these settings to join a device to an Active Directory domain or an Azure Active Directory tenant, or to add local user accounts to the device.
|
Use these settings to join a device to an Active Directory domain or a Microsoft Entra tenant, or to add local user accounts to the device.
|
||||||
|
|
||||||
## Applies to
|
## Applies to
|
||||||
|
|
||||||
@ -28,7 +28,7 @@ Use these settings to join a device to an Active Directory domain or an Azure Ac
|
|||||||
|
|
||||||
## Azure
|
## Azure
|
||||||
|
|
||||||
The **Azure > Authority** and **Azure > BPRT** settings for bulk Azure Active Directory (Azure AD) enrollment can only be configured using one of the provisioning wizards. After you get a bulk token for Azure AD enrollment in a wizard, you can switch to the advanced editor to configure more provisioning settings. For information about using the wizards, see:
|
The **Azure > Authority** and **Azure > BPRT** settings for bulk Microsoft Entra enrollment can only be configured using one of the provisioning wizards. After you get a bulk token for Microsoft Entra enrollment in a wizard, you can switch to the advanced editor to configure more provisioning settings. For information about using the wizards, see:
|
||||||
|
|
||||||
- [Instructions for desktop wizard](../provisioning-packages/provision-pcs-for-initial-deployment.md)
|
- [Instructions for desktop wizard](../provisioning-packages/provision-pcs-for-initial-deployment.md)
|
||||||
- [Instructions for the kiosk wizard](../kiosk-single-app.md#wizard)
|
- [Instructions for the kiosk wizard](../kiosk-single-app.md#wizard)
|
||||||
|
@ -29,7 +29,7 @@ Use these settings to configure settings for accounts allowed on the shared PC.
|
|||||||
|
|
||||||
| Setting | Value | Description |
|
| Setting | Value | Description |
|
||||||
| --- | --- | --- |
|
| --- | --- | --- |
|
||||||
| AccountModel | - Only guest</br>- Domain-joined only</br>- Domain-joined and guest | This option controls how users can sign in on the PC. Choosing domain-joined will enable any user in the domain to sign in. Specifying the guest option will add the Guest option to the sign in screen and enable anonymous guest access to the PC. </br></br>- Only guest allows anyone to use the PC as a local standard (non-admin) account.</br>- Domain-joined only allows users to sign in with an Active Directory or Azure AD account.</br>- Domain-joined and guest allows users to sign in with an Active Directory, Azure AD, or local standard account. |
|
| AccountModel | - Only guest</br>- Domain-joined only</br>- Domain-joined and guest | This option controls how users can sign in on the PC. Choosing domain-joined will enable any user in the domain to sign in. Specifying the guest option will add the Guest option to the sign in screen and enable anonymous guest access to the PC. </br></br>- Only guest allows anyone to use the PC as a local standard (non-admin) account.</br>- Domain-joined only allows users to sign in with an Active Directory or Microsoft Entra account.</br>- Domain-joined and guest allows users to sign in with an Active Directory, Microsoft Entra ID, or local standard account. |
|
||||||
| DeletionPolicy | - Delete immediately </br>- Delete at disk space threshold</br>- Delete at disk space threshold and inactive threshold | - **Delete immediately** deletes the account on sign out.</br>- **Delete at disk space threshold** starts deleting accounts when available disk space falls below the threshold you set for `DiskLevelDeletion`. It stops deleting accounts when the available disk space reaches the threshold you set for `DiskLevelCaching`. Accounts are deleted in order of oldest accessed to most recently accessed.</br>- **Delete at disk space threshold and inactive threshold** applies the same disk space checks as noted above. It also deletes accounts if they haven't signed in within the number of days in `InactiveThreshold`. |
|
| DeletionPolicy | - Delete immediately </br>- Delete at disk space threshold</br>- Delete at disk space threshold and inactive threshold | - **Delete immediately** deletes the account on sign out.</br>- **Delete at disk space threshold** starts deleting accounts when available disk space falls below the threshold you set for `DiskLevelDeletion`. It stops deleting accounts when the available disk space reaches the threshold you set for `DiskLevelCaching`. Accounts are deleted in order of oldest accessed to most recently accessed.</br>- **Delete at disk space threshold and inactive threshold** applies the same disk space checks as noted above. It also deletes accounts if they haven't signed in within the number of days in `InactiveThreshold`. |
|
||||||
| DiskLevelCaching | A number between 0 and 100 | If you set **DeletionPolicy** to **Delete at disk space threshold**, set the percent of total disk space to be used as the disk space threshold for account caching. |
|
| DiskLevelCaching | A number between 0 and 100 | If you set **DeletionPolicy** to **Delete at disk space threshold**, set the percent of total disk space to be used as the disk space threshold for account caching. |
|
||||||
| DiskLevelDeletion | A number between 0 and 100 | If you set **DeletionPolicy** to **Delete at disk space threshold**, set the percent of total disk space to be used as the disk space threshold for account deletion. |
|
| DiskLevelDeletion | A number between 0 and 100 | If you set **DeletionPolicy** to **Delete at disk space threshold**, set the percent of total disk space to be used as the disk space threshold for account deletion. |
|
||||||
|
@ -43,7 +43,7 @@ When set to True, students can print in the Take A Test app.
|
|||||||
|
|
||||||
Enter the account to use when taking a test.
|
Enter the account to use when taking a test.
|
||||||
|
|
||||||
To specify a domain account, enter **domain\user**. To specify an Azure AD account, enter `username@tenant.com`. To specify a local account, enter the username.
|
To specify a domain account, enter **domain\user**. To specify a Microsoft Entra account, enter `username@tenant.com`. To specify a local account, enter the username.
|
||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
|
@ -45,10 +45,10 @@ A device account is a Microsoft Exchange account that's connected with Skype for
|
|||||||
| Email | Email address | Email address of the device account. |
|
| Email | Email address | Email address of the device account. |
|
||||||
| ExchangeServer | Exchange Server | Normally, the device will try to automatically discover the Exchange server. This field is only required if automatic discovery fails. |
|
| ExchangeServer | Exchange Server | Normally, the device will try to automatically discover the Exchange server. This field is only required if automatic discovery fails. |
|
||||||
| Password | Password | Password for the device account. |
|
| Password | Password | Password for the device account. |
|
||||||
| PasswordRotationEnabled | 0 = enabled</br>1 = disabled | Specifies whether automatic password rotation is enabled. If you enforce a password expiration policy on the device account, then use this setting to allow the device to manage its own password. It can change the password frequently, without requiring you to manually update the account information when the password expires. You can reset the password at any time using Active Directory or Azure AD. |
|
| PasswordRotationEnabled | 0 = enabled</br>1 = disabled | Specifies whether automatic password rotation is enabled. If you enforce a password expiration policy on the device account, then use this setting to allow the device to manage its own password. It can change the password frequently, without requiring you to manually update the account information when the password expires. You can reset the password at any time using Active Directory or Microsoft Entra ID. |
|
||||||
| SipAddress | Session Initiation Protocol (SIP) address | Normally, the device will try to automatically discover the SIP. This field is only required if automatic discovery fails. |
|
| SipAddress | Session Initiation Protocol (SIP) address | Normally, the device will try to automatically discover the SIP. This field is only required if automatic discovery fails. |
|
||||||
| UserName | User name | Username of the device account when using Active Directory. |
|
| UserName | User name | Username of the device account when using Active Directory. |
|
||||||
| UserPrincipalName | User principal name (UPN) | To use a device account from Azure Active Directory or a hybrid deployment, you should specify the UPN of the device account. |
|
| UserPrincipalName | User principal name (UPN) | To use a device account from Microsoft Entra ID or a hybrid deployment, you should specify the UPN of the device account. |
|
||||||
| ValidateAndCommit | Any text | Validates the data provided and then commits the changes. This process occurs automatically after the other DeviceAccount settings are applied. The text you enter for the ValidateAndCommit setting doesn't matter. |
|
| ValidateAndCommit | Any text | Validates the data provided and then commits the changes. This process occurs automatically after the other DeviceAccount settings are applied. The text you enter for the ValidateAndCommit setting doesn't matter. |
|
||||||
|
|
||||||
## Dot3
|
## Dot3
|
||||||
|
@ -58,7 +58,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
],
|
],
|
||||||
"searchScope": ["Windows 10"]
|
"searchScope": ["Windows 10"]
|
||||||
},
|
},
|
||||||
|
@ -14,7 +14,7 @@ ms.localizationpriority: medium
|
|||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
ms.date: 12/31/2017
|
ms.date: 10/10/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage device restarts after updates
|
# Manage device restarts after updates
|
||||||
|
@ -11,7 +11,7 @@ ms.localizationpriority: medium
|
|||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
ms.date: 02/28/2023
|
ms.date: 10/10/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
# Walkthrough: Use CSPs and MDMs to configure Windows Update for Business
|
# Walkthrough: Use CSPs and MDMs to configure Windows Update for Business
|
||||||
@ -39,7 +39,7 @@ You can control when updates are applied, for example by deferring when an updat
|
|||||||
|
|
||||||
Both feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device.
|
Both feature and quality updates are automatically offered to devices that are connected to Windows Update using Windows Update for Business policies. However, you can choose whether you want the devices to additionally receive other Microsoft Updates or drivers that are applicable to that device.
|
||||||
|
|
||||||
To enable Microsoft Updates, use [Update/AllwMUUpdateService](/windows/client-management/mdm/policy-csp-update#update-allowmuupdateservice).
|
To enable Microsoft Updates, use [Update/AllowMUUpdateService](/windows/client-management/mdm/policy-csp-update#update-allowmuupdateservice).
|
||||||
|
|
||||||
Drivers are automatically enabled because they're beneficial to device systems. We recommend that you allow the driver policy to allow drivers to be updated on devices (the default), but you can turn off this setting if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use Update/[ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update#update-excludewudriversinqualityupdate).
|
Drivers are automatically enabled because they're beneficial to device systems. We recommend that you allow the driver policy to allow drivers to be updated on devices (the default), but you can turn off this setting if you prefer to manage drivers manually. If you want to disable driver updates for some reason, use Update/[ExcludeWUDriversInQualityUpdate](/windows/client-management/mdm/policy-csp-update#update-excludewudriversinqualityupdate).
|
||||||
|
|
||||||
@ -137,6 +137,7 @@ We recommend that you use set specific deadlines for feature and quality updates
|
|||||||
- [Update/ConfigureDeadlineForFeatureUpdates](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforfeatureupdates)
|
- [Update/ConfigureDeadlineForFeatureUpdates](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforfeatureupdates)
|
||||||
- [Update/ConfigureDeadlineForQualityUpdates ](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforqualityupdates)
|
- [Update/ConfigureDeadlineForQualityUpdates ](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforqualityupdates)
|
||||||
- [Update/ConfigureDeadlineGracePeriod](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinegraceperiod)
|
- [Update/ConfigureDeadlineGracePeriod](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinegraceperiod)
|
||||||
|
- [Update/ConfigureDeadlineGracePeriodForFeatureUpdates](/windows/client-management/mdm/policy-csp-update#configuredeadlinegraceperiodforfeatureupdates)
|
||||||
- [Update/ConfigureDeadlineNoAutoReboot](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinenoautoreboot)
|
- [Update/ConfigureDeadlineNoAutoReboot](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinenoautoreboot)
|
||||||
|
|
||||||
These policies also offer an option to opt out of automatic restarts until a deadline is reached by presenting an "engaged restart experience" until the deadline has actually expired. At that point the device will automatically schedule a restart regardless of active hours.
|
These policies also offer an option to opt out of automatic restarts until a deadline is reached by presenting an "engaged restart experience" until the deadline has actually expired. At that point the device will automatically schedule a restart regardless of active hours.
|
||||||
|
@ -17,7 +17,7 @@ appliesto:
|
|||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2019</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2019</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2016</a>
|
||||||
ms.date: 08/22/2023
|
ms.date: 10/10/2023
|
||||||
---
|
---
|
||||||
|
|
||||||
# Walkthrough: Use Group Policy to configure Windows Update for Business
|
# Walkthrough: Use Group Policy to configure Windows Update for Business
|
||||||
|
@ -12,36 +12,60 @@ manager: aaroncz
|
|||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
ms.date: 05/12/2023
|
ms.date: 10/10/2023
|
||||||
---
|
---
|
||||||
# Enforcing compliance deadlines for updates
|
# Enforcing compliance deadlines for updates
|
||||||
|
|
||||||
Deploying feature or quality updates for many organizations is only part of the equation for managing their device ecosystem. The ability to enforce update compliance is the next important part. Windows Update for Business provides controls to manage deadlines for when devices should migrate to newer versions.
|
Deploying feature or quality updates for many organizations is only part of the equation for managing their device ecosystem. The ability to enforce update compliance is the next important part. Windows Update for Business provides controls to manage deadlines for when devices should migrate to newer versions.
|
||||||
|
|
||||||
With a current version, it's best to use the new policy introduced in June 2019 to Windows 10, version 1709 and later: **Specify deadlines for automatic updates and restarts**. In MDM, this policy is available as four separate settings:
|
With a current version, it's best to use the new policy introduced in June 2019 to Windows 10, version 1709 and later: **Specify deadlines for automatic updates and restarts**. In MDM, this policy is available as separate settings:
|
||||||
|
|
||||||
- Update/ConfigureDeadlineForFeatureUpdates
|
- [Update/ConfigureDeadlineForFeatureUpdates](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforfeatureupdates)
|
||||||
- Update/ConfigureDeadlineForQualityUpdates
|
- [Update/ConfigureDeadlineForQualityUpdates](/windows/client-management/mdm/policy-csp-update#update-configuredeadlineforqualityupdates)
|
||||||
- Update/ConfigureDeadlineGracePeriod
|
- [Update/ConfigureDeadlineGracePeriod](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinegraceperiod)
|
||||||
- Update/ConfigureDeadlineNoAutoReboot
|
- [Update/ConfigureDeadlineGracePeriodForFeatureUpdates](/windows/client-management/mdm/policy-csp-update#configuredeadlinegraceperiodforfeatureupdates) (Windows 11, version 22H2 or later)
|
||||||
|
- [Update/ConfigureDeadlineNoAutoReboot](/windows/client-management/mdm/policy-csp-update#update-configuredeadlinenoautoreboot)
|
||||||
|
|
||||||
## Policy setting overview
|
|
||||||
|
## Policy setting overview for clients running Windows 11, version 22H2 and later
|
||||||
|
|
||||||
|
|Policy| Description |
|
||||||
|
|-|-|
|
||||||
|
| Specify deadlines for automatic updates and restarts | This policy lets you specify the number of days before quality and feature updates are installed on devices automatically, and a grace period, after which required restarts occur automatically. This policy includes an option to opt out of automatic restarts until the end of the grace period is reached. |
|
||||||
|
|
||||||
|
### Suggested configurations for clients running Windows 11, version 22H2 and later
|
||||||
|
|
||||||
|
| Policy | Location | Quality updates deadline in days | Quality updates grace period in days | Feature updates deadline in days | Feature updates grace period in days |
|
||||||
|
|-|-|-|-|-|-|
|
||||||
|
| Specify deadlines for automatic updates and restarts | GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadlines for automatic updates and restarts | 7 | 2 | 2 | 7 |
|
||||||
|
|
||||||
|
When **Specify deadlines for automatic updates and restarts** is set:
|
||||||
|
|
||||||
|
The deadline calculation for both quality and feature updates is based off the time the client's update scan initially discovered the update. Previously, the deadline was based off the release date of the update for quality updates and the reboot pending date for feature updates. The change for deadline calculation was made to improve the predictability of restart.
|
||||||
|
|
||||||
|
The grace period for both quality and feature updates starts its countdown from the time of a pending restart after the installation is complete. As soon as installation is complete and the device reaches pending restart, users are able to schedule restarts during the grace period and Windows can still automatically restart outside of active hours if users choose not to schedule restarts. Once the *effective deadline* is reached, the device tries to restart during active hours. (The effective deadline is whichever is the later of the restart pending date plus the specified deadline or the restart pending date plus the grace period.) Grace periods are useful for users who may be coming back from vacation, or other extended time away from their device, to ensure a forced reboot doesn't occur immediately after they return.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> When **Specify deadlines for automatic updates and restarts** is used, download, installation, and reboot settings stemming from the [Configure Automatic Updates](waas-restart.md#schedule-update-installation) are ignored.
|
||||||
|
|
||||||
|
## Policy setting overview for clients running Windows 11, version 21H2 and earlier
|
||||||
|
|
||||||
|Policy|Description |
|
|Policy|Description |
|
||||||
|-|-|
|
|-|-|
|
||||||
| (Windows 10, version 1709 and later) Specify deadlines for automatic updates and restarts | This policy includes a deadline and a configurable grace period with the option to opt out of automatic restarts until the deadline is reached. This is the recommended policy for Windows 10, version 1709 and later.|
|
| (Windows 10, version 1709 and later) Specify deadlines for automatic updates and restarts | This policy includes a deadline and a configurable grace period with the option to opt out of automatic restarts until the deadline is reached. This is the recommended policy for Windows 10, version 1709 and later.|
|
||||||
|
|
||||||
## Suggested configurations
|
### Suggested configurations for clients running Windows 11, version 21H2 and earlier
|
||||||
|
|
||||||
|Policy|Location|Quality update deadline in days|Feature update deadline in days|Grace period in days|
|
|Policy|Location|Quality update deadline in days|Feature update deadline in days|Grace period in days|
|
||||||
|-|-|-|-|-|
|
|-|-|-|-|-|
|
||||||
|(Windows 10, version 1709 and later) Specify deadlines for automatic updates and restarts | GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadlines for automatic updates and restarts | 2 | 2 | 5 |
|
|(Windows 10, version 1709 and later) Specify deadlines for automatic updates and restarts | GPO: Computer Configuration > Administrative Templates > Windows Components > Windows Update > Specify deadlines for automatic updates and restarts | 2 | 7 | 2 |
|
||||||
|
|
||||||
When **Specify deadlines for automatic updates and restarts** is set (Windows 10, version 1709 and later):
|
When **Specify deadlines for automatic updates and restarts** is set (Windows 10, version 1709 and later):
|
||||||
|
|
||||||
For feature updates, the deadline and grace period start their countdown from the time of a pending restart after the installation is complete. As soon as installation is complete and the device reaches pending restart, the device will try to update outside of active hours. Once the *effective deadline* is reached, the device will try to restart during active hours. (The effective deadline is whichever is the later of the restart pending date plus the specified deadline or the restart pending date plus the grace period.)
|
For feature updates, the deadline and grace period start their countdown from the time of a pending restart after the installation is complete. As soon as installation is complete and the device reaches pending restart, the device tries to update outside of active hours. Once the *effective deadline* is reached, the device tries to restart during active hours. (The effective deadline is whichever is the later of the restart pending date plus the specified deadline or the restart pending date plus the grace period.)
|
||||||
|
|
||||||
For quality updates, the deadline countdown starts from the time the update is *offered* (not downloaded or installed). The grace period countdown starts from the time of the pending restart. The device will try to download and install the update at a time based on your other download and installation policies (the default is to automatically download and install in in the background). When the pending restart time is reached, the device will notify the user and try to update outside of active hours. Once the effective deadline is reached, the device will try to restart during active hours.
|
For quality updates, the deadline countdown starts from the time the update is *offered* (not downloaded or installed). The grace period countdown starts from the time of the pending restart. The device tries to download and install the update at a time based on your other download and installation policies (the default is to automatically download and install in the background). When the pending restart time is reached, the device notifies the user and tries to update outside of active hours. Once the effective deadline is reached, the device tries to restart during active hours.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> When **Specify deadlines for automatic updates and restarts** is used, download, installation, and reboot settings stemming from the [Configure Automatic Updates](waas-restart.md#schedule-update-installation) are ignored.
|
> - When using the newer policy that contains **Feature updates grace period in days**, this setting is ignored by clients that are running Windows 11 version 21H2 and earlier. The grace period for quality updates is used for both quality updates and feature updates for these clients.
|
||||||
|
> - When **Specify deadlines for automatic updates and restarts** is used, download, installation, and reboot settings stemming from the [Configure Automatic Updates](waas-restart.md#schedule-update-installation) are ignored.
|
||||||
|
@ -57,7 +57,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
"searchScope": ["Windows 10"]
|
"searchScope": ["Windows 10"]
|
||||||
|
@ -65,7 +65,10 @@
|
|||||||
"dstrome",
|
"dstrome",
|
||||||
"v-dihans",
|
"v-dihans",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
],
|
],
|
||||||
"searchScope": [
|
"searchScope": [
|
||||||
"Windows 10"
|
"Windows 10"
|
||||||
|
@ -59,7 +59,10 @@
|
|||||||
"jborsecnik",
|
"jborsecnik",
|
||||||
"tiburd",
|
"tiburd",
|
||||||
"garycentric",
|
"garycentric",
|
||||||
"beccarobins"
|
"beccarobins",
|
||||||
|
"Stacyrch140",
|
||||||
|
"v-stsavell",
|
||||||
|
"American-Dipper"
|
||||||
],
|
],
|
||||||
"searchScope": ["Windows 10"]
|
"searchScope": ["Windows 10"]
|
||||||
},
|
},
|
||||||
|
Loading…
x
Reference in New Issue
Block a user