mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-17 19:33:37 +00:00
Merge branch 'main' into release-win11-22h2
This commit is contained in:
@ -150,6 +150,15 @@ If you disable or don't configure this policy setting, the PIN will be provision
|
||||
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-usecloudtrustforonpremauth--only-for---device-vendor-msft-"></a>***TenantId*/Policies/UseCloudTrustForOnPremAuth** (only for ./Device/Vendor/MSFT)
|
||||
Boolean value that enables Windows Hello for Business to use Azure AD Kerberos to authenticate to on-premises resources.
|
||||
|
||||
If you enable this policy setting, Windows Hello for Business will use an Azure AD Kerberos ticket to authenticate to on-premises resources. The Azure AD Kerberos ticket is returned to the client after a successful authentication to Azure AD if Azure AD Kerberos is enabled for the tenant and domain.
|
||||
|
||||
If you disable or do not configure this policy setting, Windows Hello for Business will use a key or certificate to authenticate to on-premises resources.
|
||||
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
|
||||
<a href="" id="tenantid-policies-pincomplexity"></a>***TenantId*/Policies/PINComplexity**
|
||||
Node for defining PIN settings.
|
||||
|
||||
|
@ -2105,17 +2105,17 @@ If you disable or don't configure this setting, security intelligence will be re
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP Friendly name: *Define security intelligence location for VDI clients*
|
||||
- GP Friendly name: *Specify the signature (Security intelligence) delivery optimization for Defender in Virtual Environments*
|
||||
- GP name: *SecurityIntelligenceLocation*
|
||||
- GP element: *SecurityIntelligenceLocation*
|
||||
- GP path: *Windows Components/Microsoft Defender Antivirus/Security Intelligence Updates*
|
||||
- GP path: *Windows Components/Microsoft Defender Antivirus/Windows Defender*
|
||||
- GP ADMX file name: *WindowsDefender.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
|
||||
- Empty string - no policy is set
|
||||
- Non-empty string - the policy is set and security intelligence is gathered from the location
|
||||
- Non-empty string - the policy is set and security intelligence is gathered from the location.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
@ -128,7 +128,7 @@ This policy setting allows you to turn off discovering the display service adver
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Don't allow
|
||||
- 0 - Doesn't allow
|
||||
- 1 - Allow
|
||||
|
||||
<!--/SupportedValues-->
|
||||
@ -166,9 +166,9 @@ The table below shows the applicability of Windows:
|
||||
<!--Description-->
|
||||
This policy setting allows you to disable the infrastructure movement detection feature.
|
||||
|
||||
If you set it to 0, your PC may stay connected and continue to project if you walk away from a Wireless Display receiver to which you're projecting over infrastructure.
|
||||
- If you set it to 0, your PC may stay connected and continue to project if you walk away from a Wireless Display receiver to which you are projecting over infrastructure.
|
||||
|
||||
If you set it to 1, your PC will detect that you've moved and will automatically disconnect your infrastructure Wireless Display session.
|
||||
- If you set it to 1, your PC will detect that you have moved and will automatically disconnect your infrastructure Wireless Display session.
|
||||
|
||||
The default value is 1.
|
||||
|
||||
@ -177,7 +177,7 @@ The default value is 1.
|
||||
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Don't allow
|
||||
- 0 - Doesn't allow
|
||||
- 1 (Default) - Allow
|
||||
|
||||
<!--/SupportedValues-->
|
||||
|
Reference in New Issue
Block a user