mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/rs4' into jdrs4wcd
This commit is contained in:
commit
3695c2052b
@ -135,6 +135,22 @@
|
||||
"moniker_groups": [],
|
||||
"version": 0
|
||||
},
|
||||
{
|
||||
"docset_name": "privacy",
|
||||
"build_source_folder": "windows/privacy",
|
||||
"build_output_subfolder": "privacy",
|
||||
"locale": "en-us",
|
||||
"monikers": [],
|
||||
"moniker_ranges": [],
|
||||
"open_to_public_contributors": false,
|
||||
"type_mapping": {
|
||||
"Conceptual": "Content",
|
||||
"ManagedReference": "Content",
|
||||
"RestApi": "Content"
|
||||
},
|
||||
"build_entry_point": "docs",
|
||||
"template_folder": "_themes"
|
||||
},
|
||||
{
|
||||
"docset_name": "security",
|
||||
"build_source_folder": "windows/security",
|
||||
@ -460,7 +476,7 @@
|
||||
}
|
||||
],
|
||||
"notification_subscribers": [
|
||||
"brianlic@microsoft.com"
|
||||
"elizapo@microsoft.com"
|
||||
],
|
||||
"branches_to_filter": [
|
||||
""
|
||||
|
@ -6185,6 +6185,11 @@
|
||||
"redirect_url": "/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md",
|
||||
"redirect_url": "/windows/configuration/setup-kiosk-digital-signage",
|
||||
"redirect_document_id": true
|
||||
},
|
||||
{
|
||||
"source_path": "windows/configure/set-up-a-kiosk-for-windows-10-for-mobile-edition.md",
|
||||
"redirect_url": "/windows/configuration/mobile-devices/set-up-a-kiosk-for-windows-10-for-mobile-edition",
|
||||
|
@ -24,7 +24,7 @@ By using Group Policy and Intune, you can set up a policy setting once, and then
|
||||
> For more info about the tools you can use to change your Group Policy objects, see the Internet Explorer 11 topics, [Group Policy and the Group Policy Management Console (GPMC)](https://go.microsoft.com/fwlink/p/?LinkId=617921), [Group Policy and the Local Group Policy Editor](https://go.microsoft.com/fwlink/p/?LinkId=617922), [Group Policy and the Advanced Group Policy Management (AGPM)](https://go.microsoft.com/fwlink/p/?LinkId=617923), and [Group Policy and Windows PowerShell](https://go.microsoft.com/fwlink/p/?LinkId=617924).
|
||||
|
||||
## Group Policy settings
|
||||
Microsoft Edge works with the following Group Policy settings to help you manager your company's web browser configurations. The Group Policy settings are found in the Group Policy Editor in the following location:
|
||||
Microsoft Edge works with the following Group Policy settings to help you manage your company's web browser configurations. The Group Policy settings are found in the Group Policy Editor in the following location:
|
||||
|
||||
`Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\`
|
||||
|
||||
@ -1007,4 +1007,4 @@ These are additional Windows 10-specific MDM policy settings that work with Mic
|
||||
- **1 (default).** Employees can sync between PCs.
|
||||
|
||||
## Related topics
|
||||
* [Mobile Device Management (MDM) settings]( https://go.microsoft.com/fwlink/p/?LinkId=722885)
|
||||
* [Mobile Device Management (MDM) settings]( https://go.microsoft.com/fwlink/p/?LinkId=722885)
|
||||
|
@ -21,6 +21,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "lizross",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.microsoft-edge"
|
||||
|
@ -22,6 +22,9 @@
|
||||
"ms.technology": "internet-explorer",
|
||||
"ms.topic": "article",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.internet-explorer"
|
||||
|
@ -35,6 +35,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "jdecker",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.itpro-hololens"
|
||||
|
@ -68,6 +68,9 @@ When you run ADKsetup.exe for Windows 10, version 1607, select **Configuration D
|
||||
|
||||
6. On the **Select security details for the provisioning package**, click **Next**.
|
||||
|
||||
>[WARNING!]
|
||||
>If you encrypt the provisioning package, provisioning the HoloLens device will fail.
|
||||
|
||||
7. Click **Next** to specify the output location where you want the provisioning package to go once it's built. By default, Windows Configuration Designer uses the project folder as the output location.
|
||||
|
||||
Optionally, you can click **Browse** to change the default output location.
|
||||
|
@ -24,6 +24,9 @@
|
||||
"ms.sitesec": "library",
|
||||
"ms.author": "jdecker",
|
||||
"ms.date": "05/23/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.surface-hub"
|
||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
||||
ms.pagetype: surfacehub
|
||||
author: jdeckerms
|
||||
ms.author: jdecker
|
||||
ms.date: 09/07/2017
|
||||
ms.date: 03/16/2018
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
@ -18,9 +18,13 @@ ms.localizationpriority: medium
|
||||
|
||||
Troubleshoot common problems, including setup issues, Exchange ActiveSync errors.
|
||||
|
||||
The [Surface Hub Hardware Diagnostic tool](https://www.microsoft.com/store/p/surface-hub-hardware-diagnostic/9nblggh51f2g?rtc=1&activetab=pivot%3aoverviewtab) contains interactive tests which allow you to confirm essential functionality of your Hub is working as expected. In addition to testing hardware, the diagnostic can test the resource account to verify that it is configured properly for your environment. If problems are encountered, results can be saved and shared with the Surface Hub Support Team. For usage information, see [Using the Surface Hub Hardware Diagnostic Tool to test a device account](https://support.microsoft.com/help/4077574/using-the-surface-hub-hardware-diagnostic-tool-to-test-a-device-accoun).
|
||||
|
||||
Common issues are listed in the following table, along with causes and possible fixes. The [Setup troubleshooting](#setup-troubleshooting) section contains a listing of on-device problems, along with several types of issues that may be encountered during the first-run experience. The [Exchange ActiveSync errors](#exchange-activesync-errors) section lists common errors the device may encounter when trying to synchronize with an Microsoft Exchange ActiveSync server.
|
||||
|
||||
|
||||
|
||||
|
||||
## Setup troubleshooting
|
||||
|
||||
|
||||
|
@ -21,6 +21,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "jdecker",
|
||||
"ms.date": "05/09/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.surface"
|
||||
|
@ -20,11 +20,14 @@
|
||||
"audience": "windows-education",
|
||||
"ms.topic": "article",
|
||||
"breadcrumb_path": "/education/breadcrumb/toc.json",
|
||||
"ms.date": "05/09/2017",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.education"
|
||||
}
|
||||
"ms.date": "05/09/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.education"
|
||||
}
|
||||
}
|
||||
},
|
||||
"externalReference": [
|
||||
|
@ -18,7 +18,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage">
|
||||
<img data-hoverimage="/media/common/i_advanced.svg" src="/media/common/i_advanced.svg" alt="Learn more about Microsoft Education products." />
|
||||
<img data-hoverimage="/media/common/i_advanced.svg" src="/media/common/i_advanced.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -36,7 +36,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage">
|
||||
<img data-hoverimage="/media/common/i_get-started.svg" src="/media/common/i_get-started.svg" alt="For IT Pros: Get started with Microsoft Education" />
|
||||
<img data-hoverimage="/media/common/i_get-started.svg" src="/media/common/i_get-started.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -54,7 +54,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage">
|
||||
<img data-hoverimage="/media/common/i_download-install.svg" src="/media/common/i_download-install.svg" alt="Test Windows 10 S for education" />
|
||||
<img data-hoverimage="/media/common/i_download-install.svg" src="/media/common/i_download-install.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -88,7 +88,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/M365-education.svg" alt="Learn about Microsoft 365 Education" />
|
||||
<img src="images/M365-education.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -107,7 +107,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-get-started.svg" alt="For IT Pros: Get started with Microsoft Education" />
|
||||
<img src="/media/hubs/education/education-pro-get-started.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -126,7 +126,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-office365.svg" alt="Office 365 for Education" />
|
||||
<img src="/media/hubs/education/education-pro-office365.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -145,7 +145,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-intune.svg" alt="Microsoft Intune for Education" />
|
||||
<img src="/media/hubs/education/education-pro-intune.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -164,7 +164,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-windows10.svg" alt="Windows 10 for Education" />
|
||||
<img src="/media/hubs/education/education-pro-windows10.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -183,7 +183,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-school-data.svg" alt="School Data Sync" />
|
||||
<img src="/media/hubs/education/education-pro-school-data.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -202,7 +202,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-azure-directory.svg" alt="Azure Active Directory" />
|
||||
<img src="/media/hubs/education/education-pro-azure-directory.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -221,7 +221,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-store.svg" alt="Microsoft Store for Education" />
|
||||
<img src="/media/hubs/education/education-pro-store.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -240,7 +240,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-minecraft.svg" alt="Minecraft: Educaton Edition" />
|
||||
<img src="/media/hubs/education/education-pro-minecraft.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -259,7 +259,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-pro-usb.svg" alt="Set up School PCs" />
|
||||
<img src="images/education-pro-usb.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -272,18 +272,18 @@ ms.date: 10/30/2017
|
||||
</a>
|
||||
</li>
|
||||
<li>
|
||||
<a href="https://onedrive.live.com/view.aspx?resid=91F4E618548FC604!2261&ithint=file%2cdocx&app=Word&authkey=!AOgLvpbaerOOfwM" target="_blank">
|
||||
<a href="https://docs.microsoft.com/en-us/microsoftteams/teams-quick-start-edu" target="_blank">
|
||||
<div class="cardSize">
|
||||
<div class="cardPadding">
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-ms-teams.svg" alt="Meet Microsoft Teams" />
|
||||
<img src="images/education-ms-teams.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
<h3>Microsoft Teams</h3>
|
||||
<p>Make the most of Microsoft Teams and find out how to deploy, launch pilot teams, and launch Teams to the rest of your institution.</p>
|
||||
<p>Make the most of Microsoft Teams and find out how to deploy, launch pilot teams, and launch Teams to the rest of your organization.</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
@ -312,7 +312,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-teachers-office-help.svg" alt="Office help and training" />
|
||||
<img src="/media/hubs/education/education-teachers-office-help.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -331,7 +331,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-teachers-windows-help.svg" alt="Windows help" />
|
||||
<img src="/media/hubs/education/education-teachers-windows-help.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -350,7 +350,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-store.svg" alt="Microsoft Store for Education" />
|
||||
<img src="/media/hubs/education/education-pro-store.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -369,7 +369,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-pro-minecraft.svg" alt="Minecraft: Education Edition" />
|
||||
<img src="/media/hubs/education/education-pro-minecraft.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -388,7 +388,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-teachers-educator-community.svg" alt="Microsoft Educator Community" />
|
||||
<img src="/media/hubs/education/education-teachers-educator-community.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -407,7 +407,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-ms-teams.svg" alt="Meet Microsoft Teams" />
|
||||
<img src="images/education-ms-teams.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -426,7 +426,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-pro-usb.svg" alt="Set up School PCs" />
|
||||
<img src="images/education-pro-usb.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -460,7 +460,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-students-help.svg" alt="Get started for students" />
|
||||
<img src="/media/hubs/education/education-students-help.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -479,7 +479,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-students-office-help.svg" alt="Office help and training" />
|
||||
<img src="/media/hubs/education/education-students-office-help.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -498,7 +498,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-students-windows-help.svg" alt="Windows help" />
|
||||
<img src="/media/hubs/education/education-students-windows-help.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -517,7 +517,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-students-imagine.svg" alt="Microsoft Imagine" />
|
||||
<img src="/media/hubs/education/education-students-imagine.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -551,7 +551,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-developers-uwp-apps.svg" alt="UWP apps for education" />
|
||||
<img src="/media/hubs/education/education-developers-uwp-apps.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -570,7 +570,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-developers-api-test.svg" alt="Take a Test API" />
|
||||
<img src="/media/hubs/education/education-developers-api-test.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -589,7 +589,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="/media/hubs/education/education-developers-office-education.svg" alt="Office Education Dev Center" />
|
||||
<img src="/media/hubs/education/education-developers-office-education.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -623,7 +623,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-partner-mepn-1.svg" alt="Microsoft Education Partner Network" />
|
||||
<img src="images/education-partner-mepn-1.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -642,7 +642,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-partner-aep-2.svg" alt="Authorized Education Partner home page" />
|
||||
<img src="images/education-partner-aep-2.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -661,7 +661,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-partner-directory-3.svg" alt="Authorized Education Partner directory" />
|
||||
<img src="images/education-partner-directory-3.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
@ -680,7 +680,7 @@ ms.date: 10/30/2017
|
||||
<div class="card">
|
||||
<div class="cardImageOuter">
|
||||
<div class="cardImage bgdAccent1">
|
||||
<img src="images/education-partner-yammer.svg" alt="Education Partner community Yammer group" />
|
||||
<img src="images/education-partner-yammer.svg" alt="" />
|
||||
</div>
|
||||
</div>
|
||||
<div class="cardText">
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: edu
|
||||
ROBOTS: noindex,nofollow
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 01/12/2017
|
||||
ms.date: 03/18/2018
|
||||
---
|
||||
|
||||
# Educator Trial in a Box Guide
|
||||
@ -186,6 +186,15 @@ Bring out the best in students by providing a platform for collaborating, explor
|
||||
| <iframe width="420" height="236" src="https://www.youtube-nocookie.com/embed/hMmRud4B54o" frameborder="0" allowfullscreen></iframe></br>Watch teachers elevate the education of students using OneNote. | <iframe width="420" height="236" src="https://www.youtube.com/embed/hl9ZQiektJE" frameborder="0" allowfullscreen></iframe></br>Here what other teachers say about using Minecraft: Education Edition in their classrooms. |
|
||||
| | |
|
||||
|
||||
## Update your apps
|
||||
|
||||
Microsoft Education works hard to bring you the most current Trial in a Box program experience. As a result, you may need to update your apps to get our latest innovations.
|
||||
|
||||
For more information about checking for updates, and how to optionally turn on automatic app updates, see the following articles:
|
||||
|
||||
- [Check updates for apps and games from Microsoft Store](https://support.microsoft.com/en-us/help/4026259/microsoft-store-check-updates-for-apps-and-games)
|
||||
|
||||
- [Turn on automatic app updates](https://support.microsoft.com/en-us/help/15081/windows-turn-on-automatic-app-updates)
|
||||
|
||||
## Get more info
|
||||
* Learn more at <a href="https://www.microsoft.com/education" target="_blank">microsoft.com/education</a>
|
||||
|
@ -11,7 +11,7 @@ ms.pagetype: edu
|
||||
ROBOTS: noindex,nofollow
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 12/11/2017
|
||||
ms.date: 03/18/2018
|
||||
---
|
||||
|
||||
# IT Admin Trial in a Box Guide
|
||||
@ -259,6 +259,16 @@ Follow these instructions to confirm if you configured your tenant correctly and
|
||||
3. In the **Downloads and updates** page, click **Get updates**.
|
||||
* [Try the BYOD scenario](https://docs.microsoft.com/en-us/education/get-started/finish-setup-and-other-tasks#connect-other-devices-to-your-cloud-infrastructure)
|
||||
|
||||
## Update your apps
|
||||
|
||||
Microsoft Education works hard to bring you the most current Trial in a Box program experience. As a result, you may need to update your apps to get our latest innovations.
|
||||
|
||||
For more information about checking for updates, and how to optionally turn on automatic app updates, see the following articles:
|
||||
|
||||
- [Check updates for apps and games from Microsoft Store](https://support.microsoft.com/en-us/help/4026259/microsoft-store-check-updates-for-apps-and-games)
|
||||
|
||||
- [Turn on automatic app updates](https://support.microsoft.com/en-us/help/15081/windows-turn-on-automatic-app-updates)
|
||||
|
||||
|
||||
## Get more info
|
||||
* Learn more at <a href="https://www.microsoft.com/education" target="_blank">microsoft.com/education</a>
|
||||
|
@ -11,13 +11,23 @@ ms.pagetype: edu
|
||||
ROBOTS: noindex,nofollow
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 12/11/2017
|
||||
ms.date: 03/18/2018
|
||||
---
|
||||
|
||||
# Microsoft Education Trial in a Box Support
|
||||
Need help or have a question about using Microsoft Education? Start here.
|
||||
|
||||
## 1. Confirm your admin contact information is current
|
||||
## 1. Update your apps
|
||||
|
||||
Microsoft Education works hard to bring you the most current Trial in a Box program experience. As a result, you may need to update your apps to get our latest innovations.
|
||||
|
||||
For more information about checking for updates, and how to optionally turn on automatic app updates, see the following articles:
|
||||
|
||||
- [Check updates for apps and games from Microsoft Store](https://support.microsoft.com/en-us/help/4026259/microsoft-store-check-updates-for-apps-and-games)
|
||||
|
||||
- [Turn on automatic app updates](https://support.microsoft.com/en-us/help/15081/windows-turn-on-automatic-app-updates)
|
||||
|
||||
## 2. Confirm your admin contact information is current
|
||||
|
||||
1. Go to the <a href="https://portal.office.com/adminportal/home" target="_blank">Office 365 admin center</a> and sign in with your Office 365 admin credentials.
|
||||
2. In the admin center dashboard, select your profile on the upper righthand corner and select **My account** from the options.
|
||||
@ -30,7 +40,7 @@ Need help or have a question about using Microsoft Education? Start here.
|
||||
|
||||
4. Click **Save**.
|
||||
|
||||
## 2. Request a call back
|
||||
## 3. Request a call back
|
||||
|
||||
1. Click the **Need help?** button in the lower right-hand corner of the Office 365 console.
|
||||
|
||||
|
@ -8,13 +8,19 @@ ms.sitesec: library
|
||||
ms.pagetype: edu
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 11/27/2017
|
||||
ms.date: 03/08/2018
|
||||
---
|
||||
|
||||
# Change history for Windows 10 for Education
|
||||
|
||||
This topic lists new and updated topics in the [Windows 10 for Education](index.md) documentation.
|
||||
|
||||
## March 2018
|
||||
|
||||
New or changed topic | Description
|
||||
--- | ---
|
||||
[Reset devices with Windows Automatic Redeployment](windows-automatic-redeployment.md) | Added section for troubleshooting Windows Automatic Redeployment.
|
||||
|
||||
## November 2017
|
||||
|
||||
| New or changed topic | Description |
|
||||
|
@ -1,312 +1,309 @@
|
||||
---
|
||||
title: Set up School PCs app technical reference
|
||||
description: Describes the changes that the Set up School PCs app makes to a PC.
|
||||
keywords: shared cart, shared PC, school, set up school pcs
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.sitesec: library
|
||||
ms.pagetype: edu
|
||||
ms.localizationpriority: high
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 02/02/2018
|
||||
---
|
||||
|
||||
# Technical reference for the Set up School PCs app
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
|
||||
|
||||
|
||||
The **Set up School PCs** app helps you set up new Windows 10 PCs that work great in your school by configuring shared PC mode. The latest Set up School PCs app is available for Windows 10, version 1703 (Creators Update). Set up School PCs also configures school-specific settings and policies, described in this topic.
|
||||
|
||||
If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up School PCs app will create a setup file that joins the PC to your Azure Active Directory tenant. You can also use the app to set up school PCs that anyone can use, with or without Internet connectivity.
|
||||
|
||||
Here's a list of what you get when using the Set up School PCs app in your school.
|
||||
|
||||
| Feature | No Internet | Azure AD | Office 365 | Azure AD Premium |
|
||||
| --- | :---: | :---: | :---: | :---: |
|
||||
| **Fast sign-in**<br/>Each student can sign in and start using the computer in less than a minute, even on their first sign-in. | X | X | X | X |
|
||||
| **Custom Start experience**<br/>The apps students need are pinned to Start, and unnecessary apps are removed. | X | X | X | X |
|
||||
| **Guest account, no sign-in required**<br/>This option sets up computers for common use. Anyone can use the computer without an account. | X | X | X | X |
|
||||
| **School policies**<br/>Settings specific to education create a useful learning environment and the best computer performance. | X | X | X | X |
|
||||
| **Azure AD Join**<br/>The computers are joined to your Azure AD or Office 365 subscription for centralized management. | | X | X | X |
|
||||
| **Single sign-on to Office 365**<br/>By signing on with student IDs, students have fast access to Office 365 web apps or installed Office apps. | | | X | X |
|
||||
| **Take a Test**<br/>Configure the Take a Test app and use it for taking quizzes and high-stakes assessments by some providers like Smarter Balanced. | | | | X |
|
||||
| **[Settings roaming](https://azure.microsoft.com/en-us/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) via Azure AD**<br/>Student user and application settings data can be synchronized across devices for a personalized experience. | | | | X |
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> If your school uses Active Directory, use [Windows Configuration Designer](set-up-students-pcs-to-join-domain.md) to configure your PCs to join the domain. You can only use the Set up School PCs app to set up PCs that are connected to Azure AD.
|
||||
|
||||
## Automated Azure AD join
|
||||
One of the most important features in Set up School PCs is the ability to create a provisioning package that performs automated Azure AD join. With this feature, you no longer have to spend minutes going through Windows setup, manually connecting to a network, and manually joining your Azure AD domain. With the automated Azure AD join feature in Set up School School PCs, this process is reduced to zero clicks! You can skip all of the Windows setup experience and the OS automatically joins the PC to your Azure AD domain and enrolls it into MDM if you have a MDM provider activated.
|
||||
|
||||
To make this as seamless as possible, in your Azure AD tenant:
|
||||
- Allow your teacher and other IT staff to join devices to Azure AD so they can sucessfully request an automated Azure AD join token.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and in **Users may join devices to Azure AD**, click **Selected** and choose the members you want to enable to join devices to Azure AD.
|
||||
|
||||
**Figure 1** - Select the users you want to enable to join devices to Azure AD
|
||||
|
||||

|
||||
|
||||
- Consider creating a special account that uses a username and password that you provide, and which has the rights to join devices if you don't want to add all teachers and IT staff.
|
||||
- When teachers or IT staff need to set up PCs, they can use this account in the Set up School PCs app.
|
||||
- If you use a service to set up PCs for you, you can give them this special account so they can deliver PCs to you that are already Azure AD joined and ready to be given to a student.
|
||||
|
||||
- Turn off multifactor authentication.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and set **Require Multi-Factor Auth to join devices** to **No**.
|
||||
|
||||
**Figure 2** - Turn off multi-factor authentication in Azure AD
|
||||
|
||||

|
||||
|
||||
- Set the maximum number of devices a user can add to unlimited.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and set **Maximum number of devices per user** to **Unlimited**.
|
||||
|
||||
**Figure 3** - Set maximum number of devices per user to unlimited
|
||||
|
||||

|
||||
|
||||
- Clear your Azure AD tokens from time to time. Your tenant can only have 500 automated Azure AD tokens active at any one time.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > All users** and look at the list of user names. User names that start with **package_** followed by a string of letters and numbers. These are the user accounts that are created automatically for the tokens and you can safely delete these.
|
||||
|
||||
**Figure 4** - Delete the accounts automatically created for the Azure AD tokens
|
||||
|
||||

|
||||
|
||||
- Note that automated Azure AD tokens have expiration dates. Set up School PCs creates them with an expiration date of one month. You will see the specific expiration date for the package in the **Review package summary** page in Set up School PCs.
|
||||
|
||||
**Figure 5** - Sample summary page showing the expiration date
|
||||
|
||||

|
||||
|
||||
|
||||
<!-- When the MSES Get Started goes live, add a link to it from here -->
|
||||
|
||||
|
||||
## Information about Windows Update
|
||||
|
||||
Shared PC mode helps ensure that computers are always up-to-date. If a PC is configured using the Set up School PCs app, shared PC mode sets the power states and Windows Update to:
|
||||
* Wake nightly
|
||||
* Check and install updates
|
||||
* Forcibly reboot if necessary to finish applying updates
|
||||
|
||||
The PC is also configured to not interrupt the user during normal daytime hours with updates or reboots. Notfications are also blocked.
|
||||
|
||||
## Guidance for accounts on shared PCs
|
||||
|
||||
* We recommend no local admin accounts on the PC to improve the reliability and security of the PC.
|
||||
* When a PC is set up in shared PC mode with the default deletion policy, accounts will be cached automatically until disk space is low. Then, accounts will be deleted to reclaim disk space. This account management happens automatically. Both Azure AD and Active Directory domain accounts are managed in this way. Any accounts created through **Guest** or **Kiosk** will also be deleted automatically at sign out.
|
||||
* On a Windows PC joined to Azure Active Directory:
|
||||
* By default, the account that joined the PC to Azure AD will have an admin account on that PC. Global administrators for the Azure AD domain will also have admin accounts on the PC.
|
||||
* With Azure AD Premium, you can specify which accounts have admin accounts on a PC using the **Additional administrators on Azure AD Joined devices** setting on the Azure portal.
|
||||
* Local accounts that already exist on a PC won’t be deleted when turning on shared PC mode. New local accounts created through **Settings > Accounts > Other people > Add someone else to this PC** after shared PC mode is turned on won't be deleted. However, any new local accounts created by the **Guest** or **Kiosk** selection on the sign-in screen, if enabled, will automatically be deleted at sign-out.
|
||||
* If admin accounts are necessary on the PC
|
||||
* Ensure the PC is joined to a domain that enables accounts to be signed on as admin, or
|
||||
* Create admin accounts before setting up shared PC mode, or
|
||||
* Create exempt accounts before signing out.
|
||||
* The account management service supports accounts that are exempt from deletion.
|
||||
* An account can be marked exempt from deletion by adding the account SID to the `HKEY_LOCAL_MACHINE\SOFTARE\Microsoft\Windows\CurrentVersion\SharedPC\Exemptions\` registry key.
|
||||
* To add the account SID to the registry key using PowerShell:
|
||||
|
||||
```
|
||||
$adminName = "LocalAdmin"
|
||||
$adminPass = 'Pa$$word123'
|
||||
iex "net user /add $adminName $adminPass"
|
||||
$user = New-Object System.Security.Principal.NTAccount($adminName)
|
||||
$sid = $user.Translate([System.Security.Principal.SecurityIdentifier])
|
||||
$sid = $sid.Value;
|
||||
New-Item -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\SharedPC\Exemptions\$sid" -Force
|
||||
```
|
||||
|
||||
## Custom images
|
||||
Shared PC mode is fully compatible with custom images that may be created by IT departments. Create a custom image and then use sysprep with the `/oobe` flag to create an image that teachers can then apply the Set up School PCs provisioning package to. [Learn more about sysprep](https://technet.microsoft.com/en-us/library/cc721940(v=ws.10).aspx).
|
||||
|
||||
## Provisioning package details
|
||||
|
||||
The Set up School PCs app produces a specialized provisioning package that makes use of the [SharedPC configuration service provider (CSP)](https://msdn.microsoft.com/en-us/library/windows/hardware/mt723294%28v=vs.85%29.aspx).
|
||||
|
||||
### Education customizations set by local MDM policy
|
||||
|
||||
- By default, saving content locally to the PC is blocked, but you can choose to enable it. This prevents data loss by forcing students to save to the cloud.
|
||||
- A custom Start layout, taskbar layout, and lock screen image are set.
|
||||
- Prohibits unlocking the PC to developer mode.
|
||||
- Prohibits untrusted Microsoft Store apps from being installed.
|
||||
- Prohibits students from removing MDM.
|
||||
- Prohibits students from adding new provisioning packages.
|
||||
- Prohibits student from removing existing provisioning packages (including the one set by Set up School PCs).
|
||||
- Sets Windows Update to update nightly.
|
||||
|
||||
|
||||
### Uninstalled apps
|
||||
|
||||
- 3D Builder (Microsoft.3DBuilder_8wekyb3d8bbwe)
|
||||
- Weather (Microsoft.BingWeather_8wekyb3d8bbwe)
|
||||
- Tips (Microsoft.Getstarted_8wekyb3d8bbwe)
|
||||
- Get Office (Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe)
|
||||
- Microsoft Solitaire Collection (Microsoft.MicrosoftSolitaireCollection_8wekyb3d8bbwe)
|
||||
- Paid Wi-Fi & Cellular (Microsoft.OneConnect_8wekyb3d8bbwe)
|
||||
- Feedback Hub (Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe)
|
||||
- Xbox (Microsoft.XboxApp_8wekyb3d8bbwe)
|
||||
- Mail/Calendar (microsoft.windowscommunicationsapps_8wekyb3d8bbwe)
|
||||
|
||||
### Local Group Policies
|
||||
|
||||
> [!IMPORTANT]
|
||||
> We do not recommend setting additional policies on PCs configured with the Set up School PCs app. The shared PC mode is optimized to be fast and reliable over time with minimal to no manual maintenance required.
|
||||
|
||||
<table border="1">
|
||||
<thead><tr><th colspan="2"><p>Policy path</p></th></tr>
|
||||
<tr><th><p>Policy name</p></th><th><p>Value</p></th>
|
||||
</tr> </thead>
|
||||
<tbody>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>Control Panel</strong> > <strong>Personalization</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Prevent enabling lock screen slide show</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Prevent changing lock screen and logon image</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>System</strong> > <strong>Power Management</strong> > <strong>Button Settings</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Power button action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Power button action (on battery)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Sleep button action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the lid switch action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the lid switch action (on battery)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>System</strong> > <strong>Power Management</strong> > <strong>Sleep Settings</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Require a password when a computer wakes (plugged in)</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Require a password when a computer wakes (on battery)</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Specify the system sleep timeout (plugged in)</p></td><td><p> 5 minutes</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Specify the system sleep timeout (on battery)</p></td><td><p> 5 minutes</p></td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off hybrid sleep (plugged in) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off hybrid sleep (on battery) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the unattended sleep timeout (plugged in) </p> </td> <td> <p> 5 minutes </p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the unattended sleep timeout (on battery) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow standby states (S1-S3) when sleeping (plugged in) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow standby states (S1-S3) when sleeping (on battery) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the system hibernate timeout (plugged in) </p> </td> <td> <p> Enabled, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the system hibernate timeout (on battery) </p> </td> <td> <p> Enabled, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Power Management</strong>><strong>Video and Display Settings</strong></p> </td> </tr>
|
||||
<tr> <td> <p> Turn off the display (plugged in) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off the display (on battery) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Power Management</strong>><strong>Energy Saver Settings</strong></p> </td> </tr>
|
||||
<tr> <td> <p> Energy Saver Battery Threshold (on battery) </p> </td> <td> <p> 70</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Logon</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Show first sign-in animation </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Hide entry points for Fast User Switching </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn on convenience PIN sign-in </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off picture password sign-in </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off app notification on the lock screen </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow users to select when a password is required when resuming from connected standby</p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Block user from showing account details on sign-in </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>User Profiles</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off the advertising ID </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Biometrics</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow the use of biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow users to log on using biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow domain users to log on using biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Cloud Content</strong></td></tr>
|
||||
<tr> <td> <p> Do not show Windows Tips </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off Microsoft consumer experiences </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Data Collection and Preview Builds</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Toggle user control over Insider builds </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Disable pre-release features or settings </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Do not show feedback notifications </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow Telemetry </p> </td> <td> <p> Basic, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>File Explorer</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Show lock in the user tile menu </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>Maintenance Scheduler</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance Activation Boundary </p> </td> <td> <p> *MaintenanceStartTime*</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance Random Delay </p> </td> <td> <p> Enabled, 2 hours</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance WakeUp Policy </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>OneDrive</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Prevent the usage of OneDrive for file storage </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>Windows Hello for Business</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use phone sign-in </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use Windows Hello for Business </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Windows Settings</strong> > <strong>Security Settings</strong> > <strong>Local Policies</strong> > <strong>Security Options</strong></p> </td>
|
||||
</tr>
|
||||
<tr><td><p>Accounts: Block Microsoft accounts</p><p>**Note** Microsoft accounts can still be used in apps.</p></td><td><p>Enabled</p></td></tr>
|
||||
<tr> <td> <p> Interactive logon: Do not display last user name </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Interactive logon: Sign-in last interactive user automatically after a system-initiated restart</p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Shutdown: Allow system to be shut down without having to log on </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> User Account Control: Behavior of the elevation prompt for standard users </p> </td> <td> <p> Auto deny</p> </td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table> </br>
|
||||
|
||||
## Use the app
|
||||
When you're ready to use the app, see [Use Set up School PCs app](use-set-up-school-pcs-app.md).
|
||||
|
||||
## Related topics
|
||||
|
||||
[Set up Windows devices for education](set-up-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
---
|
||||
title: Set up School PCs app technical reference
|
||||
description: Describes the changes that the Set up School PCs app makes to a PC.
|
||||
keywords: shared cart, shared PC, school, set up school pcs
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: plan
|
||||
ms.sitesec: library
|
||||
ms.pagetype: edu
|
||||
ms.localizationpriority: high
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Technical reference for the Set up School PCs app
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
|
||||
|
||||
|
||||
The **Set up School PCs** app helps you set up new Windows 10 PCs that work great in your school by configuring shared PC mode. The latest Set up School PCs app is available for Windows 10, version 1703 (Creators Update). Set up School PCs also configures school-specific settings and policies, described in this topic.
|
||||
|
||||
If your school uses Azure Active Directory (Azure AD) or Office 365, the Set up School PCs app will create a setup file that joins the PC to your Azure Active Directory tenant. You can also use the app to set up school PCs that anyone can use, with or without Internet connectivity.
|
||||
|
||||
Here's a list of what you get when using the Set up School PCs app in your school.
|
||||
|
||||
| Feature | No Internet | Azure AD | Office 365 | Azure AD Premium |
|
||||
| --- | :---: | :---: | :---: | :---: |
|
||||
| **Fast sign-in**<br/>Each student can sign in and start using the computer in less than a minute, even on their first sign-in. | X | X | X | X |
|
||||
| **Custom Start experience**<br/>The apps students need are pinned to Start, and unnecessary apps are removed. | X | X | X | X |
|
||||
| **Guest account, no sign-in required**<br/>This option sets up computers for common use. Anyone can use the computer without an account. | X | X | X | X |
|
||||
| **School policies**<br/>Settings specific to education create a useful learning environment and the best computer performance. | X | X | X | X |
|
||||
| **Azure AD Join**<br/>The computers are joined to your Azure AD or Office 365 subscription for centralized management. | | X | X | X |
|
||||
| **Single sign-on to Office 365**<br/>By signing on with student IDs, students have fast access to Office 365 web apps or installed Office apps. | | | X | X |
|
||||
| **Take a Test**<br/>Configure the Take a Test app and use it for taking quizzes and high-stakes assessments by some providers like Smarter Balanced. | | | | X |
|
||||
| **[Settings roaming](https://azure.microsoft.com/en-us/documentation/articles/active-directory-windows-enterprise-state-roaming-overview/) via Azure AD**<br/>Student user and application settings data can be synchronized across devices for a personalized experience. | | | | X |
|
||||
|
||||
|
||||
> [!NOTE]
|
||||
> If your school uses Active Directory, use [Windows Configuration Designer](set-up-students-pcs-to-join-domain.md) to configure your PCs to join the domain. You can only use the Set up School PCs app to set up PCs that are connected to Azure AD.
|
||||
|
||||
## Automated Azure AD join
|
||||
One of the most important features in Set up School PCs is the ability to create a provisioning package that performs automated Azure AD join. With this feature, you no longer have to spend minutes going through Windows setup, manually connecting to a network, and manually joining your Azure AD domain. With the automated Azure AD join feature in Set up School School PCs, this process is reduced to zero clicks! You can skip all of the Windows setup experience and the OS automatically joins the PC to your Azure AD domain and enrolls it into MDM if you have a MDM provider activated.
|
||||
|
||||
To make this as seamless as possible, in your Azure AD tenant:
|
||||
- Allow your teacher and other IT staff to join devices to Azure AD so they can sucessfully request an automated Azure AD join token.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and in **Users may join devices to Azure AD**, click **Selected** and choose the members you want to enable to join devices to Azure AD.
|
||||
|
||||
**Figure 1** - Select the users you want to enable to join devices to Azure AD
|
||||
|
||||

|
||||
|
||||
- Consider creating a special account that uses a username and password that you provide, and which has the rights to join devices if you don't want to add all teachers and IT staff.
|
||||
- When teachers or IT staff need to set up PCs, they can use this account in the Set up School PCs app.
|
||||
- If you use a service to set up PCs for you, you can give them this special account so they can deliver PCs to you that are already Azure AD joined and ready to be given to a student.
|
||||
|
||||
- Turn off multifactor authentication.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and set **Require Multi-Factor Auth to join devices** to **No**.
|
||||
|
||||
**Figure 2** - Turn off multi-factor authentication in Azure AD
|
||||
|
||||

|
||||
|
||||
- Set the maximum number of devices a user can add to unlimited.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > Device Settings** and set **Maximum number of devices per user** to **Unlimited**.
|
||||
|
||||
**Figure 3** - Set maximum number of devices per user to unlimited
|
||||
|
||||

|
||||
|
||||
- Clear your Azure AD tokens from time to time. Your tenant can only have 500 automated Azure AD tokens active at any one time.
|
||||
|
||||
In the Azure portal, select **Azure Active Directory**. Go to **Users and groups > All users** and look at the list of user names. User names that start with **package_** followed by a string of letters and numbers. These are the user accounts that are created automatically for the tokens and you can safely delete these.
|
||||
|
||||
**Figure 4** - Delete the accounts automatically created for the Azure AD tokens
|
||||
|
||||

|
||||
|
||||
- Note that automated Azure AD tokens have expiration dates. Set up School PCs creates them with an expiration date of one month. You will see the specific expiration date for the package in the **Review package summary** page in Set up School PCs.
|
||||
|
||||
**Figure 5** - Sample summary page showing the expiration date
|
||||
|
||||

|
||||
|
||||
|
||||
<!-- When the MSES Get Started goes live, add a link to it from here -->
|
||||
|
||||
|
||||
## Information about Windows Update
|
||||
|
||||
Shared PC mode helps ensure that computers are always up-to-date. If a PC is configured using the Set up School PCs app, shared PC mode sets the power states and Windows Update to:
|
||||
* Wake nightly
|
||||
* Check and install updates
|
||||
* Forcibly reboot if necessary to finish applying updates
|
||||
|
||||
The PC is also configured to not interrupt the user during normal daytime hours with updates or reboots. Notfications are also blocked.
|
||||
|
||||
## Guidance for accounts on shared PCs
|
||||
|
||||
* We recommend no local admin accounts on the PC to improve the reliability and security of the PC.
|
||||
* When a PC is set up in shared PC mode with the default deletion policy, accounts will be cached automatically until disk space is low. Then, accounts will be deleted to reclaim disk space. This account management happens automatically. Both Azure AD and Active Directory domain accounts are managed in this way. Any accounts created through **Guest** or **Kiosk** will also be deleted automatically at sign out.
|
||||
* On a Windows PC joined to Azure Active Directory:
|
||||
* By default, the account that joined the PC to Azure AD will have an admin account on that PC. Global administrators for the Azure AD domain will also have admin accounts on the PC.
|
||||
* With Azure AD Premium, you can specify which accounts have admin accounts on a PC using the **Additional administrators on Azure AD Joined devices** setting on the Azure portal.
|
||||
* Local accounts that already exist on a PC won’t be deleted when turning on shared PC mode. New local accounts created through **Settings > Accounts > Other people > Add someone else to this PC** after shared PC mode is turned on won't be deleted. However, any new local accounts created by the **Guest** or **Kiosk** selection on the sign-in screen, if enabled, will automatically be deleted at sign-out.
|
||||
* If admin accounts are necessary on the PC
|
||||
* Ensure the PC is joined to a domain that enables accounts to be signed on as admin, or
|
||||
* Create admin accounts before setting up shared PC mode, or
|
||||
* Create exempt accounts before signing out.
|
||||
* The account management service supports accounts that are exempt from deletion.
|
||||
* An account can be marked exempt from deletion by adding the account SID to the `HKEY_LOCAL_MACHINE\SOFTARE\Microsoft\Windows\CurrentVersion\SharedPC\Exemptions\` registry key.
|
||||
* To add the account SID to the registry key using PowerShell:
|
||||
|
||||
```
|
||||
$adminName = "LocalAdmin"
|
||||
$adminPass = 'Pa$$word123'
|
||||
iex "net user /add $adminName $adminPass"
|
||||
$user = New-Object System.Security.Principal.NTAccount($adminName)
|
||||
$sid = $user.Translate([System.Security.Principal.SecurityIdentifier])
|
||||
$sid = $sid.Value;
|
||||
New-Item -Path "HKLM:\Software\Microsoft\Windows\CurrentVersion\SharedPC\Exemptions\$sid" -Force
|
||||
```
|
||||
|
||||
## Custom images
|
||||
Shared PC mode is fully compatible with custom images that may be created by IT departments. Create a custom image and then use sysprep with the `/oobe` flag to create an image that teachers can then apply the Set up School PCs provisioning package to. [Learn more about sysprep](https://technet.microsoft.com/en-us/library/cc721940(v=ws.10).aspx).
|
||||
|
||||
## Provisioning package details
|
||||
|
||||
The Set up School PCs app produces a specialized provisioning package that makes use of the [SharedPC configuration service provider (CSP)](https://msdn.microsoft.com/en-us/library/windows/hardware/mt723294%28v=vs.85%29.aspx).
|
||||
|
||||
### Education customizations set by local MDM policy
|
||||
|
||||
- By default, saving content locally to the PC is blocked, but you can choose to enable it. This prevents data loss by forcing students to save to the cloud.
|
||||
- A custom Start layout, taskbar layout, and lock screen image are set.
|
||||
- Prohibits unlocking the PC to developer mode.
|
||||
- Prohibits untrusted Microsoft Store apps from being installed.
|
||||
- Prohibits students from removing MDM.
|
||||
- Prohibits students from adding new provisioning packages.
|
||||
- Prohibits student from removing existing provisioning packages (including the one set by Set up School PCs).
|
||||
- Sets Windows Update to update nightly.
|
||||
|
||||
|
||||
### Uninstalled apps
|
||||
|
||||
- 3D Builder (Microsoft.3DBuilder_8wekyb3d8bbwe)
|
||||
- Weather (Microsoft.BingWeather_8wekyb3d8bbwe)
|
||||
- Tips (Microsoft.Getstarted_8wekyb3d8bbwe)
|
||||
- Get Office (Microsoft.MicrosoftOfficeHub_8wekyb3d8bbwe)
|
||||
- Microsoft Solitaire Collection (Microsoft.MicrosoftSolitaireCollection_8wekyb3d8bbwe)
|
||||
- Paid Wi-Fi & Cellular (Microsoft.OneConnect_8wekyb3d8bbwe)
|
||||
- Feedback Hub (Microsoft.WindowsFeedbackHub_8wekyb3d8bbwe)
|
||||
- Xbox (Microsoft.XboxApp_8wekyb3d8bbwe)
|
||||
- Mail/Calendar (microsoft.windowscommunicationsapps_8wekyb3d8bbwe)
|
||||
|
||||
### Local Group Policies
|
||||
|
||||
> [!IMPORTANT]
|
||||
> We do not recommend setting additional policies on PCs configured with the Set up School PCs app. The shared PC mode is optimized to be fast and reliable over time with minimal to no manual maintenance required.
|
||||
|
||||
<table border="1">
|
||||
<thead><tr><th colspan="2"><p>Policy path</p></th></tr>
|
||||
<tr><th><p>Policy name</p></th><th><p>Value</p></th>
|
||||
</tr> </thead>
|
||||
<tbody>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>Control Panel</strong> > <strong>Personalization</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Prevent enabling lock screen slide show</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Prevent changing lock screen and logon image</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>System</strong> > <strong>Power Management</strong> > <strong>Button Settings</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Power button action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Power button action (on battery)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the Sleep button action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the lid switch action (plugged in)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Select the lid switch action (on battery)</p></td><td><p>Sleep</p></td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><p><strong>Admin Templates</strong> > <strong>System</strong> > <strong>Power Management</strong> > <strong>Sleep Settings</strong></p></td>
|
||||
</tr>
|
||||
<tr><td><p>Require a password when a computer wakes (plugged in)</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Require a password when a computer wakes (on battery)</p></td><td><p>Enabled</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Specify the system sleep timeout (plugged in)</p></td><td><p> 5 minutes</p></td>
|
||||
</tr>
|
||||
<tr><td><p>Specify the system sleep timeout (on battery)</p></td><td><p> 5 minutes</p></td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off hybrid sleep (plugged in) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off hybrid sleep (on battery) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the unattended sleep timeout (plugged in) </p> </td> <td> <p> 5 minutes </p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the unattended sleep timeout (on battery) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow standby states (S1-S3) when sleeping (plugged in) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow standby states (S1-S3) when sleeping (on battery) </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the system hibernate timeout (plugged in) </p> </td> <td> <p> Enabled, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Specify the system hibernate timeout (on battery) </p> </td> <td> <p> Enabled, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Power Management</strong>><strong>Video and Display Settings</strong></p> </td> </tr>
|
||||
<tr> <td> <p> Turn off the display (plugged in) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off the display (on battery) </p> </td> <td> <p> 5 minutes</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Power Management</strong>><strong>Energy Saver Settings</strong></p> </td> </tr>
|
||||
<tr> <td> <p> Energy Saver Battery Threshold (on battery) </p> </td> <td> <p> 70</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>Logon</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Show first sign-in animation </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Hide entry points for Fast User Switching </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn on convenience PIN sign-in </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off picture password sign-in </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off app notification on the lock screen </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow users to select when a password is required when resuming from connected standby</p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Block user from showing account details on sign-in </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>System</strong>><strong>User Profiles</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off the advertising ID </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Biometrics</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow the use of biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow users to log on using biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow domain users to log on using biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr><td colspan="2"><strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Cloud Content</strong></td></tr>
|
||||
<tr> <td> <p> Do not show Windows Tips </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Turn off Microsoft consumer experiences </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong>><strong>Windows Components</strong>><strong>Data Collection and Preview Builds</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Toggle user control over Insider builds </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Disable pre-release features or settings </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Do not show feedback notifications </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Allow Telemetry </p> </td> <td> <p> Basic, 0</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>File Explorer</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Show lock in the user tile menu </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>Maintenance Scheduler</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance Activation Boundary </p> </td> <td> <p> *MaintenanceStartTime*</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance Random Delay </p> </td> <td> <p> Enabled, 2 hours</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Automatic Maintenance WakeUp Policy </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>OneDrive</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Prevent the usage of OneDrive for file storage </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Admin Templates</strong> > <strong>Windows Components</strong> > <strong>Windows Hello for Business</strong></p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use phone sign-in </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use Windows Hello for Business </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Use biometrics </p> </td> <td> <p> Disabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td colspan="2"> <p> <strong>Windows Settings</strong> > <strong>Security Settings</strong> > <strong>Local Policies</strong> > <strong>Security Options</strong></p> </td>
|
||||
</tr>
|
||||
<tr><td><p>Accounts: Block Microsoft accounts</p><p>**Note** Microsoft accounts can still be used in apps.</p></td><td><p>Enabled</p></td></tr>
|
||||
<tr> <td> <p> Interactive logon: Do not display last user name </p> </td> <td> <p> Enabled</p> </td>
|
||||
</tr>
|
||||
<tr> <td> <p> Interactive logon: Sign-in last interactive user automatically after a system-initiated restart</p> </td> <td> <p> Disabled</p> </td>
|
||||
<tr> <td> <p> User Account Control: Behavior of the elevation prompt for standard users </p> </td> <td> <p> Auto deny</p> </td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table> </br>
|
||||
|
||||
## Use the app
|
||||
When you're ready to use the app, see [Use Set up School PCs app](use-set-up-school-pcs-app.md).
|
||||
|
||||
## Related topics
|
||||
|
||||
[Set up Windows devices for education](set-up-windows-10.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -9,7 +9,7 @@ ms.pagetype: edu
|
||||
ms.localizationpriority: high
|
||||
author: CelesteDG
|
||||
ms.author: celested
|
||||
ms.date: 12/11/2017
|
||||
ms.date: 03/08/2018
|
||||
---
|
||||
|
||||
# Reset devices with Windows Automatic Redeployment
|
||||
@ -25,6 +25,9 @@ To enable Windows Automatic Redeployment in Windows 10, version 1709 (Fall Creat
|
||||
2. [Trigger a reset for each device](#trigger-windows-automatic-redeployment)
|
||||
|
||||
## Enable Windows Automatic Redeployment
|
||||
|
||||
To use Windows Automatic Redeployment, [Windows Recovery Environment (WinRE) must be enabled on the device](#winre).
|
||||
|
||||
**DisableAutomaticReDeploymentCredentials** is a policy that enables or disables the visibility of the credentials for Windows Automatic Redeployment. It is a policy node in the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-credentialproviders), **CredentialProviders/DisableAutomaticReDeploymentCredentials**. By default, this policy is set to 1 (Disable). This ensures that Windows Automatic Redeployment isn't triggered by accident.
|
||||
|
||||
You can set the policy using one of these methods:
|
||||
@ -84,6 +87,25 @@ Windows Automatic Redeployment is a two-step process: trigger it and then authen
|
||||
|
||||
Once provisioning is complete, the device is again ready for use.
|
||||
|
||||
<span id="winre"/>
|
||||
## Troubleshoot Windows Automatic Redeployment
|
||||
|
||||
Windows Automatic Redeployment will fail when the [Windows Recovery Environment (WinRE)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference) is not enabled on the device. You will see `Error code: ERROR_NOT_SUPPORTED (0x80070032)`.
|
||||
|
||||
To check if WinRE is enabled, use the [REAgentC.exe tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
||||
|
||||
```
|
||||
reagent /info
|
||||
```
|
||||
|
||||
If WinRE is not enabled, use the [REAgentC.exe tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
||||
|
||||
```
|
||||
reagent /enable
|
||||
```
|
||||
|
||||
If Windows Automatic Reployment fails after enabling WinRE, or if you are unable to enable WinRE, please contact [Microsoft Support](https://support.microsoft.com) for assistance.
|
||||
|
||||
## Related topics
|
||||
|
||||
[Set up Windows devices for education](set-up-windows-10.md)
|
||||
|
@ -31,7 +31,10 @@
|
||||
"externalReference": [],
|
||||
"globalMetadata": {
|
||||
"author": "eross-msft",
|
||||
"ms.author": "lizross"
|
||||
"ms.author": "lizross",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app"
|
||||
},
|
||||
"fileMetadata": {},
|
||||
"template": [],
|
||||
|
@ -22,6 +22,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "jamiet",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "Win.mdop"
|
||||
|
@ -32,7 +32,7 @@ This topic contains the following information about how to secure Microsoft BitL
|
||||
|
||||
## <a href="" id="bkmk-tpm"></a>Configure MBAM to escrow the TPM and store OwnerAuth passwords
|
||||
|
||||
**Note** For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addiiton, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](http://technet.microsoft.com/en-us/itpro/windows/keep-secure/change-the-tpm-owner-password) for further details.
|
||||
**Note** For Windows 10, version 1607 or later, only Windows can take ownership of the TPM. In addition, Windows will not retain the TPM owner password when provisioning the TPM. See [TPM owner password](http://technet.microsoft.com/en-us/itpro/windows/keep-secure/change-the-tpm-owner-password) for further details.
|
||||
|
||||
Depending on its configuration, the Trusted Platform Module (TPM) will lock itself in certain situations ─ such as when too many incorrect passwords are entered ─ and can remain locked for a period of time. During TPM lockout, BitLocker cannot access the encryption keys to perform unlock or decryption operations, requiring the user to enter their BitLocker recovery key to access the operating system drive. To reset TPM lockout, you must provide the TPM OwnerAuth password.
|
||||
|
||||
|
@ -31,6 +31,9 @@
|
||||
"globalMetadata": {
|
||||
"uhfHeaderId": "MSDocsHeader-WindowsIT",
|
||||
"breadcrumb_path": "/windows/smb/breadcrumb/toc.json",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "TechNet.smb"
|
||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.localizationpriority: high
|
||||
ms.date: 10/17/2017
|
||||
ms.date: 3/19/2018
|
||||
---
|
||||
|
||||
# Distribute apps using your private store
|
||||
@ -47,6 +47,9 @@ Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps &
|
||||
|
||||
The value under **Private store** for the app will change to pending. It will take approximately thirty-six hours before the app is available in the private store.
|
||||
|
||||
>[!Note]
|
||||
> If you are working with a new Line-of-Business (LOB) app, you have to wait for the app to be avilable in **Products & services** before adding it to your private store. For more information, see [Working with line of business apps](working-with-line-of-business-apps.md).
|
||||
|
||||
Employees can claim apps that admins added to the private store by doing the following.
|
||||
|
||||
**To claim an app from the private store**
|
||||
@ -57,6 +60,7 @@ Employees can claim apps that admins added to the private store by doing the fol
|
||||
|
||||
## Related topics
|
||||
- [Manage access to private store](manage-access-to-private-store.md)
|
||||
- [Manage private store settings](manage-private-store-settings.md)
|
||||
- [Configure access to Microsoft Store](/windows/configuration/stop-employees-from-using-microsoft-store)
|
||||
|
||||
|
||||
|
@ -37,7 +37,10 @@
|
||||
"ms.technology": "windows",
|
||||
"ms.topic": "article",
|
||||
"ms.date": "05/09/2017",
|
||||
"searchScope": ["Store"],
|
||||
"searchScope": ["Store"],
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "MSDN.store-for-business"
|
||||
|
BIN
store-for-business/images/lob-workflow.png
Normal file
BIN
store-for-business/images/lob-workflow.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 33 KiB |
@ -0,0 +1,59 @@
|
||||
---
|
||||
title: Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
||||
description: Software purchased under Microsoft Products and Services Agreement (MPSA) can be managed in Microsoft Store for Business
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.localizationpriority: high
|
||||
ms.date: 3/20/2018
|
||||
---
|
||||
|
||||
# Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 10 Mobile
|
||||
|
||||
Software purchased with the Microsoft Products and Services Agreement (MPSA) can now be managed in Microsoft Store for Business. This allows customers to manage online software purchases in one location.
|
||||
|
||||
There are a couple of things you might need to set up to manage MPSA software purchases in Store for Business.
|
||||
|
||||
**To manage MPSA software in Microsoft Store for Business**
|
||||
1. Sign in to the [Microsoft Store for Business](http://businessstore.microsoft.com).
|
||||
2. Click **Manage**, and then click **My Organization**.
|
||||
3. Click **Connected tenants** to see purchasing accounts and the tenants that they are connected to.
|
||||
|
||||
## Add tenant
|
||||
The tenant or tenants that are added to your purchasing account control how you can distribute software to people in your organization. If there isn't a tenant listed for your purchasing account, you'll need to add one before you can use or manage the software you've purchased. When we give you a list to choose from, tenants are grouped by domain.
|
||||
|
||||
**To add a tenant to a purchasing account**
|
||||
1. Sign in to the [Microsoft Store for Business](http://businessstore.microsoft.com).
|
||||
2. Click **Manage**, and then click **My Organization**.
|
||||
3. Click **Connected tenants**, and then click the ellipses for a purchasing account without a tenant listed.
|
||||
4. Click **Choose a tenant**, and then click **Submit**.
|
||||
|
||||
If you don't see your tenant in the list, you can add the name of your tenant
|
||||
|
||||
**To add the name of your tenant**
|
||||
1. On **Add a tenant**, click **Don't see your tenant?**.
|
||||
2. Enter a domain name, and then click **Next**, and then click **Done**.
|
||||
|
||||
You'll need to get permissions for the admin that manages the domain you want to add. We'll take you to Business Center Portal where you can manage permissions and roles. The admin will need to be the **Account Manager**.
|
||||
|
||||
## Add global admin
|
||||
In some cases, we might not have info on who the global admin is for the tenant that you select. It might be that the tenant is unmanaged, and you'll need to identify a global admin. Or, you might only need to share account info for the global admin.
|
||||
|
||||
If you need to nominate someone to be the global admin, they need sufficient permissions:
|
||||
- someone who can distribute sofware
|
||||
- in Business Center Portal (BCP), it should be someone with **Agreement Admin** role
|
||||
|
||||
**To add a global admin to a tenant**
|
||||
|
||||
We'll ask for a global admin if we need that info when you add a tenant to a purchasing account. You'd see the request for a global admin before returning to **Store for Business**.
|
||||
|
||||
- On **Add a Global Admin**, click **Make me the Global Admin**, and then click **Submit**.
|
||||
-or-
|
||||
- On **Add a Global Admin**, type a name in **Invite someone else**, and then click **Submit**.
|
@ -282,7 +282,6 @@ Store for Business and Education is currently available in these markets.
|
||||
<li>Philippines</li>
|
||||
<li>Poland</li>
|
||||
<li>Portugal</li>
|
||||
<li>Puerto Rico</li>
|
||||
<li>Qatar</li>
|
||||
<li>Republic of Cabo Verde</li>
|
||||
<li>Reunion</li>
|
||||
@ -358,6 +357,10 @@ Customers in these markets can use Microsoft Store for Business and Education to
|
||||
- Tajikistan
|
||||
- Ukraine
|
||||
|
||||
### Support to only manage products
|
||||
Customers in these markets can use Microsoft Store for Business and Education only to manage products that they've purchased from other channels. For example, they might have purchased products through Volume Licensing Service Center. However, they can't purhcase apps directly from Microsoft Store for Business and Education.
|
||||
- Puerto Rico
|
||||
|
||||
This table summarize what customers can purchase, depending on which Microsoft Store they are using.
|
||||
|
||||
| Store | Free apps | Minecraft: Education Edition |
|
||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: store
|
||||
author: TrudyHa
|
||||
ms.localizationpriority: high
|
||||
ms.date: 10/17/2017
|
||||
ms.date: 3/19/2018
|
||||
---
|
||||
|
||||
# Working with line-of-business apps
|
||||
@ -38,8 +38,10 @@ You'll need to set up:
|
||||
- LOB publishers need to have an active developer account. To learn more about account options, see [Ready to sign up](https://go.microsoft.com/fwlink/p/?LinkId=623432).
|
||||
- LOB publishers need to have an app in Microsoft Store, or have an app ready to submit to the Store.
|
||||
|
||||
## <a href="" id="add-lob-publisher"></a>Add an LOB publisher (Admin)
|
||||
The process and timing look like this:
|
||||

|
||||
|
||||
## <a href="" id="add-lob-publisher"></a>Add an LOB publisher (Admin)
|
||||
Admins need to invite developer or ISVs to become an LOB publisher.
|
||||
|
||||
**To invite a developer to become an LOB publisher**
|
||||
@ -47,6 +49,7 @@ Admins need to invite developer or ISVs to become an LOB publisher.
|
||||
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com).
|
||||
2. Click **Manage**, click **Permissions**, and then choose **Line-of-business publishers**.
|
||||
3. On the Line-of business publishers page, click **Invite** to send an email invitation to a developer.
|
||||
|
||||
>[!Note]
|
||||
> This needs to be the email address listed in contact info for the developer account.
|
||||
|
||||
|
@ -13,7 +13,10 @@ ms.date: 04/19/2017
|
||||
# Performance Guidance for Application Virtualization
|
||||
|
||||
**Applies to**
|
||||
- Windows 10, version 1607
|
||||
- Windows 7 SP1
|
||||
- Windows 10
|
||||
- Server 2012 R2
|
||||
- Server 2016
|
||||
|
||||
Learn how to configure App-V for optimal performance, optimize virtual app packages, and provide a better user experience with RDS and VDI.
|
||||
|
||||
|
@ -6,14 +6,17 @@ ms.pagetype: mdop, appcompat, virtualization
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.prod: w10
|
||||
ms.date: 04/19/2017
|
||||
ms.date: 03/08/2018
|
||||
---
|
||||
|
||||
|
||||
# Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
||||
|
||||
**Applies to**
|
||||
- Windows 10, version 1607
|
||||
- Windows 7 SP1
|
||||
- Windows 10
|
||||
- Windows Server 2012 R2
|
||||
- Windows Server 2016
|
||||
|
||||
You can run a locally installed application in a virtual environment, alongside applications that have been virtualized by using Microsoft Application Virtualization (App-V). You might want to do this if you:
|
||||
|
||||
@ -42,6 +45,7 @@ There is no Group Policy setting available to manage this registry key, so you h
|
||||
|
||||
Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages globally or to the user.
|
||||
|
||||
|
||||
### Steps to create the subkey
|
||||
|
||||
1. Using the information in the following table, create a new registry key using the name of the executable file, for example, **MyApp.exe**.
|
||||
@ -79,7 +83,7 @@ Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages glo
|
||||
<li><p>If you want to include multiple packages in the virtual environment, you must include them in an enabled connection group.</p></li>
|
||||
<li><p>Create only one subkey for one of the packages in the connection group. If, for example, you have one package that is published globally, and another package that is published to the user, you create a subkey for either of these packages, but not both. Although you create a subkey for only one of the packages, all of the packages in the connection group, plus the local application, will be available in the virtual environment.</p></li>
|
||||
<li><p>The key under which you create the subkey must match the publishing method you used for the package.</p>
|
||||
<p>For example, if you published the package to the user, you must create the subkey under <code>HKEY_CURRENT_USER\SOFTWARE\Microsoft\AppV\Client\RunVirtual</code>.</p></li>
|
||||
<p>For example, if you published the package to the user, you must create the subkey under <code>HKEY_CURRENT_USER\SOFTWARE\Microsoft\AppV\Client\RunVirtual</code>. Do not add a key for the same application under both hives.</p></li>
|
||||
</ul></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
|
@ -37,6 +37,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "elizapo",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "MSDN.win-app-management"
|
||||
|
BIN
windows/application-management/media/cmd-type.png
Normal file
BIN
windows/application-management/media/cmd-type.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 25 KiB |
@ -67,8 +67,6 @@ In light of these restrictions, you can use the following methods to manage per-
|
||||
|
||||
You can manage the CDPUserSvc and OneSyncSvc per-user services with a [security template](/windows/device-security/security-policy-settings/administer-security-policy-settings#bkmk-sectmpl). See [Administer security policy settings](/windows/device-security/security-policy-settings/administer-security-policy-settings) for more information.
|
||||
|
||||
device-security/security-policy-settings/administer-security-policy-settings
|
||||
|
||||
For example:
|
||||
|
||||
```
|
||||
@ -113,8 +111,8 @@ If a per-user service can't be disabled using a the security template, you can d
|
||||
|
||||
### Managing Template Services with reg.exe
|
||||
|
||||
If you cannot use GPP to manage the per-user services you can edit the registry with reg.exe.
|
||||
To disable the Template Services change the Startup Type for each service to 4 (disabled).
|
||||
If you cannot use Group Policy Preferences to manage the per-user services, you can edit the registry with reg.exe.
|
||||
To disable the Template Services, change the Startup Type for each service to 4 (disabled).
|
||||
For example:
|
||||
|
||||
```code
|
||||
@ -173,4 +171,10 @@ For example, you might see the following per-user services listed in the Service
|
||||
- ContactData_443f50
|
||||
- Sync Host_443f50
|
||||
- User Data Access_443f50
|
||||
- User Data Storage_443f50
|
||||
- User Data Storage_443f50
|
||||
|
||||
## View per-user services from the command line
|
||||
|
||||
You can query the service configuration from the command line. The **Type** value indicates whether the service is a user-service template or user-service instance.
|
||||
|
||||

|
||||
|
@ -37,6 +37,9 @@
|
||||
"ms.topic": "article",
|
||||
"ms.author": "dongill",
|
||||
"ms.date": "04/05/2017",
|
||||
"feedback_system": "GitHub",
|
||||
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
|
||||
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",
|
||||
"_op_documentIdPathDepotMapping": {
|
||||
"./": {
|
||||
"depot_name": "MSDN.win-client-management"
|
||||
|
@ -180,6 +180,7 @@
|
||||
#### [ActiveXControls](policy-csp-activexcontrols.md)
|
||||
#### [ApplicationDefaults](policy-csp-applicationdefaults.md)
|
||||
#### [ApplicationManagement](policy-csp-applicationmanagement.md)
|
||||
#### [AppRuntime](policy-csp-appruntime.md)
|
||||
#### [AppVirtualization](policy-csp-appvirtualization.md)
|
||||
#### [AttachmentManager](policy-csp-attachmentmanager.md)
|
||||
#### [Authentication](policy-csp-authentication.md)
|
||||
@ -191,6 +192,7 @@
|
||||
#### [Cellular](policy-csp-cellular.md)
|
||||
#### [Connectivity](policy-csp-connectivity.md)
|
||||
#### [ControlPolicyConflict](policy-csp-controlpolicyconflict.md)
|
||||
#### [CredentialsDelegation](policy-csp-credentialsdelegation.md)
|
||||
#### [CredentialProviders](policy-csp-credentialproviders.md)
|
||||
#### [CredentialsUI](policy-csp-credentialsui.md)
|
||||
#### [Cryptography](policy-csp-cryptography.md)
|
||||
@ -209,17 +211,21 @@
|
||||
#### [EventLogService](policy-csp-eventlogservice.md)
|
||||
#### [Experience](policy-csp-experience.md)
|
||||
#### [ExploitGuard](policy-csp-exploitguard.md)
|
||||
#### [FileExplorer](policy-csp-fileexplorer.md)
|
||||
#### [Games](policy-csp-games.md)
|
||||
#### [Handwriting](policy-csp-handwriting.md)
|
||||
#### [InternetExplorer](policy-csp-internetexplorer.md)
|
||||
#### [Kerberos](policy-csp-kerberos.md)
|
||||
#### [KioskBrowser](policy-csp-kioskbrowser.md)
|
||||
#### [LanmanWorkstation](policy-csp-lanmanworkstation.md)
|
||||
#### [Licensing](policy-csp-licensing.md)
|
||||
#### [LocalPoliciesSecurityOptions](policy-csp-localpoliciessecurityoptions.md)
|
||||
#### [Location](policy-csp-location.md)
|
||||
#### [LockDown](policy-csp-lockdown.md)
|
||||
#### [Maps](policy-csp-maps.md)
|
||||
#### [Messaging](policy-csp-messaging.md)
|
||||
#### [MSSecurityGuide](policy-csp-mssecurityguide.md)
|
||||
#### [MSSLegacy](policy-csp-msslegacy.md)
|
||||
#### [NetworkIsolation](policy-csp-networkisolation.md)
|
||||
#### [Notifications](policy-csp-notifications.md)
|
||||
#### [Power](policy-csp-power.md)
|
||||
@ -246,9 +252,11 @@
|
||||
#### [Update](policy-csp-update.md)
|
||||
#### [UserRights](policy-csp-userrights.md)
|
||||
#### [Wifi](policy-csp-wifi.md)
|
||||
#### [WindowsConnectionManager](policy-csp-windowsconnectionmanager.md)
|
||||
#### [WindowsDefenderSecurityCenter](policy-csp-windowsdefendersecuritycenter.md)
|
||||
#### [WindowsInkWorkspace](policy-csp-windowsinkworkspace.md)
|
||||
#### [WindowsLogon](policy-csp-windowslogon.md)
|
||||
#### [WindowsPowerShell](policy-csp-windowspowershell.md)
|
||||
#### [WirelessDisplay](policy-csp-wirelessdisplay.md)
|
||||
### [PolicyManager CSP](policymanager-csp.md)
|
||||
### [Provisioning CSP](provisioning-csp.md)
|
||||
|
@ -7,20 +7,20 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/01/2018
|
||||
ms.date: 03/20/2018
|
||||
---
|
||||
|
||||
# AssignedAccess CSP
|
||||
|
||||
|
||||
The AssignedAccess configuration service provider (CSP) is used set the device to run in kiosk mode. Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device in the kiosk mode running the application specified in the CSP configuration.
|
||||
The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.
|
||||
|
||||
For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](http://go.microsoft.com/fwlink/p/?LinkID=722211)
|
||||
|
||||
In Windows 10, version 1709, the AssignedAccess configuration service provider (CSP) has been expanded to make it easy for administrators to create kiosks that run more than one app. You can configure multi-app kiosks using a provisioning package. For a step-by-step guide, see [Create a Windows 10 kiosk that runs multiple apps](https://docs.microsoft.com/en-us/windows/configuration/lock-down-windows-10-to-specific-apps).
|
||||
|
||||
> [!Note]
|
||||
> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting in Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S.
|
||||
> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S.
|
||||
|
||||
The following diagram shows the AssignedAccess configuration service provider in tree format
|
||||
|
||||
@ -30,12 +30,16 @@ The following diagram shows the AssignedAccess configuration service provider in
|
||||
Root node for the CSP.
|
||||
|
||||
<a href="" id="assignedaccess-kioskmodeapp"></a>**./Device/Vendor/MSFT/AssignedAccess/KioskModeApp**
|
||||
A JSON string that contains the user account name and Application User Model ID (AUMID) of the Kiosk mode app. For more information about how to get the AUMID, follow the information in [this Microsoft website](http://go.microsoft.com/fwlink/p/?LinkId=404220).
|
||||
A JSON string that contains the user account name and Application User Model ID (AUMID) of the Kiosk mode app. For more information about how to get the AUMID, see [Find the Application User Model ID of an installed app](https://docs.microsoft.com/en-us/windows-hardware/customize/enterprise/find-the-application-user-model-id-of-an-installed-app).
|
||||
|
||||
For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](http://go.microsoft.com/fwlink/p/?LinkID=722211)
|
||||
|
||||
> [!Note]
|
||||
> You cannot set both KioskModeApp and Configuration at the same time in the device in Windows 10, version 1709.
|
||||
> You cannot set both KioskModeApp and Configuration at the same time in the device in Windows 10, version 1709.
|
||||
>
|
||||
> You cannot set both KioskModeApp and ShellLauncher at the same time on the device.
|
||||
|
||||
In Windows 10, version 1607, you can use a provisioned app to configure the kiosk mode. For more information about how to remotely provision an app, see [Enterprise app management](enterprise-app-management.md).
|
||||
Starting in Windows 10, version 1607, you can use a provisioned app to configure the kiosk mode. For more information about how to remotely provision an app, see [Enterprise app management](enterprise-app-management.md).
|
||||
|
||||
Here's an example:
|
||||
|
||||
@ -44,9 +48,9 @@ Here's an example:
|
||||
```
|
||||
|
||||
> [!Tip]
|
||||
> In this example the double \\\ is only required because it's in json and json escapes \ into \\\\. If MDM server uses json parser\composer, they should only ask customer to type one \\, which will be \\\ in the json. If user types \\\\, it'll be \\\\\\\ in json, which is wrong. For the same reason, domain\account used in Configuration xml does not need \\\ but only one \\, because xml does not (require) escape \\.
|
||||
> In this example the double \\\ is required because it's in JSON and JSON escapes \ into \\\\. If an MDM server uses JSON parser\composer, they should ask customers to type only one \\, which will be \\\ in the JSON. If user types \\\\, it'll become \\\\\\\ in JSON, which will cause erroneous results. For the same reason, domain\account used in Configuration xml does not need \\\ but only one \\, because xml does not (need to) escape \\.
|
||||
>
|
||||
> This comment applies to both domain\account, AzureAD\someone@contoso.onmicrosoft.com, i.e. as long as a \ used in json string.
|
||||
> This applies to both domain\account, AzureAD\someone@contoso.onmicrosoft.com, i.e. as long as a \ used in JSON string.
|
||||
|
||||
When configuring the kiosk mode app, the account name will be used to find the target user. The account name includes domain name and user name.
|
||||
|
||||
@ -59,11 +63,10 @@ For a local account, the domain name should be the device name. When Get is exec
|
||||
The supported operations are Add, Delete, Get and Replace. When there's no configuration, the Get and Delete methods fail. When there's already a configuration for kiosk mode app, the Add method fails. The data pattern for Add and Replace is the same.
|
||||
|
||||
<a href="" id="assignedaccess-configuration"></a>**./Device/Vendor/MSFT/AssignedAccess/Configuration**
|
||||
Added in Windows 10, version 1709. Specifies the settings that you can configure in the kiosk or device. This node accepts an AssignedAccessConfiguration xml as input to configure the device experience. For details about the configuration settings in the XML, see [Create a Windows 10 kiosk that runs multiple apps](https://docs.microsoft.com/en-us/windows/configuration/lock-down-windows-10-to-specific-apps).Here is the schema for the [AssignedAccessConfiguration](#assignedaccessconfiguration-xsd).
|
||||
Added in Windows 10, version 1709. Specifies the settings that you can configure in the kiosk or device. This node accepts an AssignedAccessConfiguration xml as input to configure the device experience. For details about the configuration settings in the XML, see [Create a Windows 10 kiosk that runs multiple apps](https://docs.microsoft.com/en-us/windows/configuration/lock-down-windows-10-to-specific-apps). Here is the schema for the [AssignedAccessConfiguration](#assignedaccessconfiguration-xsd).
|
||||
|
||||
> [!Note]
|
||||
> You cannot set both KioskModeApp and Configuration at the same time on the device in Windows 10, version 1709.
|
||||
> You cannot set both ShellLauncher and Configuration at the same time on the device.
|
||||
|
||||
Enterprises can use this to easily configure and manage the curated lockdown experience.
|
||||
|
||||
@ -97,10 +100,14 @@ Additionally, the status payload includes a profileId, which can be used by the
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="assignedaccess-shelllauncher"></a>**./Device/Vendor/MSFT/AssignedAccess/ShellLauncher**
|
||||
Added in Windows 10,version 1803. This node accepts a ShellLauncherConfiguration xml as input. Click [link](#shelllauncherconfiguration-xsd) to see the schema.
|
||||
Added in Windows 10,version 1803. This node accepts a ShellLauncherConfiguration xml as input. Click [link](#shelllauncherconfiguration-xsd) to see the schema. For more information, see [Shell Launcher](https://docs.microsoft.com/en-us/windows-hardware/customize/enterprise/shell-launcher).
|
||||
|
||||
> [!Note]
|
||||
> You cannot set both ShellLauncher and Configuration at the same time on the device.
|
||||
> You cannot set both ShellLauncher and KioskModeApp at the same time on the device.
|
||||
>
|
||||
> Configuring Shell Launcher using the ShellLauncher node automatically enables the Shell Launcher feature if it is available within the SKU. I. Shell Launcher as a feature and the ShellLauncher node both require Windows Enterprise or Windows Education to function.
|
||||
>
|
||||
>The ShellLauncher node is not supported in Windows 10 Pro.
|
||||
|
||||
<a href="" id="assignedaccess-statusconfiguration"></a>**./Device/Vendor/MSFT/AssignedAccess/StatusConfiguration**
|
||||
Added in Windows 10, version 1803. This node accepts a StatusConfiguration xml as input to configure the Kiosk App Health monitoring. There are three possible values for StatusEnabled node inside StatusConfiguration xml: On, OnWithAlerts, and Off. Click [link](#statusconfiguration-xsd) to see the StatusConfiguration schema.
|
||||
|
@ -63,7 +63,7 @@ The following image shows the ClientCertificateInstall configuration service pro
|
||||
|
||||
|
||||
<a href="" id="clientcertificateinstall-pfxcertinstall-uniqueid-containername"></a>**ClientCertificateInstall/PFXCertInstall/*UniqueID*/ContainerName**
|
||||
<p style="margin-left: 20px">ptional. Specifies the Windows Hello for Business (formerly known as Microsoft Passport for Work) container name (if Windows Hello for Business storage provider (KSP) is chosen for the KeyLocation). If this node is not specified when Windows Hello for Business KSP is chosen, enrollment will fail.
|
||||
<p style="margin-left: 20px">Optional. Specifies the Windows Hello for Business (formerly known as Microsoft Passport for Work) container name (if Windows Hello for Business storage provider (KSP) is chosen for the KeyLocation). If this node is not specified when Windows Hello for Business KSP is chosen, enrollment will fail.
|
||||
|
||||
<p style="margin-left: 20px">Date type is string.
|
||||
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/02/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Configuration service provider reference
|
||||
@ -2136,7 +2136,7 @@ Footnotes:
|
||||
<!--EndCSP-->
|
||||
|
||||
<!--StartCSP-->
|
||||
[Uefi CSP](uefi-csp.md)
|
||||
[UEFI CSP](uefi-csp.md)
|
||||
|
||||
<!--StartSKU-->
|
||||
<table>
|
||||
@ -2151,7 +2151,7 @@ Footnotes:
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
@ -2535,7 +2535,6 @@ The following list shows the configuration service providers supported in Window
|
||||
| [DeveloperSetup CSP](developersetup-csp.md) |  | 2 (Provisioning only)|
|
||||
| [DeviceStatus CSP](devicestatus-csp.md) |  |  |
|
||||
| [DevInfo CSP](devinfo-csp.md) |  |  |
|
||||
| [DiagnosticLog CSP](diagnosticlog-csp.md) |  |  |
|
||||
| [DMAcc CSP](dmacc-csp.md) |  |  |
|
||||
| [DMClient CSP](dmclient-csp.md) |  |  |
|
||||
| [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md) |  |  |
|
||||
@ -2596,6 +2595,7 @@ Footnotes:
|
||||
- [Reporting CSP](reporting-csp.md)
|
||||
- [RootCATrustedCertificates CSP](rootcacertificates-csp.md)
|
||||
- [SurfaceHub CSP](surfacehub-csp.md)
|
||||
- [UEFI CSP](uefi-csp.md)
|
||||
- [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md)
|
||||
|
||||
|
||||
@ -2631,6 +2631,8 @@ The CSPs supported in Windows 10 S is the same as in Windows 10 Pro except that
|
||||
- [CellularSettings CSP](cellularsettings-csp.md)
|
||||
- [CertificateStore CSP](certificatestore-csp.md)
|
||||
- [ClientCertificateInstall CSP](clientcertificateinstall-csp.md)
|
||||
- [CMPolicy CSP](cmpolicy-csp.md)
|
||||
- [CM_ProxyEntries CSP](cm-proxyentries-csp.md)
|
||||
- [CM_CellularEntries CSP](cm-cellularentries-csp.md)
|
||||
- [Defender CSP](defender-csp.md)
|
||||
- [DevDetail CSP](devdetail-csp.md)
|
||||
@ -2640,6 +2642,8 @@ The CSPs supported in Windows 10 S is the same as in Windows 10 Pro except that
|
||||
- [DiagnosticLog CSP](diagnosticlog-csp.md)
|
||||
- [DMAcc CSP](dmacc-csp.md)
|
||||
- [DMClient CSP](dmclient-csp.md)
|
||||
- [eUICCs CSP](euiccs-csp.md)
|
||||
- [Firewall CSP](firewall-csp.md)
|
||||
- [EMAIL2 CSP](email2-csp.md)
|
||||
- [EnterpriseAPN CSP](enterpriseapn-csp.md)
|
||||
- [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
|
||||
@ -2669,4 +2673,5 @@ The CSPs supported in Windows 10 S is the same as in Windows 10 Pro except that
|
||||
- [WiFi CSP](wifi-csp.md)
|
||||
- [Win32AppInventory CSP](win32appinventory-csp.md)
|
||||
- [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md)
|
||||
- [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)
|
||||
- [WindowsLicensing CSP](windowslicensing-csp.md)
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# DeviceStatus CSP
|
||||
@ -132,6 +132,15 @@ Added in Windows, version 1607. String that specifies the OS edition.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="devicestatus-os-mode"></a>**DeviceStatus/OS/Mode**
|
||||
Added in Windows, version 1803. Read only node that specifies the device mode.
|
||||
|
||||
Valid values:
|
||||
- 0 - the device is in standard configuration
|
||||
- 1 - the device is in S mode configuration
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="devicestatus-antivirus"></a>**DeviceStatus/Antivirus**
|
||||
Added in Windows, version 1607. Node for the antivirus query.
|
||||
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/05/2017
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# DeviceStatus DDF
|
||||
@ -17,7 +17,7 @@ This topic shows the OMA DM device description framework (DDF) for the **DeviceS
|
||||
|
||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||
|
||||
The XML below is for Windows 10, version 1709.
|
||||
The XML below is for Windows 10, version 1803.
|
||||
|
||||
``` syntax
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
@ -469,6 +469,27 @@ The XML below is for Windows 10, version 1709.
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Mode</NodeName>
|
||||
<DFProperties>
|
||||
<AccessType>
|
||||
<Get />
|
||||
</AccessType>
|
||||
<DefaultValue>Not available</DefaultValue>
|
||||
<DFFormat>
|
||||
<chr />
|
||||
</DFFormat>
|
||||
<Occurrence>
|
||||
<One />
|
||||
</Occurrence>
|
||||
<Scope>
|
||||
<Permanent />
|
||||
</Scope>
|
||||
<DFType>
|
||||
<MIME>text/plain</MIME>
|
||||
</DFType>
|
||||
</DFProperties>
|
||||
</Node>
|
||||
</Node>
|
||||
<Node>
|
||||
<NodeName>Antivirus</NodeName>
|
||||
|
Binary file not shown.
Before Width: | Height: | Size: 52 KiB After Width: | Height: | Size: 55 KiB |
Binary file not shown.
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 46 KiB |
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 02/27/2018
|
||||
ms.date: 03/22/2018
|
||||
---
|
||||
|
||||
# MultiSIM CSP
|
||||
@ -30,9 +30,13 @@ Node representing a Mobile Broadband Modem. The node name is the modem ID. Modem
|
||||
<a href="" id="modemid"></a>**_ModemID_/Identifier**
|
||||
Modem ID.
|
||||
|
||||
Supported operation is Get. Value type is string.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/IsEmbedded**
|
||||
Indicates whether this modem is embedded or external.
|
||||
|
||||
Supported operation is Get. Value type is bool.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Slots**
|
||||
Represents all SIM slots in the Modem.
|
||||
|
||||
@ -42,17 +46,110 @@ Node representing a SIM Slot. The node name is the Slot ID. SIM Slot ID format i
|
||||
<a href="" id="tbd"></a>**_ModemID_/Slots/_SlotID_/Identifier**
|
||||
Slot ID.
|
||||
|
||||
Supported operation is Get. Value type is integer.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Slots/_SlotID_/IsEmbedded**
|
||||
Indicates whether this Slot is embedded or a physical SIM slot.
|
||||
|
||||
Supported operation is Get. Value type is bool.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Slots/_SlotID_/IsSelected**
|
||||
Indicates whether this Slot is selected or not.
|
||||
|
||||
Supported operation is Get and Replace. Value type is bool.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Slots/_SlotID_/State**
|
||||
Slot state (Unknown = 0, OffEmpty = 1, Off = 2, Empty = 3, NotReady = 4, Active = 5, Error = 6, ActiveEsim = 7, ActiveEsimNoProfile = 8)
|
||||
|
||||
Supported operation is Get. Value type is integer.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Policies**
|
||||
Policies associated with the Modem.
|
||||
|
||||
<a href="" id="tbd"></a>**_ModemID_/Policies/SlotSelectionEnabled**
|
||||
Determines whether the user is allowed to change slots in the Cellular settings UI. Default is true.
|
||||
Determines whether the user is allowed to change slots in the Cellular settings UI. Default is true.
|
||||
|
||||
Supported operation is Get and Replace. Value type is bool.
|
||||
|
||||
## Examples
|
||||
|
||||
Get modem
|
||||
``` syntax
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Get>
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/MultiSIM
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Get slots
|
||||
``` syntax
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Get>
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/MultiSIM/Embedded/Slots
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Get slot state
|
||||
``` syntax
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Get>
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/MultiSIM/Embedded/Slots/Embedded/State
|
||||
</LocURI>
|
||||
</Target>
|
||||
</Item>
|
||||
</Get>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
||||
|
||||
Select slot
|
||||
``` syntax
|
||||
<SyncML xmlns="SYNCML:SYNCML1.2">
|
||||
<SyncBody>
|
||||
<Replace>
|
||||
<CmdID>1</CmdID>
|
||||
<Item>
|
||||
<Target>
|
||||
<LocURI>
|
||||
./Vendor/MSFT/MultiSIM/Embedded/Slots/0/IsSelected
|
||||
</LocURI>
|
||||
</Target>
|
||||
<Meta>
|
||||
<Format xmlns="syncml:metinf">bool</Format>
|
||||
<Type>text/plain</Type>
|
||||
</Meta>
|
||||
<Data>true</Data>
|
||||
</Item>
|
||||
</Replace>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
</SyncML>
|
||||
```
|
@ -10,7 +10,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/03/2018
|
||||
ms.date: 03/15/2018
|
||||
---
|
||||
|
||||
# What's new in MDM enrollment and management
|
||||
@ -30,6 +30,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
||||
- [What's new in Windows 10, version 1607](#whatsnew1607)
|
||||
- [What's new in Windows 10, version 1703](#whatsnew10)
|
||||
- [What's new in Windows 10, version 1709](#whatsnew1709)
|
||||
- [What's new in Windows 10, version 1803](#whatsnew1803)
|
||||
- [Change history in MDM documentation](#change-history-in-mdm-documentation)
|
||||
- [Breaking changes and known issues](#breaking-changes-and-known-issues)
|
||||
- [Get command inside an atomic command is not supported](#getcommand)
|
||||
@ -1124,6 +1125,229 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
## <a href="" id="whatsnew1803"></a>What's new in Windows 10, version 1803
|
||||
|
||||
<table class="mx-tdBreakAll">
|
||||
<colgroup>
|
||||
<col width="25%" />
|
||||
<col width="75%" />
|
||||
</colgroup>
|
||||
<thead>
|
||||
<tr class="header">
|
||||
<th>New or updated topic</th>
|
||||
<th>Description</th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[Policy CSP](policy-configuration-service-provider.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following new policies for Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>AccountPoliciesAccountLockoutPolicy/AccountLockoutDuration</li>
|
||||
<li>AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold</li>
|
||||
<li>AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter</li>
|
||||
<li>ApplicationDefaults/EnableAppUriHandlers</li>
|
||||
<li>ApplicationManagement/MSIAllowUserControlOverInstall</li>
|
||||
<li>ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges</li>
|
||||
<li>Browser/AllowConfigurationUpdateForBooksLibrary</li>
|
||||
<li>Browser/AlwaysEnableBooksLibrary</li>
|
||||
<li>Browser/EnableExtendedBooksTelemetry</li>
|
||||
<li>Browser/UseSharedFolderForBooks</li>
|
||||
<li>Connectivity/AllowPhonePCLinking</li>
|
||||
<li>DeliveryOptimization/DODelayBackgroundDownloadFromHttp</li>
|
||||
<li>DeliveryOptimization/DODelayForegroundDownloadFromHttp</li>
|
||||
<li>DeliveryOptimization/DOGroupIdSource</li>
|
||||
<li>DeliveryOptimization/DOPercentageMaxBackDownloadBandwidth</li>
|
||||
<li>DeliveryOptimization/DOPercentageMaxForeDownloadBandwidth</li>
|
||||
<li>DeliveryOptimization/DORestrictPeerSelectionBy</li>
|
||||
<li>DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth</li>
|
||||
<li>DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth</li>
|
||||
<li>Display/DisablePerProcessDpiForApps</li>
|
||||
<li>Display/EnablePerProcessDpi</li>
|
||||
<li>Display/EnablePerProcessDpiForApps</li>
|
||||
<li>Experience/AllowWindowsSpotlightOnSettings</li>
|
||||
<li>KioskBrowser/BlockedUrlExceptions</li>
|
||||
<li>KioskBrowser/BlockedUrls</li>
|
||||
<li>KioskBrowser/DefaultURL</li>
|
||||
<li>KioskBrowser/EnableHomeButton</li>
|
||||
<li>KioskBrowser/EnableNavigationButtons</li>
|
||||
<li>KioskBrowser/RestartOnIdleTime</li>
|
||||
<li>LanmanWorkstation/EnableInsecureGuestLogons</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</li>
|
||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers</li>
|
||||
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
||||
<li>LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</li>
|
||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation</li>
|
||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode</li>
|
||||
<li>RestrictedGroups/ConfigureGroupMembership</li>
|
||||
<li>Search/AllowCortanaInAAD</li>
|
||||
<li>Search/DoNotUseWebResults</li>
|
||||
<li>Security/ConfigureWindowsPasswords</li>
|
||||
<li>System/FeedbackHubAlwaysSaveDiagnosticsLocally</li>
|
||||
<li>SystemServices/ConfigureHomeGroupListenerServiceStartupMode</li>
|
||||
<li>SystemServices/ConfigureHomeGroupProviderServiceStartupMode</li>
|
||||
<li>SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode</li>
|
||||
<li>SystemServices/ConfigureXboxLiveAuthManagerServiceStartupMode</li>
|
||||
<li>SystemServices/ConfigureXboxLiveGameSaveServiceStartupMode</li>
|
||||
<li>SystemServices/ConfigureXboxLiveNetworkingServiceStartupMode</li>
|
||||
<li>TaskScheduler/EnableXboxGameSaveTask</li>
|
||||
<li>TextInput/AllowHardwareKeyboardTextSuggestions</li>
|
||||
<li>TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode</li>
|
||||
<li>TextInput/ForceTouchKeyboardDockedState</li>
|
||||
<li>TextInput/TouchKeyboardDictationButtonAvailability</li>
|
||||
<li>TextInput/TouchKeyboardEmojiButtonAvailability</li>
|
||||
<li>TextInput/TouchKeyboardFullModeAvailability</li>
|
||||
<li>TextInput/TouchKeyboardHandwritingModeAvailability</li>
|
||||
<li>TextInput/TouchKeyboardNarrowModeAvailability</li>
|
||||
<li>TextInput/TouchKeyboardSplitModeAvailability</li>
|
||||
<li>TextInput/TouchKeyboardWideModeAvailability</li>
|
||||
<li>Update/ConfigureFeatureUpdateUninstallPeriod</li>
|
||||
<li>UserRights/AccessCredentialManagerAsTrustedCaller</li>
|
||||
<li>UserRights/AccessFromNetwork</li>
|
||||
<li>UserRights/ActAsPartOfTheOperatingSystem</li>
|
||||
<li>UserRights/AllowLocalLogOn</li>
|
||||
<li>UserRights/BackupFilesAndDirectories</li>
|
||||
<li>UserRights/ChangeSystemTime</li>
|
||||
<li>UserRights/CreateGlobalObjects</li>
|
||||
<li>UserRights/CreatePageFile</li>
|
||||
<li>UserRights/CreatePermanentSharedObjects</li>
|
||||
<li>UserRights/CreateSymbolicLinks</li>
|
||||
<li>UserRights/CreateToken</li>
|
||||
<li>UserRights/DebugPrograms</li>
|
||||
<li>UserRights/DenyAccessFromNetwork</li>
|
||||
<li>UserRights/DenyLocalLogOn</li>
|
||||
<li>UserRights/DenyRemoteDesktopServicesLogOn</li>
|
||||
<li>UserRights/EnableDelegation</li>
|
||||
<li>UserRights/GenerateSecurityAudits</li>
|
||||
<li>UserRights/ImpersonateClient</li>
|
||||
<li>UserRights/IncreaseSchedulingPriority</li>
|
||||
<li>UserRights/LoadUnloadDeviceDrivers</li>
|
||||
<li>UserRights/LockMemory</li>
|
||||
<li>UserRights/ManageAuditingAndSecurityLog</li>
|
||||
<li>UserRights/ManageVolume</li>
|
||||
<li>UserRights/ModifyFirmwareEnvironment</li>
|
||||
<li>UserRights/ModifyObjectLabel</li>
|
||||
<li>UserRights/ProfileSingleProcess</li>
|
||||
<li>UserRights/RemoteShutdown</li>
|
||||
<li>UserRights/RestoreFilesAndDirectories</li>
|
||||
<li>UserRights/TakeOwnership</li>
|
||||
<li>WindowsDefenderSecurityCenter/DisableAccountProtectionUI</li>
|
||||
<li>WindowsDefenderSecurityCenter/DisableDeviceSecurityUI</li>
|
||||
<li>WindowsDefenderSecurityCenter/HideRansomwareDataRecovery</li>
|
||||
<li>WindowsDefenderSecurityCenter/HideSecureBoot</li>
|
||||
<li>WindowsDefenderSecurityCenter/HideTPMTroubleshooting</li>
|
||||
</ul>
|
||||
<p>Security/RequireDeviceEncrption - updated to show it is supported in desktop.</p>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[BitLocker CSP](bitlocker-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Updated the description for AllowWarningForOtherDiskEncryption to describe changes added in Windows 10, version 1803.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added new node MaintainProcessorArchitectureOnUpdate in Windows 10, version 1803.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[DMClient CSP](dmclient-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added ./User/Vendor/MSFT/DMClient/Provider/[ProviderID]/FirstSyncStatus node. Also added the following nodes in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>AADSendDeviceToken</li>
|
||||
<li>BlockInStatusPage</li>
|
||||
<li>AllowCollectLogsButton</li>
|
||||
<li>CustomErrorText</li>
|
||||
<li>SkipDeviceStatusPage</li>
|
||||
<li>SkipUserStatusPage</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[RemoteWipe CSP](remotewipe-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following nodes in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>AutomaticRedeployment</li>
|
||||
<li>doAutomaticRedeployment</li>
|
||||
<li>LastError</li>
|
||||
<li>Status</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[Defender CSP](defender-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added new node (OfflineScan) in Windows 10, version 1803.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[UEFI CSP](uefi-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added a new CSP in Windows 10, version 1803.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[Update CSP](update-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following nodes in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>Rollback</li>
|
||||
<li>Rollback/FeatureUpdate</li>
|
||||
<li>Rollback/QualityUpdateStatus</li>
|
||||
<li>Rollback/FeatureUpdateStatus</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[AssignedAccess CSP](assignedaccess-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following nodes in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>Status</li>
|
||||
<li>ShellLauncher</li>
|
||||
<li>StatusConfiguration</li>
|
||||
</ul>
|
||||
<p>Updated the AssigneAccessConfiguration schema.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[MultiSIM CSP](multisim-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added a new CSP in Windows 10, version 1803.</p>
|
||||
</td></tr>
|
||||
<tr class="odd">
|
||||
<td style="vertical-align:top">[EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>MaintainProcessorArchitectureOnUpdate</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[eUICCs CSP](euiccs-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>IsEnabled</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[DeviceStatus CSP](devicestatus-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>OS/Mode</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[RootCATrustedCertificates CSP](rootcacertificates-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>UntrustedCertificates</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
## Breaking changes and known issues
|
||||
|
||||
### <a href="" id="getcommand"></a>Get command inside an atomic command is not supported
|
||||
@ -1411,6 +1635,13 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[DeviceStatus CSP](devicestatus-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>OS/Mode</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[Understanding ADMX-backed policies](understanding-admx-backed-policies.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following videos:</p>
|
||||
<ul>
|
||||
@ -1418,6 +1649,41 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<li>[How to import a custom ADMX file to a device using Intune](https://www.microsoft.com/showcase/video.aspx?uuid=a59888b1-429f-4a49-8570-c39a143d9a73)</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[RootCATrustedCertificates CSP](rootcacertificates-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following node in Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>UntrustedCertificates</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[Policy CSP](policy-configuration-service-provider.md)</td>
|
||||
<td style="vertical-align:top"><p>Added the following new policies for Windows 10, version 1803:</p>
|
||||
<ul>
|
||||
<li>ApplicationDefaults/EnableAppUriHandlers</li>
|
||||
<li>ApplicationManagement/MSIAllowUserControlOverInstall</li>
|
||||
<li>ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges</li>
|
||||
<li>Connectivity/AllowPhonePCLinking</li>
|
||||
<li>RestrictedGroups/ConfigureGroupMembership</li>
|
||||
</ul>
|
||||
<p>The following existing policies were updated:</p>
|
||||
<ul>
|
||||
<li>InternetExplorer/AllowSiteToZoneAssignmentList - updated the description and added an example SyncML</li>
|
||||
<li>TextInput/AllowIMENetworkAccess - introduced new suggestion services in Japanese IME in addition to cloud suggestion.</li>
|
||||
</ul>
|
||||
<p>Added a new section:</p>
|
||||
<ul>
|
||||
<li>[Policies supported by GP](policy-configuration-service-provider.md#policies-supported-by-gp) - list of policies in Policy CSP that has corresponding Group Policy. The policy description contains the GP information, such as GP policy name and variable name.</li>
|
||||
</ul>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[Policy CSP - Bluetooth](policy-csp-bluetooth.md)</td>
|
||||
<td style="vertical-align:top"><p>Added new section [ServicesAllowedList usage guide](policy-csp-bluetooth.md#servicesallowedlist-usage-guide).</p>
|
||||
</td></tr>
|
||||
<tr>
|
||||
<td style="vertical-align:top">[MultiSIM CSP](multisim-csp.md)</td>
|
||||
<td style="vertical-align:top"><p>Added SyncML examples and updated the settings descriptions.</p>
|
||||
</td></tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
@ -1525,14 +1791,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<li>LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters</li>
|
||||
<li>LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge</li>
|
||||
<li>LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey</li>
|
||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers</li>
|
||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession</li>
|
||||
@ -1543,10 +1802,8 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients</li>
|
||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers</li>
|
||||
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
||||
<li>LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</li>
|
||||
|
@ -7,7 +7,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/16/2018
|
||||
---
|
||||
|
||||
# Policy CSP
|
||||
@ -193,6 +193,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationdefaults.md#applicationdefaults-defaultassociationsconfiguration" id="applicationdefaults-defaultassociationsconfiguration">ApplicationDefaults/DefaultAssociationsConfiguration</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationdefaults.md#applicationdefaults-enableappurihandlers" id="applicationdefaults-enableappurihandlers">ApplicationDefaults/EnableAppUriHandlers</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
### ApplicationManagement policies
|
||||
@ -222,6 +225,12 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationmanagement.md#applicationmanagement-disablestoreoriginatedapps" id="applicationmanagement-disablestoreoriginatedapps">ApplicationManagement/DisableStoreOriginatedApps</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationmanagement.md#applicationmanagement-msiallowusercontroloverinstall" id="applicationmanagement-msiallowusercontroloverinstall">ApplicationManagement/MSIAllowUserControlOverInstall</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationmanagement.md#applicationmanagement-msialwaysinstallwithelevatedprivileges" id="applicationmanagement-msialwaysinstallwithelevatedprivileges">ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-applicationmanagement.md#applicationmanagement-requireprivatestoreonly" id="applicationmanagement-requireprivatestoreonly">ApplicationManagement/RequirePrivateStoreOnly</a>
|
||||
</dd>
|
||||
@ -498,6 +507,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
<dd>
|
||||
<a href="./policy-csp-browser.md#browser-preventsmartscreenpromptoverrideforfiles" id="browser-preventsmartscreenpromptoverrideforfiles">Browser/PreventSmartScreenPromptOverrideForFiles</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-browser.md#browser-preventtabpreloading" id="browser-preventtabpreloading">Browser/PreventTabPreloading</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-browser.md#browser-preventusinglocalhostipaddressforwebrtc" id="browser-preventusinglocalhostipaddressforwebrtc">Browser/PreventUsingLocalHostIPAddressForWebRTC</a>
|
||||
</dd>
|
||||
@ -567,6 +579,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
<dd>
|
||||
<a href="./policy-csp-connectivity.md#connectivity-allownfc" id="connectivity-allownfc">Connectivity/AllowNFC</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-connectivity.md#connectivity-allowphonepclinking" id="connectivity-allowphonepclinking">Connectivity/AllowPhonePCLinking</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="./policy-csp-connectivity.md#connectivity-allowusbconnection" id="connectivity-allowusbconnection">Connectivity/AllowUSBConnection</a>
|
||||
</dd>
|
||||
@ -1900,6 +1915,14 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
### LanmanWorkstation policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="./policy-csp-lanmanworkstation.md#lanmanworkstation-enableinsecureguestlogons" id="lanmanworkstation-enableinsecureguestlogons">LanmanWorkstation/EnableInsecureGuestLogons</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
### Licensing policies
|
||||
|
||||
<dl>
|
||||
@ -3269,6 +3292,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
## ADMX-backed policies
|
||||
|
||||
- [ActiveXControls/ApprovedInstallationSites](./policy-csp-activexcontrols.md#activexcontrols-approvedinstallationsites)
|
||||
- [AppRuntime/AllowMicrosoftAccountsToBeOptional](./policy-csp-appruntime.md#appruntime-allowmicrosoftaccountstobeoptional)
|
||||
- [AppVirtualization/AllowAppVClient](./policy-csp-appvirtualization.md#appvirtualization-allowappvclient)
|
||||
- [AppVirtualization/AllowDynamicVirtualization](./policy-csp-appvirtualization.md#appvirtualization-allowdynamicvirtualization)
|
||||
- [AppVirtualization/AllowPackageCleanup](./policy-csp-appvirtualization.md#appvirtualization-allowpackagecleanup)
|
||||
@ -3311,13 +3335,17 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](./policy-csp-connectivity.md#connectivity-prohibitinstallationandconfigurationofnetworkbridge)
|
||||
- [CredentialProviders/AllowPINLogon](./policy-csp-credentialproviders.md#credentialproviders-allowpinlogon)
|
||||
- [CredentialProviders/BlockPicturePassword](./policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword)
|
||||
- [CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials](./policy-csp-credentialsdelegation.md#credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials)
|
||||
- [CredentialsUI/DisablePasswordReveal](./policy-csp-credentialsui.md#credentialsui-disablepasswordreveal)
|
||||
- [CredentialsUI/EnumerateAdministrators](./policy-csp-credentialsui.md#credentialsui-enumerateadministrators)
|
||||
- [DataUsage/SetCost3G](./policy-csp-datausage.md#datausage-setcost3g)
|
||||
- [DataUsage/SetCost4G](./policy-csp-datausage.md#datausage-setcost4g)
|
||||
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
|
||||
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
|
||||
- [Desktop/PreventUserRedirectionOfProfileFolders](./policy-csp-desktop.md#desktop-preventuserredirectionofprofilefolders)
|
||||
- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids)
|
||||
- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses)
|
||||
- [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera)
|
||||
- [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow)
|
||||
- [ErrorReporting/CustomizeConsentSettings](./policy-csp-errorreporting.md#errorreporting-customizeconsentsettings)
|
||||
- [ErrorReporting/DisableWindowsErrorReporting](./policy-csp-errorreporting.md#errorreporting-disablewindowserrorreporting)
|
||||
@ -3328,6 +3356,8 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [EventLogService/SpecifyMaximumFileSizeApplicationLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizeapplicationlog)
|
||||
- [EventLogService/SpecifyMaximumFileSizeSecurityLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesecuritylog)
|
||||
- [EventLogService/SpecifyMaximumFileSizeSystemLog](./policy-csp-eventlogservice.md#eventlogservice-specifymaximumfilesizesystemlog)
|
||||
- [FileExplorer/TurnOffDataExecutionPreventionForExplorer](./policy-csp-fileexplorer.md#fileexplorer-turnoffdataexecutionpreventionforexplorer)
|
||||
- [FileExplorer/TurnOffHeapTerminationOnCorruption](./policy-csp-fileexplorer.md#fileexplorer-turnoffheapterminationoncorruption)
|
||||
- [InternetExplorer/AddSearchProvider](./policy-csp-internetexplorer.md#internetexplorer-addsearchprovider)
|
||||
- [InternetExplorer/AllowActiveXFiltering](./policy-csp-internetexplorer.md#internetexplorer-allowactivexfiltering)
|
||||
- [InternetExplorer/AllowAddOnList](./policy-csp-internetexplorer.md#internetexplorer-allowaddonlist)
|
||||
@ -3401,6 +3431,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/InternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowsmartscreenie)
|
||||
- [InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowupdatestostatusbarviascript)
|
||||
- [InternetExplorer/InternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowuserdatapersistence)
|
||||
- [InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowvbscripttorunininternetexplorer)
|
||||
- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols)
|
||||
- [InternetExplorer/InternetZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadsignedactivexcontrols)
|
||||
- [InternetExplorer/InternetZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadunsignedactivexcontrols)
|
||||
@ -3456,6 +3487,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneinitializeandscriptactivexcontrols)
|
||||
- [InternetExplorer/LockedDownInternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonejavapermissions)
|
||||
- [InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonenavigatewindowsandframes)
|
||||
- [InternetExplorer/LockedDownIntranetJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetjavapermissions)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowaccesstodatasources)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforactivexcontrols)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforfiledownloads)
|
||||
@ -3533,6 +3565,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowsmartscreenie)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowupdatestostatusbarviascript)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowuserdatapersistence)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer)
|
||||
- [InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols)
|
||||
- [InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadsignedactivexcontrols)
|
||||
- [InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadunsignedactivexcontrols)
|
||||
@ -3575,6 +3608,17 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Kerberos/RequireKerberosArmoring](./policy-csp-kerberos.md#kerberos-requirekerberosarmoring)
|
||||
- [Kerberos/RequireStrictKDCValidation](./policy-csp-kerberos.md#kerberos-requirestrictkdcvalidation)
|
||||
- [Kerberos/SetMaximumContextTokenSize](./policy-csp-kerberos.md#kerberos-setmaximumcontexttokensize)
|
||||
- [MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes](./policy-csp-msslegacy.md#msslegacy-allowicmpredirectstooverrideospfgeneratedroutes)
|
||||
- [MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers](./policy-csp-msslegacy.md#msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers)
|
||||
- [MSSLegacy/IPSourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipsourceroutingprotectionlevel)
|
||||
- [MSSLegacy/IPv6SourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipv6sourceroutingprotectionlevel)
|
||||
- [MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon](./policy-csp-mssecurityguide.md#mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon)
|
||||
- [MSSecurityGuide/ConfigureSMBV1ClientDriver](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1clientdriver)
|
||||
- [MSSecurityGuide/ConfigureSMBV1Server](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1server)
|
||||
- [MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection](./policy-csp-mssecurityguide.md#mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection)
|
||||
- [MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications](./policy-csp-mssecurityguide.md#mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications)
|
||||
- [MSSecurityGuide/WDigestAuthentication](./policy-csp-mssecurityguide.md#mssecurityguide-wdigestauthentication)
|
||||
- [Power/AllowStandbyStatesWhenSleepingOnBattery](./policy-csp-power.md#power-allowstandbystateswhensleepingonbattery)
|
||||
- [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin)
|
||||
- [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery)
|
||||
- [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin)
|
||||
@ -3624,13 +3668,19 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Storage/EnhancedStorageDevices](./policy-csp-storage.md#storage-enhancedstoragedevices)
|
||||
- [System/BootStartDriverInitialization](./policy-csp-system.md#system-bootstartdriverinitialization)
|
||||
- [System/DisableSystemRestore](./policy-csp-system.md#system-disablesystemrestore)
|
||||
- [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork)
|
||||
- [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications)
|
||||
- [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui)
|
||||
- [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers)
|
||||
- [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart)
|
||||
- [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging)
|
||||
|
||||
|
||||
## Policies supported by GP
|
||||
|
||||
- [AboveLock/AllowCortanaAboveLock](./policy-csp-abovelock.md#abovelock-allowcortanaabovelock)
|
||||
- [ActiveXControls/ApprovedInstallationSites](./policy-csp-activexcontrols.md#activexcontrols-approvedinstallationsites)
|
||||
- [AppRuntime/AllowMicrosoftAccountsToBeOptional](./policy-csp-appruntime.md#appruntime-allowmicrosoftaccountstobeoptional)
|
||||
- [AppVirtualization/AllowAppVClient](./policy-csp-appvirtualization.md#appvirtualization-allowappvclient)
|
||||
- [AppVirtualization/AllowDynamicVirtualization](./policy-csp-appvirtualization.md#appvirtualization-allowdynamicvirtualization)
|
||||
- [AppVirtualization/AllowPackageCleanup](./policy-csp-appvirtualization.md#appvirtualization-allowpackagecleanup)
|
||||
@ -3726,6 +3776,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](./policy-csp-connectivity.md#connectivity-prohibitinstallationandconfigurationofnetworkbridge)
|
||||
- [CredentialProviders/AllowPINLogon](./policy-csp-credentialproviders.md#credentialproviders-allowpinlogon)
|
||||
- [CredentialProviders/BlockPicturePassword](./policy-csp-credentialproviders.md#credentialproviders-blockpicturepassword)
|
||||
- [CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials](./policy-csp-credentialsdelegation.md#credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials)
|
||||
- [CredentialsUI/DisablePasswordReveal](./policy-csp-credentialsui.md#credentialsui-disablepasswordreveal)
|
||||
- [CredentialsUI/EnumerateAdministrators](./policy-csp-credentialsui.md#credentialsui-enumerateadministrators)
|
||||
- [Cryptography/AllowFipsAlgorithmPolicy](./policy-csp-cryptography.md#cryptography-allowfipsalgorithmpolicy)
|
||||
@ -3781,6 +3832,8 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [DeliveryOptimization/DOMinRAMAllowedToPeer](./policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
|
||||
- [DeliveryOptimization/DOModifyCacheDrive](./policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
|
||||
- [DeliveryOptimization/DOMonthlyUploadDataCap](./policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
|
||||
- [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth)
|
||||
- [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth)
|
||||
- [DeliveryOptimization/DORestrictPeerSelectionBy](./policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby)
|
||||
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
|
||||
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](./policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
|
||||
@ -3791,6 +3844,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [DeviceInstallation/PreventInstallationOfMatchingDeviceIDs](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdeviceids)
|
||||
- [DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses](./policy-csp-deviceinstallation.md#deviceinstallation-preventinstallationofmatchingdevicesetupclasses)
|
||||
- [DeviceLock/MinimumPasswordAge](./policy-csp-devicelock.md#devicelock-minimumpasswordage)
|
||||
- [DeviceLock/PreventEnablingLockScreenCamera](./policy-csp-devicelock.md#devicelock-preventenablinglockscreencamera)
|
||||
- [DeviceLock/PreventLockScreenSlideShow](./policy-csp-devicelock.md#devicelock-preventlockscreenslideshow)
|
||||
- [Display/DisablePerProcessDpiForApps](./policy-csp-display.md#display-disableperprocessdpiforapps)
|
||||
- [Display/EnablePerProcessDpi](./policy-csp-display.md#display-enableperprocessdpi)
|
||||
@ -3820,6 +3874,8 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Experience/ConfigureWindowsSpotlightOnLockScreen](./policy-csp-experience.md#experience-configurewindowsspotlightonlockscreen)
|
||||
- [Experience/DoNotShowFeedbackNotifications](./policy-csp-experience.md#experience-donotshowfeedbacknotifications)
|
||||
- [ExploitGuard/ExploitProtectionSettings](./policy-csp-exploitguard.md#exploitguard-exploitprotectionsettings)
|
||||
- [FileExplorer/TurnOffDataExecutionPreventionForExplorer](./policy-csp-fileexplorer.md#fileexplorer-turnoffdataexecutionpreventionforexplorer)
|
||||
- [FileExplorer/TurnOffHeapTerminationOnCorruption](./policy-csp-fileexplorer.md#fileexplorer-turnoffheapterminationoncorruption)
|
||||
- [Handwriting/PanelDefaultModeDocked](./policy-csp-handwriting.md#handwriting-paneldefaultmodedocked)
|
||||
- [InternetExplorer/AddSearchProvider](./policy-csp-internetexplorer.md#internetexplorer-addsearchprovider)
|
||||
- [InternetExplorer/AllowActiveXFiltering](./policy-csp-internetexplorer.md#internetexplorer-allowactivexfiltering)
|
||||
@ -3894,6 +3950,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/InternetZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowsmartscreenie)
|
||||
- [InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowupdatestostatusbarviascript)
|
||||
- [InternetExplorer/InternetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowuserdatapersistence)
|
||||
- [InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-internetzoneallowvbscripttorunininternetexplorer)
|
||||
- [InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols)
|
||||
- [InternetExplorer/InternetZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadsignedactivexcontrols)
|
||||
- [InternetExplorer/InternetZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-internetzonedownloadunsignedactivexcontrols)
|
||||
@ -3949,6 +4006,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzoneinitializeandscriptactivexcontrols)
|
||||
- [InternetExplorer/LockedDownInternetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonejavapermissions)
|
||||
- [InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-lockeddowninternetzonenavigatewindowsandframes)
|
||||
- [InternetExplorer/LockedDownIntranetJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetjavapermissions)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowaccesstodatasources)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforactivexcontrols)
|
||||
- [InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-lockeddownintranetzoneallowautomaticpromptingforfiledownloads)
|
||||
@ -4026,6 +4084,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowsmartscreenie)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowupdatestostatusbarviascript)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowuserdatapersistence)
|
||||
- [InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer)
|
||||
- [InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols)
|
||||
- [InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadsignedactivexcontrols)
|
||||
- [InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonedownloadunsignedactivexcontrols)
|
||||
@ -4080,12 +4139,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-allowedtoformatandejectremovablemedia)
|
||||
- [LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-preventusersfrominstallingprinterdriverswhenconnectingtosharedprinters)
|
||||
- [LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallysignsecurechanneldatawhenpossible)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-maximummachineaccountpasswordage)
|
||||
- [LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-requirestrongsessionkey)
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked)
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin)
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplayusernameatsignin)
|
||||
@ -4094,7 +4147,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-messagetextforusersattemptingtologon)
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-messagetitleforusersattemptingtologon)
|
||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-smartcardremovalbehavior)
|
||||
- [LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsalways)
|
||||
- [LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsifserveragrees)
|
||||
- [LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkclient-sendunencryptedpasswordtothirdpartysmbservers)
|
||||
- [LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-microsoftnetworkserver-amountofidletimerequiredbeforesuspendingsession)
|
||||
@ -4107,7 +4159,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-allowpku2uauthenticationrequests)
|
||||
- [LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-donotstorelanmanagerhashvalueonnextpasswordchange)
|
||||
- [LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-lanmanagerauthenticationlevel)
|
||||
- [LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedclients)
|
||||
- [LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedservers)
|
||||
- [LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon)
|
||||
- [LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile)
|
||||
@ -4123,6 +4174,16 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-virtualizefileandregistrywritefailurestoperuserlocations)
|
||||
- [Location/EnableLocation](./policy-csp-location.md#location-enablelocation)
|
||||
- [LockDown/AllowEdgeSwipe](./policy-csp-lockdown.md#lockdown-allowedgeswipe)
|
||||
- [MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes](./policy-csp-msslegacy.md#msslegacy-allowicmpredirectstooverrideospfgeneratedroutes)
|
||||
- [MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers](./policy-csp-msslegacy.md#msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers)
|
||||
- [MSSLegacy/IPSourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipsourceroutingprotectionlevel)
|
||||
- [MSSLegacy/IPv6SourceRoutingProtectionLevel](./policy-csp-msslegacy.md#msslegacy-ipv6sourceroutingprotectionlevel)
|
||||
- [MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon](./policy-csp-mssecurityguide.md#mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon)
|
||||
- [MSSecurityGuide/ConfigureSMBV1ClientDriver](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1clientdriver)
|
||||
- [MSSecurityGuide/ConfigureSMBV1Server](./policy-csp-mssecurityguide.md#mssecurityguide-configuresmbv1server)
|
||||
- [MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection](./policy-csp-mssecurityguide.md#mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection)
|
||||
- [MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications](./policy-csp-mssecurityguide.md#mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications)
|
||||
- [MSSecurityGuide/WDigestAuthentication](./policy-csp-mssecurityguide.md#mssecurityguide-wdigestauthentication)
|
||||
- [Maps/EnableOfflineMapsAutoUpdate](./policy-csp-maps.md#maps-enableofflinemapsautoupdate)
|
||||
- [Messaging/AllowMessageSync](./policy-csp-messaging.md#messaging-allowmessagesync)
|
||||
- [NetworkIsolation/EnterpriseCloudResources](./policy-csp-networkisolation.md#networkisolation-enterprisecloudresources)
|
||||
@ -4133,6 +4194,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [NetworkIsolation/EnterpriseProxyServersAreAuthoritative](./policy-csp-networkisolation.md#networkisolation-enterpriseproxyserversareauthoritative)
|
||||
- [NetworkIsolation/NeutralResources](./policy-csp-networkisolation.md#networkisolation-neutralresources)
|
||||
- [Notifications/DisallowNotificationMirroring](./policy-csp-notifications.md#notifications-disallownotificationmirroring)
|
||||
- [Power/AllowStandbyStatesWhenSleepingOnBattery](./policy-csp-power.md#power-allowstandbystateswhensleepingonbattery)
|
||||
- [Power/AllowStandbyWhenSleepingPluggedIn](./policy-csp-power.md#power-allowstandbywhensleepingpluggedin)
|
||||
- [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#power-displayofftimeoutonbattery)
|
||||
- [Power/DisplayOffTimeoutPluggedIn](./policy-csp-power.md#power-displayofftimeoutpluggedin)
|
||||
@ -4369,6 +4431,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [UserRights/TakeOwnership](./policy-csp-userrights.md#userrights-takeownership)
|
||||
- [Wifi/AllowAutoConnectToWiFiSenseHotspots](./policy-csp-wifi.md#wifi-allowautoconnecttowifisensehotspots)
|
||||
- [Wifi/AllowInternetSharing](./policy-csp-wifi.md#wifi-allowinternetsharing)
|
||||
- [WindowsConnectionManager/ProhitConnectionToNonDomainNetworksWhenConnectedToDomainAuthenticatedNetwork](./policy-csp-windowsconnectionmanager.md#windowsconnectionmanager-prohitconnectiontonondomainnetworkswhenconnectedtodomainauthenticatednetwork)
|
||||
- [WindowsDefenderSecurityCenter/CompanyName](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-companyname)
|
||||
- [WindowsDefenderSecurityCenter/DisableAccountProtectionUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disableaccountprotectionui)
|
||||
- [WindowsDefenderSecurityCenter/DisableAppBrowserUI](./policy-csp-windowsdefendersecuritycenter.md#windowsdefendersecuritycenter-disableappbrowserui)
|
||||
@ -4392,76 +4455,13 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [WindowsInkWorkspace/AllowWindowsInkWorkspace](./policy-csp-windowsinkworkspace.md#windowsinkworkspace-allowwindowsinkworkspace)
|
||||
- [WindowsLogon/DisableLockScreenAppNotifications](./policy-csp-windowslogon.md#windowslogon-disablelockscreenappnotifications)
|
||||
- [WindowsLogon/DontDisplayNetworkSelectionUI](./policy-csp-windowslogon.md#windowslogon-dontdisplaynetworkselectionui)
|
||||
- [WindowsLogon/EnumerateLocalUsersOnDomainJoinedComputers](./policy-csp-windowslogon.md#windowslogon-enumeratelocalusersondomainjoinedcomputers)
|
||||
- [WindowsLogon/HideFastUserSwitching](./policy-csp-windowslogon.md#windowslogon-hidefastuserswitching)
|
||||
- [WindowsLogon/SignInLastInteractiveUserAutomaticallyAfterASystemInitiatedRestart](./policy-csp-windowslogon.md#windowslogon-signinlastinteractiveuserautomaticallyafterasysteminitiatedrestart)
|
||||
- [WindowsPowerShell/TurnOnPowerShellScriptBlockLogging](./policy-csp-windowspowershell.md#windowspowershell-turnonpowershellscriptblocklogging)
|
||||
- [WirelessDisplay/AllowProjectionToPC](./policy-csp-wirelessdisplay.md#wirelessdisplay-allowprojectiontopc)
|
||||
- [WirelessDisplay/RequirePinForPairing](./policy-csp-wirelessdisplay.md#wirelessdisplay-requirepinforpairing)
|
||||
|
||||
<!--StartIoTCore-->
|
||||
## <a href="" id="iotcore"></a>Policies supported by IoT Core
|
||||
|
||||
- [ApplicationManagement/AllowDeveloperUnlock](#applicationmanagement-allowdeveloperunlock)
|
||||
- [Authentication/AllowFastReconnect](#authentication-allowfastreconnect)
|
||||
- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising)
|
||||
- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode)
|
||||
- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename)
|
||||
- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist)
|
||||
- [Browser/AllowAutofill](#browser-allowautofill)
|
||||
- [Browser/AllowBrowser](#browser-allowbrowser)
|
||||
- [Browser/AllowCookies](#browser-allowcookies)
|
||||
- [Browser/AllowDoNotTrack](#browser-allowdonottrack)
|
||||
- [Browser/AllowInPrivate](#browser-allowinprivate)
|
||||
- [Browser/AllowPasswordManager](#browser-allowpasswordmanager)
|
||||
- [Browser/AllowPopups](#browser-allowpopups)
|
||||
- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar)
|
||||
- [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist)
|
||||
- [Browser/EnterpriseSiteListServiceUrl](#browser-enterprisesitelistserviceurl)
|
||||
- [Browser/SendIntranetTraffictoInternetExplorer](#browser-sendintranettraffictointernetexplorer)
|
||||
- [Camera/AllowCamera](#camera-allowcamera)
|
||||
- [Cellular/ShowAppCellularAccessUI](#cellular-showappcellularaccessui)
|
||||
- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth)
|
||||
- [Connectivity/AllowCellularDataRoaming](#connectivity-allowcellulardataroaming)
|
||||
- [Connectivity/AllowNFC](#connectivity-allownfc)
|
||||
- [Connectivity/AllowUSBConnection](#connectivity-allowusbconnection)
|
||||
- [Connectivity/AllowVPNOverCellular](#connectivity-allowvpnovercellular)
|
||||
- [Connectivity/AllowVPNRoamingOverCellular](#connectivity-allowvpnroamingovercellular)
|
||||
- [Connectivity/DiablePrintingOverHTTP](#connectivity-diableprintingoverhttp)
|
||||
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](#connectivity-disabledownloadingofprintdriversoverhttp)
|
||||
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
|
||||
- [Connectivity/HardenedUNCPaths](#connectivity-hardeneduncpaths)
|
||||
- [Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge](#connectivity-prohibitinstallationandconfigurationofnetworkbridge)
|
||||
- [CredentialProviders/AllowPINLogon](#credentialproviders-allowpinlogon)
|
||||
- [CredentialProviders/BlockPicturePassword](#credentialproviders-blockpicturepassword)
|
||||
- [DataProtection/AllowDirectMemoryAccess](#dataprotection-allowdirectmemoryaccess)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps)
|
||||
- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground)
|
||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||
- [Security/AllowAddProvisioningPackage](#security-allowaddprovisioningpackage)
|
||||
- [Security/AllowRemoveProvisioningPackage](#security-allowremoveprovisioningpackage)
|
||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||
- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature)
|
||||
- [System/AllowEmbeddedMode](#system-allowembeddedmode)
|
||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
||||
- [System/AllowStorageCard](#system-allowstoragecard)
|
||||
- [System/TelemetryProxy](#system-telemetryproxy)
|
||||
- [Update/AllowNonMicrosoftSignedUpdate](#update-allownonmicrosoftsignedupdate)
|
||||
- [Update/AllowUpdateService](#update-allowupdateservice)
|
||||
- [Update/PauseDeferrals](#update-pausedeferrals)
|
||||
- [Update/RequireDeferUpgrade](#update-requiredeferupgrade)
|
||||
- [Update/RequireUpdateApproval](#update-requireupdateapproval)
|
||||
- [Update/ScheduledInstallDay](#update-scheduledinstallday)
|
||||
- [Update/ScheduledInstallTime](#update-scheduledinstalltime)
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
- [Wifi/AllowAutoConnectToWiFiSenseHotspots](#wifi-allowautoconnecttowifisensehotspots)
|
||||
- [Wifi/AllowInternetSharing](#wifi-allowinternetsharing)
|
||||
- [Wifi/AllowWiFi](#wifi-allowwifi)
|
||||
- [Wifi/WLANScanMode](#wifi-wlanscanmode)
|
||||
<!--EndIoTCore-->
|
||||
|
||||
<!--StartHoloLens-->
|
||||
## <a href="" id="hololenspolicies"></a>Policies supported by Windows Holographic for Business
|
||||
|
||||
@ -4485,19 +4485,10 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Experience/AllowCortana](#experience-allowcortana)
|
||||
- [Experience/AllowManualMDMUnenrollment](#experience-allowmanualmdmunenrollment)
|
||||
- [Privacy/AllowInputPersonalization](#privacy-allowinputpersonalization)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps)
|
||||
- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground)
|
||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||
- [Search/AllowSearchToUseLocation](#search-allowsearchtouselocation)
|
||||
- [Security/RequireDeviceEncryption](#security-requiredeviceencryption)
|
||||
- [Settings/AllowDateTime](#settings-allowdatetime)
|
||||
- [Settings/AllowVPN](#settings-allowvpn)
|
||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
||||
- [System/AllowLocation](#system-allowlocation)
|
||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
||||
@ -4507,125 +4498,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
<!--EndHoloLens-->
|
||||
|
||||
<!--StartSurfaceHub-->
|
||||
## <a href="" id="surfacehubpolicies"></a>Policies supported by Microsoft Surface Hub
|
||||
|
||||
- [Bluetooth/AllowAdvertising](#bluetooth-allowadvertising)
|
||||
- [Bluetooth/AllowDiscoverableMode](#bluetooth-allowdiscoverablemode)
|
||||
- [Bluetooth/AllowPrepairing](#bluetooth-allowprepairing)
|
||||
- [Bluetooth/LocalDeviceName](#bluetooth-localdevicename)
|
||||
- [Bluetooth/ServicesAllowedList](#bluetooth-servicesallowedlist)
|
||||
- [Browser/AllowAddressBarDropdown](#browser-allowaddressbardropdown)
|
||||
- [Browser/AllowCookies](#browser-allowcookies)
|
||||
- [Browser/AllowDeveloperTools](#browser-allowdevelopertools)
|
||||
- [Browser/AllowDoNotTrack](#browser-allowdonottrack)
|
||||
- [Browser/AllowMicrosoftCompatibilityList](#browser-allowmicrosoftcompatibilitylist)
|
||||
- [Browser/AllowPopups](#browser-allowpopups)
|
||||
- [Browser/AllowSearchSuggestionsinAddressBar](#browser-allowsearchsuggestionsinaddressbar)
|
||||
- [Browser/AllowSmartScreen](#browser-allowsmartscreen)
|
||||
- [Browser/ClearBrowsingDataOnExit](#browser-clearbrowsingdataonexit)
|
||||
- [Browser/ConfigureAdditionalSearchEngines](#browser-configureadditionalsearchengines)
|
||||
- [Browser/DisableLockdownOfStartPages](#browser-disablelockdownofstartpages)
|
||||
- [Browser/HomePages](#browser-homepages)
|
||||
- [Browser/PreventLiveTileDataCollection](#browser-preventlivetiledatacollection)
|
||||
- [Browser/PreventSmartScreenPromptOverride](#browser-preventsmartscreenpromptoverride)
|
||||
- [Browser/PreventSmartScreenPromptOverrideForFiles](#browser-preventsmartscreenpromptoverrideforfiles)
|
||||
- [Browser/SetDefaultSearchEngine](#browser-setdefaultsearchengine)
|
||||
- [Camera/AllowCamera](#camera-allowcamera)
|
||||
- [Cellular/ShowAppCellularAccessUI](#cellular-showappcellularaccessui)
|
||||
- [ConfigOperations/ADMXInstall](#configoperations-admxinstall)
|
||||
- [Connectivity/AllowBluetooth](#connectivity-allowbluetooth)
|
||||
- [Connectivity/AllowConnectedDevices](#connectivity-allowconnecteddevices)
|
||||
- [Cryptography/AllowFipsAlgorithmPolicy](#cryptography-allowfipsalgorithmpolicy)
|
||||
- [Cryptography/TLSCipherSuites](#cryptography-tlsciphersuites)
|
||||
- [Defender/AllowArchiveScanning](#defender-allowarchivescanning)
|
||||
- [Defender/AllowBehaviorMonitoring](#defender-allowbehaviormonitoring)
|
||||
- [Defender/AllowCloudProtection](#defender-allowcloudprotection)
|
||||
- [Defender/AllowEmailScanning](#defender-allowemailscanning)
|
||||
- [Defender/AllowFullScanOnMappedNetworkDrives](#defender-allowfullscanonmappednetworkdrives)
|
||||
- [Defender/AllowFullScanRemovableDriveScanning](#defender-allowfullscanremovabledrivescanning)
|
||||
- [Defender/AllowIOAVProtection](#defender-allowioavprotection)
|
||||
- [Defender/AllowIntrusionPreventionSystem](#defender-allowintrusionpreventionsystem)
|
||||
- [Defender/AllowOnAccessProtection](#defender-allowonaccessprotection)
|
||||
- [Defender/AllowRealtimeMonitoring](#defender-allowrealtimemonitoring)
|
||||
- [Defender/AllowScanningNetworkFiles](#defender-allowscanningnetworkfiles)
|
||||
- [Defender/AllowScriptScanning](#defender-allowscriptscanning)
|
||||
- [Defender/AllowUserUIAccess](#defender-allowuseruiaccess)
|
||||
- [Defender/AvgCPULoadFactor](#defender-avgcpuloadfactor)
|
||||
- [Defender/DaysToRetainCleanedMalware](#defender-daystoretaincleanedmalware)
|
||||
- [Defender/ExcludedExtensions](#defender-excludedextensions)
|
||||
- [Defender/ExcludedPaths](#defender-excludedpaths)
|
||||
- [Defender/ExcludedProcesses](#defender-excludedprocesses)
|
||||
- [Defender/PUAProtection](#defender-puaprotection)
|
||||
- [Defender/RealTimeScanDirection](#defender-realtimescandirection)
|
||||
- [Defender/ScanParameter](#defender-scanparameter)
|
||||
- [Defender/ScheduleQuickScanTime](#defender-schedulequickscantime)
|
||||
- [Defender/ScheduleScanDay](#defender-schedulescanday)
|
||||
- [Defender/ScheduleScanTime](#defender-schedulescantime)
|
||||
- [Defender/SignatureUpdateInterval](#defender-signatureupdateinterval)
|
||||
- [Defender/SubmitSamplesConsent](#defender-submitsamplesconsent)
|
||||
- [Defender/ThreatSeverityDefaultAction](#defender-threatseveritydefaultaction)
|
||||
- [DeliveryOptimization/DOAbsoluteMaxCacheSize](#deliveryoptimization-doabsolutemaxcachesize)
|
||||
- [DeliveryOptimization/DOAllowVPNPeerCaching](#deliveryoptimization-doallowvpnpeercaching)
|
||||
- [DeliveryOptimization/DODownloadMode](#deliveryoptimization-dodownloadmode)
|
||||
- [DeliveryOptimization/DOGroupId](#deliveryoptimization-dogroupid)
|
||||
- [DeliveryOptimization/DOMaxCacheAge](#deliveryoptimization-domaxcacheage)
|
||||
- [DeliveryOptimization/DOMaxCacheSize](#deliveryoptimization-domaxcachesize)
|
||||
- [DeliveryOptimization/DOMaxDownloadBandwidth](#deliveryoptimization-domaxdownloadbandwidth)
|
||||
- [DeliveryOptimization/DOMaxUploadBandwidth](#deliveryoptimization-domaxuploadbandwidth)
|
||||
- [DeliveryOptimization/DOMinBackgroundQos](#deliveryoptimization-dominbackgroundqos)
|
||||
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](#deliveryoptimization-domindisksizeallowedtopeer)
|
||||
- [DeliveryOptimization/DOMinFileSizeToCache](#deliveryoptimization-dominfilesizetocache)
|
||||
- [DeliveryOptimization/DOMinRAMAllowedToPeer](#deliveryoptimization-dominramallowedtopeer)
|
||||
- [DeliveryOptimization/DOModifyCacheDrive](#deliveryoptimization-domodifycachedrive)
|
||||
- [DeliveryOptimization/DOMonthlyUploadDataCap](#deliveryoptimization-domonthlyuploaddatacap)
|
||||
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](#deliveryoptimization-dopercentagemaxdownloadbandwidth)
|
||||
- [Desktop/PreventUserRedirectionOfProfileFolders](#desktop-preventuserredirectionofprofilefolders)
|
||||
- [Privacy/EnableActivityFeed](#privacy-enableactivityfeed)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo](#privacy-letappsgetdiagnosticinfo)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps](#privacy-letappsgetdiagnosticinfo-forceallowtheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps](#privacy-letappsgetdiagnosticinfo-forcedenytheseapps)
|
||||
- [Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps](#privacy-letappsgetdiagnosticinfo-userincontroloftheseapps)
|
||||
- [Privacy/LetAppsRunInBackground](#privacy-letappsruninbackground)
|
||||
- [Privacy/LetAppsRunInBackground_ForceAllowTheseApps](#privacy-letappsruninbackground-forceallowtheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_ForceDenyTheseApps](#privacy-letappsruninbackground-forcedenytheseapps)
|
||||
- [Privacy/LetAppsRunInBackground_UserInControlOfTheseApps](#privacy-letappsruninbackground-userincontroloftheseapps)
|
||||
- [Privacy/PublishUserActivities](#privacy-publishuseractivities)
|
||||
- [Security/RequireProvisioningPackageSignature](#security-requireprovisioningpackagesignature)
|
||||
- [Security/RequireRetrieveHealthCertificateOnBoot](#security-requireretrievehealthcertificateonboot)
|
||||
- [Start/StartLayout](#start-startlayout)
|
||||
- [System/AllowFontProviders](#system-allowfontproviders)
|
||||
- [System/AllowLocation](#system-allowlocation)
|
||||
- [System/AllowTelemetry](#system-allowtelemetry)
|
||||
- [TextInput/AllowIMELogging](#textinput-allowimelogging)
|
||||
- [TextInput/AllowIMENetworkAccess](#textinput-allowimenetworkaccess)
|
||||
- [TextInput/AllowInputPanel](#textinput-allowinputpanel)
|
||||
- [TextInput/AllowJapaneseIMESurrogatePairCharacters](#textinput-allowjapaneseimesurrogatepaircharacters)
|
||||
- [TextInput/AllowJapaneseIVSCharacters](#textinput-allowjapaneseivscharacters)
|
||||
- [TextInput/AllowJapaneseNonPublishingStandardGlyph](#textinput-allowjapanesenonpublishingstandardglyph)
|
||||
- [TextInput/AllowJapaneseUserDictionary](#textinput-allowjapaneseuserdictionary)
|
||||
- [TextInput/AllowLanguageFeaturesUninstall](#textinput-allowlanguagefeaturesuninstall)
|
||||
- [TextInput/ExcludeJapaneseIMEExceptJIS0208](#textinput-excludejapaneseimeexceptjis0208)
|
||||
- [TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC](#textinput-excludejapaneseimeexceptjis0208andeudc)
|
||||
- [TextInput/ExcludeJapaneseIMEExceptShiftJIS](#textinput-excludejapaneseimeexceptshiftjis)
|
||||
- [Update/AllowAutoUpdate](#update-allowautoupdate)
|
||||
- [Update/AllowUpdateService](#update-allowupdateservice)
|
||||
- [Update/AutoRestartNotificationSchedule](#update-autorestartnotificationschedule)
|
||||
- [Update/AutoRestartRequiredNotificationDismissal](#update-autorestartrequirednotificationdismissal)
|
||||
- [Update/BranchReadinessLevel](#update-branchreadinesslevel)
|
||||
- [Update/DeferFeatureUpdatesPeriodInDays](#update-deferfeatureupdatesperiodindays)
|
||||
- [Update/DeferQualityUpdatesPeriodInDays](#update-deferqualityupdatesperiodindays)
|
||||
- [Update/DetectionFrequency](#update-detectionfrequency)
|
||||
- [Update/PauseFeatureUpdates](#update-pausefeatureupdates)
|
||||
- [Update/PauseQualityUpdates](#update-pausequalityupdates)
|
||||
- [Update/ScheduleImminentRestartWarning](#update-scheduleimminentrestartwarning)
|
||||
- [Update/ScheduleRestartWarning](#update-schedulerestartwarning)
|
||||
- [Update/SetAutoRestartNotificationDisable](#update-setautorestartnotificationdisable)
|
||||
- [Update/UpdateServiceUrl](#update-updateserviceurl)
|
||||
- [Update/UpdateServiceUrlAlternate](#update-updateserviceurlalternate)
|
||||
- [WiFi/AllowWiFiHotSpotReporting](#wifi-allowwifihotspotreporting)
|
||||
<!--EndSurfaceHub-->
|
||||
|
||||
<!--StartEAS-->
|
||||
## <a href="" id="eas"></a>Policies that can be set using Exchange Active Sync (EAS)
|
||||
|
||||
@ -4653,7 +4525,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
||||
- [Wifi/AllowWiFi](#wifi-allowwifi)
|
||||
<!--EndEAS-->
|
||||
|
||||
|
||||
## Examples
|
||||
|
||||
Set the minimum password length to 4 characters.
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - AboveLock
|
||||
@ -202,6 +202,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - AccountPoliciesAccountLockoutPolicy
|
||||
@ -180,6 +180,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Accounts
|
||||
@ -244,6 +244,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ActiveXControls
|
||||
@ -95,6 +95,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,11 +6,13 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ApplicationDefaults
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
@ -22,6 +24,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#applicationdefaults-defaultassociationsconfiguration">ApplicationDefaults/DefaultAssociationsConfiguration</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#applicationdefaults-enableappurihandlers">ApplicationDefaults/EnableAppUriHandlers</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
@ -132,6 +137,73 @@ Here is the SyncMl example:
|
||||
|
||||
<!--/Example-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="applicationdefaults-enableappurihandlers"></a>**ApplicationDefaults/EnableAppUriHandlers**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td></td>
|
||||
<td></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting determines whether Windows supports web-to-app linking with app URI handlers.
|
||||
|
||||
Enabling this policy setting enables web-to-app linking so that apps can be launched with a http(s) URI.
|
||||
|
||||
Disabling this policy disables web-to-app linking and http(s) URIs will be opened in the default browser instead of launching the associated app.
|
||||
|
||||
If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Configure web-to-app linking with app URI handlers*
|
||||
- GP name: *EnableAppUriHandlers*
|
||||
- GP ADMX file name: *GroupPolicy.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
This setting supports a range of values between 0 and 1.
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
@ -139,6 +211,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,11 +6,13 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ApplicationManagement
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
@ -43,6 +45,12 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#applicationmanagement-disablestoreoriginatedapps">ApplicationManagement/DisableStoreOriginatedApps</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#applicationmanagement-msiallowusercontroloverinstall">ApplicationManagement/MSIAllowUserControlOverInstall</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#applicationmanagement-msialwaysinstallwithelevatedprivileges">ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#applicationmanagement-requireprivatestoreonly">ApplicationManagement/RequirePrivateStoreOnly</a>
|
||||
</dd>
|
||||
@ -538,6 +546,144 @@ The following list shows the supported values:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="applicationmanagement-msiallowusercontroloverinstall"></a>**ApplicationManagement/MSIAllowUserControlOverInstall**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. This policy setting permits users to change installation options that typically are available only to system administrators.
|
||||
|
||||
If you enable this policy setting, some of the security features of Windows Installer are bypassed. It permits installations to complete that otherwise would be halted due to a security violation.
|
||||
|
||||
If you disable or do not configure this policy setting, the security features of Windows Installer prevent users from changing installation options typically reserved for system administrators, such as specifying the directory to which files are installed.
|
||||
|
||||
If Windows Installer detects that an installation package has permitted the user to change a protected option, it stops the installation and displays a message. These security features operate only when the installation program is running in a privileged security context in which it has access to directories denied to the user.
|
||||
|
||||
This policy setting is designed for less restrictive environments. It can be used to circumvent errors in an installation program that prevents software from being installed.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow user control over installs*
|
||||
- GP name: *EnableUserControl*
|
||||
- GP ADMX file name: *MSI.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
This setting supports a range of values between 0 and 1.
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="applicationmanagement-msialwaysinstallwithelevatedprivileges"></a>**ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. This policy setting directs Windows Installer to use elevated permissions when it installs any program on the system.
|
||||
|
||||
If you enable this policy setting, privileges are extended to all programs. These privileges are usually reserved for programs that have been assigned to the user (offered on the desktop), assigned to the computer (installed automatically), or made available in Add or Remove Programs in Control Panel. This profile setting lets users install programs that require access to directories that the user might not have permission to view or change, including directories on highly restricted computers.
|
||||
|
||||
If you disable or do not configure this policy setting, the system applies the current user's permissions when it installs programs that a system administrator does not distribute or offer.
|
||||
|
||||
Note: This policy setting appears both in the Computer Configuration and User Configuration folders. To make this policy setting effective, you must enable it in both folders.
|
||||
|
||||
Caution: Skilled users can take advantage of the permissions this policy setting grants to change their privileges and gain permanent access to restricted files and folders. Note that the User Configuration version of this policy setting is not guaranteed to be secure.
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Always install with elevated privileges*
|
||||
- GP name: *AlwaysInstallElevated*
|
||||
- GP ADMX file name: *MSI.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
This setting supports a range of values between 0 and 1.
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="applicationmanagement-requireprivatestoreonly"></a>**ApplicationManagement/RequirePrivateStoreOnly**
|
||||
|
||||
@ -569,6 +715,7 @@ The following list shows the supported values:
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
@ -582,9 +729,7 @@ Most restricted value is 1.
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Only display the private store within the Microsoft Store*
|
||||
- GP name: *RequirePrivateStoreOnly_1*
|
||||
- GP path: *Windows Components/Store*
|
||||
- GP name: *RequirePrivateStoreOnly*
|
||||
- GP ADMX file name: *WindowsStore.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
@ -723,6 +868,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
78
windows/client-management/mdm/policy-csp-appruntime.md
Normal file
78
windows/client-management/mdm/policy-csp-appruntime.md
Normal file
@ -0,0 +1,78 @@
|
||||
---
|
||||
title: Policy CSP - AppRuntime
|
||||
description: Policy CSP - AppRuntime
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - AppRuntime
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## AppRuntime policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#appruntime-allowmicrosoftaccountstobeoptional">AppRuntime/AllowMicrosoftAccountsToBeOptional</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="appruntime-allowmicrosoftaccountstobeoptional"></a>**AppRuntime/AllowMicrosoftAccountsToBeOptional**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting lets you control whether Microsoft accounts are optional for Windows Store apps that require an account to sign in. This policy only affects Windows Store apps that support it.
|
||||
|
||||
If you enable this policy setting, Windows Store apps that typically require a Microsoft account to sign in will allow users to sign in with an enterprise account instead.
|
||||
|
||||
If you disable or do not configure this policy setting, users will need to sign in with a Microsoft account.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow Microsoft accounts to be optional*
|
||||
- GP name: *AppxRuntimeMicrosoftAccountsOptional*
|
||||
- GP path: *Windows Components/App runtime*
|
||||
- GP ADMX file name: *AppXRuntime.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - AppVirtualization
|
||||
@ -1836,6 +1836,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - AttachmentManager
|
||||
@ -229,6 +229,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Authentication
|
||||
@ -309,6 +309,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Autoplay
|
||||
@ -245,6 +245,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Bitlocker
|
||||
@ -114,6 +114,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Bluetooth
|
||||
@ -282,7 +282,7 @@ If this policy is not set or it is deleted, the default local radio name is used
|
||||
<!--Description-->
|
||||
Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}.
|
||||
|
||||
The default value is an empty string.
|
||||
The default value is an empty string. For more information, see [ServicesAllowedList usage guide](#servicesallowedlist-usage-guide)
|
||||
|
||||
<!--/Description-->
|
||||
<!--/Policy-->
|
||||
@ -293,9 +293,99 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
## ServicesAllowedList usage guide
|
||||
|
||||
When the Bluetooth/ServicesAllowedList policy is provisioned, it will only allow pairing and connections of Windows PCs and phones to explicitly define Bluetooth profiles and services. It is an allowed list, enabling admins to still allow custom Bluetooth profiles that are not defined by the Bluetooth Special Interests Group (SIG).
|
||||
|
||||
To define which profiles and services are allowed, enter the profile or service Universally Unique Identifiers (UUID) using semicolon delimiter. To get a profile UUID, refer to the [Service Discovery](https://www.bluetooth.com/specifications/assigned-numbers/service-discovery) page on the Bluetooth SIG website.
|
||||
|
||||
These UUIDs all use the same base UUID with the profile identifiers added to the beginning of the base UUID.
|
||||
|
||||
Here are some examples:
|
||||
|
||||
**Bluetooth Headsets for Voice (HFP)**
|
||||
|
||||
BASE_UUID = 0x00000000-0000-1000-8000-00805F9B34FB
|
||||
|
||||
|UUID name |Protocol specification |UUID |
|
||||
|---------|---------|---------|
|
||||
|HFP(Hands Free Profile) |Hands-Free Profile (HFP) * |0x111E |
|
||||
|
||||
Footnote: * Used as both Service Class Identifier and Profile Identifier.
|
||||
|
||||
Hands Free Profile UUID = base UUID + 0x111E to the beginning = 0000111E-0000-1000-8000-00805F9B34FB
|
||||
|
||||
**Allow Audio Headsets only (Voice)**
|
||||
|
||||
|Profile |Reasoning |UUID |
|
||||
|---------|---------|---------|
|
||||
|HFP (Hands Free Profile) |For voice enabled headsets |0x111E |
|
||||
|GAP (Generic Access Profile)* |Generic service used by Bluetooth |0x1800 |
|
||||
|DID (Device ID)* |Generic service used by Bluetooth |0x180A |
|
||||
|Scan Parameters* |Generic service used by Bluetooth |0x1813 |
|
||||
|
||||
Footnote: * *GAP, DID, and Scan Parameter are required, as these are underlying profiles and services used by all Bluetooth devices.
|
||||
|
||||
This means that if you only want Bluetooth headsets, the UUIDs are:
|
||||
|
||||
{0000111E-0000-1000-8000-00805F9B34FB};{00001800-0000-1000-8000-00805F9B34FB};{0000180A-0000-1000-8000-00805F9B34FB};{00001813-0000-1000-8000-00805F9B34FB}
|
||||
|
||||
**Allow Audio Headsets and Speakers (Voice & Music)**
|
||||
|
||||
|Profile |Reasoning |UUID |
|
||||
|---------|---------|---------|
|
||||
|HFP (Hands Free Profile) |For voice enabled headsets |0x111E |
|
||||
|A2DP Source (Advance Audio Distribution)|For streaming to Bluetooth speakers |0x110A |
|
||||
|GAP (Generic Access Profile) |Generic service used by Bluetooth |0x1800 |
|
||||
|Device ID (DID) |Generic service used by Bluetooth |0x180A |
|
||||
|Scan Parameters |Generic service used by Bluetooth |0x1813 |
|
||||
|
||||
{0000111E-0000-1000-8000-00805F9B34FB};{0000110A-0000-1000-8000-00805F9B34FB};{00001800-0000-1000-8000-00805F9B34FB};{0000180A-0000-1000-8000-00805F9B34FB};{00001813-0000-1000-8000-00805F9B34FB}
|
||||
|
||||
**Classic Keyboards and Mice**
|
||||
|
||||
|Profile |Reasoning |UUID |
|
||||
|---------|---------|---------|
|
||||
|HID (Human Interface Device) |For classic BR/EDR keyboards and mice |0x1124 |
|
||||
|GAP (Generic Access Profile) |Generic service used by Bluetooth |0x1800 |
|
||||
|DID (Device ID) |Generic service used by Bluetooth |0x180A |
|
||||
|Scan Parameters |Generic service used by Bluetooth |0x1813 |
|
||||
|
||||
{00001801-0000-1000-8000-00805F9B34FB};{00001812-0000-1000-8000-00805F9B34FB};{00001800-0000-1000-8000-00805F9B34FB};{0000180A-0000-1000-8000-00805F9B34FB};{00001813-0000-1000-8000-00805F9B34FB}
|
||||
|
||||
> [!Note]
|
||||
> For both Classic and LE use a super set of the two formula’s UUIDs
|
||||
|
||||
**LE Keyboards and Mice**
|
||||
|
||||
|Profile |Reasoning |UUID |
|
||||
|---------|---------|---------|
|
||||
|Generic Access Atribute |For the LE Protocol |0x1801 |
|
||||
|HID Over GATT * |For LE keyboards and mice |0x1812 |
|
||||
|GAP (Generic Access Profile) |Generic service used by Bluetooth |0x1800 |
|
||||
|DID (Device ID) |Generic service used by Bluetooth |0x180A |
|
||||
|Scan Parameters |Generic service used by Bluetooth |0x1813 |
|
||||
|
||||
Footnote: * The Surface pen uses the HID over GATT profile
|
||||
|
||||
{00001801-0000-1000-8000-00805F9B34FB};{00001812-0000-1000-8000-00805F9B34FB};{00001800-0000-1000-8000-00805F9B34FB};{0000180A-0000-1000-8000-00805F9B34FB};{00001813-0000-1000-8000-00805F9B34FB}
|
||||
|
||||
**Allow File Transfer**
|
||||
|
||||
|Profile |Reasoning |UUID |
|
||||
|---------|---------|---------|
|
||||
|OBEX Object Push (OPP) |For file transfer |0x1105 |
|
||||
|Object Exchange (OBEX) |Protocol for file transfer |0x0008 |
|
||||
|Generic Access Profile (GAP) |Generic service used by Bluetooth |0x1800 |
|
||||
|Device ID (DID) |Generic service used by Bluetooth |0x180A |
|
||||
|Scan Parameters |Generic service used by Bluetooth |0x1813 |
|
||||
|
||||
{00001105-0000-1000-8000-00805F9B34FB};{00000008-0000-1000-8000-00805F9B34FB};{0000111E-0000-1000-8000-00805F9B34FB};{00001800-0000-1000-8000-00805F9B34FB};{0000180A-0000-1000-8000-00805F9B34FB};{00001813-0000-1000-8000-00805F9B34FB}
|
||||
|
||||
<!--StartHoloLens-->
|
||||
## <a href="" id="hololenspolicies"></a>Bluetooth policies supported by Windows Holographic for Business
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/13/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Browser
|
||||
@ -117,6 +117,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#browser-preventsmartscreenpromptoverrideforfiles">Browser/PreventSmartScreenPromptOverrideForFiles</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#browser-preventtabpreloading">Browser/PreventTabPreloading</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#browser-preventusinglocalhostipaddressforwebrtc">Browser/PreventUsingLocalHostIPAddressForWebRTC</a>
|
||||
</dd>
|
||||
@ -2150,6 +2153,58 @@ The following list shows the supported values:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="browser-preventtabpreloading"></a>**Browser/PreventTabPreloading**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td></td>
|
||||
<td></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. This is only a placeholder. Do not use in production code.
|
||||
|
||||
<!--/Description-->
|
||||
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Allow pre-launch and preload.
|
||||
- 1 – Prevent pre-launch and preload.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="browser-preventusinglocalhostipaddressforwebrtc"></a>**Browser/PreventUsingLocalHostIPAddressForWebRTC**
|
||||
|
||||
@ -2616,6 +2671,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Camera
|
||||
@ -91,6 +91,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Cellular
|
||||
@ -324,6 +324,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,11 +6,13 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/14/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Connectivity
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
@ -34,6 +36,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#connectivity-allownfc">Connectivity/AllowNFC</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#connectivity-allowphonepclinking">Connectivity/AllowPhonePCLinking</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#connectivity-allowusbconnection">Connectivity/AllowUSBConnection</a>
|
||||
</dd>
|
||||
@ -355,6 +360,76 @@ The following list shows the supported values:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="connectivity-allowphonepclinking"></a>**Connectivity/AllowPhonePCLinking**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td></td>
|
||||
<td></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. This policy allows IT admins to turn off the ability to Link a Phone with a PC to continue tasks, such as reading, email, and other tasks that require linking between Phone and PC.
|
||||
|
||||
If you enable this policy setting, the Windows device will be able to enroll in Phone-PC linking functionality and participate in 'Continue on PC experiences'. If you disable this policy setting, the Windows device is not allowed to be linked to phones, will remove itself from the device list of any linked Phones, and cannot participate in 'Continue on PC experiences'.
|
||||
If you do not configure this policy setting, the default behavior depends on the Windows edition. Changes to this policy take effect on reboot.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP name: *enableMMX*
|
||||
- GP ADMX file name: *grouppolicy.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
This setting supports a range of values between 0 and 1.
|
||||
|
||||
- 0 - Do not link
|
||||
- 1 (default) - Allow phone-PC linking
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
Validation:
|
||||
|
||||
If the Connectivity/AllowPhonePCLinking policy is configured to value 0, the add a phone button in the Phones section in settings will be greyed out and clicking it will not launch the window for a user to enter their phone number.
|
||||
|
||||
Device that has previously opt-in to MMX will also stop showing on the device list.
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="connectivity-allowusbconnection"></a>**Connectivity/AllowUSBConnection**
|
||||
|
||||
@ -898,6 +973,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ControlPolicyConflict
|
||||
@ -91,6 +91,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - CredentialProviders
|
||||
@ -219,6 +219,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -0,0 +1,80 @@
|
||||
---
|
||||
title: Policy CSP - CredentialsDelegation
|
||||
description: Policy CSP - CredentialsDelegation
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - CredentialsDelegation
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## CredentialsDelegation policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials">CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="credentialsdelegation-remotehostallowsdelegationofnonexportablecredentials"></a>**CredentialsDelegation/RemoteHostAllowsDelegationOfNonExportableCredentials**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Remote host allows delegation of non-exportable credentials
|
||||
|
||||
When using credential delegation, devices provide an exportable version of credentials to the remote host. This exposes users to the risk of credential theft from attackers on the remote host.
|
||||
|
||||
If you enable this policy setting, the host supports Restricted Admin or Remote Credential Guard mode.
|
||||
|
||||
If you disable or do not configure this policy setting, Restricted Administration and Remote Credential Guard mode are not supported. User will always need to pass their credentials to the host.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Remote host allows delegation of non-exportable credentials*
|
||||
- GP name: *AllowProtectedCreds*
|
||||
- GP path: *System/Credentials Delegation*
|
||||
- GP ADMX file name: *CredSsp.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - CredentialsUI
|
||||
@ -163,6 +163,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Cryptography
|
||||
@ -133,6 +133,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DataProtection
|
||||
@ -136,6 +136,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DataUsage
|
||||
@ -170,6 +170,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Defender
|
||||
@ -2318,6 +2318,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DeliveryOptimization
|
||||
@ -1217,6 +1217,13 @@ Added in Windows 10, version 1803. Specifies the maximum background download ban
|
||||
Note that downloads from LAN peers will not be throttled even when this policy is set.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP name: *PercentageMaxBackgroundBandwidth*
|
||||
- GP element: *PercentageMaxBackgroundBandwidth*
|
||||
- GP ADMX file name: *DeliveryOptimization.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
@ -1273,6 +1280,13 @@ Added in Windows 10, version 1803. Specifies the maximum foreground download ban
|
||||
Note that downloads from LAN peers will not be throttled even when this policy is set.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP name: *PercentageMaxForegroundBandwidth*
|
||||
- GP element: *PercentageMaxForegroundBandwidth*
|
||||
- GP ADMX file name: *DeliveryOptimization.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
@ -1377,14 +1391,6 @@ The following list shows the supported values:
|
||||
Added in Windows 10, version 1803. Specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth.
|
||||
|
||||
<!--/Description-->
|
||||
<!--SupportedValues-->
|
||||
This policy allows an IT Admin to define the following:
|
||||
|
||||
- Business hours range (for example 06:00 to 18:00)
|
||||
- % of throttle for background traffic during business hours
|
||||
- % of throttle for background traffic outside of business hours
|
||||
|
||||
<!--/SupportedValues-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
@ -1400,6 +1406,14 @@ ADMX Info:
|
||||
- GP ADMX file name: *DeliveryOptimization.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--SupportedValues-->
|
||||
This policy allows an IT Admin to define the following:
|
||||
|
||||
- Business hours range (for example 06:00 to 18:00)
|
||||
- % of throttle for background traffic during business hours
|
||||
- % of throttle for background traffic outside of business hours
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
@ -1443,14 +1457,6 @@ ADMX Info:
|
||||
Added in Windows 10, version 1803. Specifies the maximum foreground download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth.
|
||||
|
||||
<!--/Description-->
|
||||
<!--SupportedValues-->
|
||||
This policy allows an IT Admin to define the following:
|
||||
|
||||
- Business hours range (for example 06:00 to 18:00)
|
||||
- % of throttle for foreground traffic during business hours
|
||||
- % of throttle for foreground traffic outside of business hours
|
||||
|
||||
<!--/SupportedValues-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
@ -1466,6 +1472,14 @@ ADMX Info:
|
||||
- GP ADMX file name: *DeliveryOptimization.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--SupportedValues-->
|
||||
This policy allows an IT Admin to define the following:
|
||||
|
||||
- Business hours range (for example 06:00 to 18:00)
|
||||
- % of throttle for foreground traffic during business hours
|
||||
- % of throttle for foreground traffic outside of business hours
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
@ -1474,6 +1488,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Desktop
|
||||
@ -93,6 +93,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DeviceGuard
|
||||
@ -214,6 +214,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DeviceInstallation
|
||||
@ -158,6 +158,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - DeviceLock
|
||||
@ -66,6 +66,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#devicelock-minimumpasswordage">DeviceLock/MinimumPasswordAge</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#devicelock-preventenablinglockscreencamera">DeviceLock/PreventEnablingLockScreenCamera</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#devicelock-preventlockscreenslideshow">DeviceLock/PreventLockScreenSlideShow</a>
|
||||
</dd>
|
||||
@ -1030,6 +1033,45 @@ GP Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="devicelock-preventenablinglockscreencamera"></a>**DeviceLock/PreventEnablingLockScreenCamera**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Disables the lock screen camera toggle switch in PC Settings and prevents a camera from being invoked on the lock screen.
|
||||
|
||||
By default, users can enable invocation of an available camera on the lock screen.
|
||||
|
||||
If you enable this setting, users will no longer be able to enable or disable lock screen camera access in PC Settings, and the camera cannot be invoked on the lock screen.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Prevent enabling lock screen camera*
|
||||
- GP name: *CPL_Personalization_NoLockScreenCamera*
|
||||
- GP path: *Control Panel/Personalization*
|
||||
- GP ADMX file name: *ControlPanelDisplay.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="devicelock-preventlockscreenslideshow"></a>**DeviceLock/PreventLockScreenSlideShow**
|
||||
|
||||
@ -1150,6 +1192,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Display
|
||||
@ -355,6 +355,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Education
|
||||
@ -185,6 +185,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - EnterpriseCloudPrint
|
||||
@ -328,6 +328,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ErrorReporting
|
||||
@ -367,6 +367,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - EventLogService
|
||||
@ -290,6 +290,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Experience
|
||||
@ -1304,6 +1304,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - ExploitGuard
|
||||
@ -112,6 +112,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
112
windows/client-management/mdm/policy-csp-fileexplorer.md
Normal file
112
windows/client-management/mdm/policy-csp-fileexplorer.md
Normal file
@ -0,0 +1,112 @@
|
||||
---
|
||||
title: Policy CSP - FileExplorer
|
||||
description: Policy CSP - FileExplorer
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - FileExplorer
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## FileExplorer policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#fileexplorer-turnoffdataexecutionpreventionforexplorer">FileExplorer/TurnOffDataExecutionPreventionForExplorer</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#fileexplorer-turnoffheapterminationoncorruption">FileExplorer/TurnOffHeapTerminationOnCorruption</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="fileexplorer-turnoffdataexecutionpreventionforexplorer"></a>**FileExplorer/TurnOffDataExecutionPreventionForExplorer**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Disabling data execution prevention can allow certain legacy plug-in applications to function without terminating Explorer.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Turn off Data Execution Prevention for Explorer*
|
||||
- GP name: *NoDataExecutionPrevention*
|
||||
- GP path: *File Explorer*
|
||||
- GP ADMX file name: *Explorer.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="fileexplorer-turnoffheapterminationoncorruption"></a>**FileExplorer/TurnOffHeapTerminationOnCorruption**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Disabling heap termination on corruption can allow certain legacy plug-in applications to function without terminating Explorer immediately, although Explorer may still terminate unexpectedly later.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Turn off heap termination on corruption*
|
||||
- GP name: *NoHeapTerminationOnCorruption*
|
||||
- GP path: *File Explorer*
|
||||
- GP ADMX file name: *Explorer.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Games
|
||||
@ -81,6 +81,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Handwriting
|
||||
@ -95,6 +95,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - InternetExplorer
|
||||
@ -238,6 +238,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#internetexplorer-internetzoneallowuserdatapersistence">InternetExplorer/InternetZoneAllowUserDataPersistence</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-internetzoneallowvbscripttorunininternetexplorer">InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
||||
</dd>
|
||||
@ -406,6 +409,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#internetexplorer-lockeddowninternetzonenavigatewindowsandframes">InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-lockeddownintranetjavapermissions">InternetExplorer/LockedDownIntranetJavaPermissions</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-lockeddownintranetzoneallowaccesstodatasources">InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources</a>
|
||||
</dd>
|
||||
@ -637,6 +643,9 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#internetexplorer-restrictedsiteszoneallowuserdatapersistence">InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer">InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
||||
</dd>
|
||||
@ -2120,6 +2129,11 @@ Value - A number indicating the zone with which this site should be associated f
|
||||
|
||||
If you disable or do not configure this policy, users may choose their own site-to-zone assignments.
|
||||
|
||||
> [!Note]
|
||||
> This policy is a list that contains the site and index value.
|
||||
|
||||
The list is a set of pairs of strings. Each string is seperated by F000. Each pair of string are stored as a registry name and value. The registry name is the site and the value is an index. The index has to be sequential. See an example below.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
@ -2136,6 +2150,31 @@ ADMX Info:
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--Example-->
|
||||
```syntax
|
||||
<SyncBody>
|
||||
<Replace>
|
||||
<CmdID>2</CmdID>
|
||||
<Item>
|
||||
<Meta>
|
||||
<Format>chr</Format>
|
||||
<Type>text/plain</Type>
|
||||
</Meta>
|
||||
<Target>
|
||||
<LocURI>./Device/Vendor/MSFT/Policy/Config/InternetExplorer/AllowSiteToZoneAssignmentList</LocURI>
|
||||
</Target>
|
||||
<Data><Enabled/><Data id="IZ_ZonemapPrompt" value="http://adfs.contoso.org1http://microsoft.com2"/></Data>
|
||||
</Item>
|
||||
</Replace>
|
||||
<Final/>
|
||||
</SyncBody>
|
||||
```
|
||||
|
||||
Value and index pairs in the SyncML example:
|
||||
- http://adfs.contoso.org 1
|
||||
- http://microsoft.com 2
|
||||
|
||||
<!--/Example-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
@ -5530,6 +5569,50 @@ ADMX Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-internetzoneallowvbscripttorunininternetexplorer"></a>**InternetExplorer/InternetZoneAllowVBScriptToRunInInternetExplorer**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting allows you to manage whether VBScript can be run on pages from the specified zone in Internet Explorer.
|
||||
|
||||
If you selected Enable in the drop-down box, VBScript can run without user intervention.
|
||||
|
||||
If you selected Prompt in the drop-down box, users are asked to choose whether to allow VBScript to run.
|
||||
|
||||
If you selected Disable in the drop-down box, VBScript is prevented from running.
|
||||
|
||||
If you do not configure or disable this policy setting, VBScript is prevented from running.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow VBScript to run in Internet Explorer*
|
||||
- GP name: *IZ_PolicyAllowVBScript_1*
|
||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-internetzonedonotrunantimalwareagainstactivexcontrols"></a>**InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls**
|
||||
|
||||
@ -9180,6 +9263,54 @@ ADMX Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-lockeddownintranetjavapermissions"></a>**InternetExplorer/LockedDownIntranetJavaPermissions**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting allows you to manage permissions for Java applets.
|
||||
|
||||
If you enable this policy setting, you can choose options from the drop-down box. Custom, to control permissions settings individually.
|
||||
|
||||
Low Safety enables applets to perform all operations.
|
||||
|
||||
Medium Safety enables applets to run in their sandbox (an area in memory outside of which the program cannot make calls), plus capabilities like scratch space (a safe and secure storage area on the client computer) and user-controlled file I/O.
|
||||
|
||||
High Safety enables applets to run in their sandbox. Disable Java to prevent any applets from running.
|
||||
|
||||
If you disable this policy setting, Java applets cannot run.
|
||||
|
||||
If you do not configure this policy setting, Java applets are disabled.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Java permissions*
|
||||
- GP name: *IZ_PolicyJavaPermissions_4*
|
||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-lockeddownintranetzoneallowaccesstodatasources"></a>**InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources**
|
||||
|
||||
@ -12619,11 +12750,13 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Internet Explorer places restrictions on each Web page it opens. The restrictions are dependent upon the location of the Web page (Internet, Intranet, Local Machine zone, and so on). For example, Web pages on the local computer have the fewest security restrictions and reside in the Local Machine zone, making the Local Machine security zone a prime target for malicious users.
|
||||
Internet Explorer places restrictions on each Web page it opens. The restrictions are dependent upon the location of the Web page (Internet, Intranet, Local Machine zone, etc.). Web pages on the local computer have the fewest security restrictions and reside in the Local Machine zone, making the Local Machine security zone a prime target for malicious users. Zone Elevation also disables JavaScript navigation if there is no security context.
|
||||
|
||||
If you enable this policy setting, any zone can be protected from zone elevation for all processes.
|
||||
If you enable this policy setting, any zone can be protected from zone elevation by Internet Explorer processes.
|
||||
|
||||
If you disable or do not configure this policy setting, processes other than Internet Explorer or those listed in the Process List receive no such protection.
|
||||
If you disable this policy setting, no zone receives such protection for Internet Explorer processes.
|
||||
|
||||
If you do not configure this policy setting, any zone can be protected from zone elevation by Internet Explorer processes.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
@ -12635,8 +12768,8 @@ If you disable or do not configure this policy setting, processes other than Int
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *All Processes*
|
||||
- GP name: *IESF_PolicyAllProcesses_9*
|
||||
- GP English name: *Internet Explorer Processes*
|
||||
- GP name: *IESF_PolicyExplorerProcesses_9*
|
||||
- GP path: *Windows Components/Internet Explorer/Security Features/Protection From Zone Elevation*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
@ -12747,11 +12880,13 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting enables applications hosting the Web Browser Control to block automatic prompting of ActiveX control installation.
|
||||
This policy setting enables blocking of ActiveX control installation prompts for Internet Explorer processes.
|
||||
|
||||
If you enable this policy setting, the Web Browser Control will block automatic prompting of ActiveX control installation for all processes.
|
||||
If you enable this policy setting, prompting for ActiveX control installations will be blocked for Internet Explorer processes.
|
||||
|
||||
If you disable or do not configure this policy setting, the Web Browser Control will not block automatic prompting of ActiveX control installation for all processes.
|
||||
If you disable this policy setting, prompting for ActiveX control installations will not be blocked for Internet Explorer processes.
|
||||
|
||||
If you do not configure this policy setting, the user's preference will be used to determine whether to block ActiveX control installations for Internet Explorer processes.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
@ -12763,8 +12898,8 @@ If you disable or do not configure this policy setting, the Web Browser Control
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *All Processes*
|
||||
- GP name: *IESF_PolicyAllProcesses_11*
|
||||
- GP English name: *Internet Explorer Processes*
|
||||
- GP name: *IESF_PolicyExplorerProcesses_11*
|
||||
- GP path: *Windows Components/Internet Explorer/Security Features/Restrict ActiveX Install*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
@ -12810,11 +12945,13 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting enables applications hosting the Web Browser Control to block automatic prompting of file downloads that are not user initiated.
|
||||
This policy setting enables blocking of file download prompts that are not user initiated.
|
||||
|
||||
If you enable this policy setting, the Web Browser Control will block automatic prompting of file downloads that are not user initiated for all processes.
|
||||
If you enable this policy setting, file download prompts that are not user initiated will be blocked for Internet Explorer processes.
|
||||
|
||||
If you disable this policy setting, the Web Browser Control will not block automatic prompting of file downloads that are not user initiated for all processes.
|
||||
If you disable this policy setting, prompting will occur for file downloads that are not user initiated for Internet Explorer processes.
|
||||
|
||||
If you do not configure this policy setting, the user's preference determines whether to prompt for file downloads that are not user initiated for Internet Explorer processes.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
@ -12826,8 +12963,8 @@ If you disable this policy setting, the Web Browser Control will not block autom
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *All Processes*
|
||||
- GP name: *IESF_PolicyAllProcesses_12*
|
||||
- GP English name: *Internet Explorer Processes*
|
||||
- GP name: *IESF_PolicyExplorerProcesses_12*
|
||||
- GP path: *Windows Components/Internet Explorer/Security Features/Restrict File Download*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
@ -14197,6 +14334,50 @@ ADMX Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-restrictedsiteszoneallowvbscripttorunininternetexplorer"></a>**InternetExplorer/RestrictedSitesZoneAllowVBScriptToRunInInternetExplorer**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * User
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting allows you to manage whether VBScript can be run on pages from the specified zone in Internet Explorer.
|
||||
|
||||
If you selected Enable in the drop-down box, VBScript can run without user intervention.
|
||||
|
||||
If you selected Prompt in the drop-down box, users are asked to choose whether to allow VBScript to run.
|
||||
|
||||
If you selected Disable in the drop-down box, VBScript is prevented from running.
|
||||
|
||||
If you do not configure or disable this policy setting, VBScript is prevented from running.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow VBScript to run in Internet Explorer*
|
||||
- GP name: *IZ_PolicyAllowVBScript_7*
|
||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="internetexplorer-restrictedsiteszonedonotrunantimalwareagainstactivexcontrols"></a>**InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls**
|
||||
|
||||
@ -15560,9 +15741,11 @@ ADMX Info:
|
||||
<!--Description-->
|
||||
Internet Explorer allows scripts to programmatically open, resize, and reposition windows of various types. The Window Restrictions security feature restricts popup windows and prohibits scripts from displaying windows in which the title and status bars are not visible to the user or obfuscate other Windows' title and status bars.
|
||||
|
||||
If you enable this policy setting, scripted windows are restricted for all processes.
|
||||
If you enable this policy setting, popup windows and other restrictions apply for File Explorer and Internet Explorer processes.
|
||||
|
||||
If you disable or do not configure this policy setting, scripted windows are not restricted.
|
||||
If you disable this policy setting, scripts can continue to create popup windows and windows that obfuscate other windows.
|
||||
|
||||
If you do not configure this policy setting, popup windows and other restrictions apply for File Explorer and Internet Explorer processes.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
@ -15574,8 +15757,8 @@ If you disable or do not configure this policy setting, scripted windows are not
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *All Processes*
|
||||
- GP name: *IESF_PolicyAllProcesses_8*
|
||||
- GP English name: *Internet Explorer Processes*
|
||||
- GP name: *IESF_PolicyExplorerProcesses_8*
|
||||
- GP path: *Windows Components/Internet Explorer/Security Features/Scripted Window Security Restrictions*
|
||||
- GP ADMX file name: *inetres.admx*
|
||||
|
||||
@ -16633,6 +16816,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Kerberos
|
||||
@ -360,6 +360,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 01/30/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - KioskBrowser
|
||||
@ -314,6 +314,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
106
windows/client-management/mdm/policy-csp-lanmanworkstation.md
Normal file
106
windows/client-management/mdm/policy-csp-lanmanworkstation.md
Normal file
@ -0,0 +1,106 @@
|
||||
---
|
||||
title: Policy CSP - LanmanWorkstation
|
||||
description: Policy CSP - LanmanWorkstation
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/16/2018
|
||||
---
|
||||
|
||||
# Policy CSP - LanmanWorkstation
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## LanmanWorkstation policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#lanmanworkstation-enableinsecureguestlogons">LanmanWorkstation/EnableInsecureGuestLogons</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="lanmanworkstation-enableinsecureguestlogons"></a>**LanmanWorkstation/EnableInsecureGuestLogons**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. This policy setting determines if the SMB client will allow insecure guest logons to an SMB server.
|
||||
|
||||
If you enable this policy setting or if you do not configure this policy setting, the SMB client will allow insecure guest logons.
|
||||
|
||||
If you disable this policy setting, the SMB client will reject insecure guest logons.
|
||||
|
||||
Insecure guest logons are used by file servers to allow unauthenticated access to shared folders. While uncommon in an enterprise environment, insecure guest logons are frequently used by consumer Network Attached Storage (NAS) appliances acting as file servers. Windows file servers require authentication and do not use insecure guest logons by default. Since insecure guest logons are unauthenticated, important security features such as SMB Signing and SMB Encryption are disabled. As a result, clients that allow insecure guest logons are vulnerable to a variety of man-in-the-middle attacks that can result in data loss, data corruption, and exposure to malware. Additionally, any data written to a file server using an insecure guest logon is potentially accessible to anyone on the network. Microsoft recommends disabling insecure guest logons and configuring file servers to require authenticated access.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
- GP English name: *Enable insecure guest logons*
|
||||
- GP name: *Pol_EnableInsecureGuestLogons*
|
||||
- GP ADMX file name: *LanmanWorkstation.admx*
|
||||
|
||||
<!--/ADMXMapped-->
|
||||
<!--SupportedValues-->
|
||||
This setting supports a range of values between 0 and 1.
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--Example-->
|
||||
|
||||
<!--/Example-->
|
||||
<!--Validation-->
|
||||
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Licensing
|
||||
@ -150,6 +150,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/16/2018
|
||||
---
|
||||
|
||||
# Policy CSP - LocalPoliciesSecurityOptions
|
||||
@ -51,24 +51,6 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly">LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-digitallysignsecurechanneldatawhenpossible">LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges">LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-maximummachineaccountpasswordage">LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-domainmember-requirestrongsessionkey">LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked">LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked</a>
|
||||
</dd>
|
||||
@ -93,9 +75,6 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-interactivelogon-smartcardremovalbehavior">LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsalways">LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsifserveragrees">LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees</a>
|
||||
</dd>
|
||||
@ -126,9 +105,6 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networkaccess-restrictclientsallowedtomakeremotecallstosam">LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networksecurity-allowlocalsystemtousecomputeridentityforntlm">LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networksecurity-allowpku2uauthenticationrequests">LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests</a>
|
||||
</dd>
|
||||
@ -138,9 +114,6 @@ ms.date: 03/05/2018
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networksecurity-lanmanagerauthenticationlevel">LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedclients">LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedservers">LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers</a>
|
||||
</dd>
|
||||
@ -784,375 +757,6 @@ GP Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways"></a>**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Digitally encrypt or sign secure channel data (always)
|
||||
|
||||
This security setting determines whether all secure channel traffic initiated by the domain member must be signed or encrypted.
|
||||
|
||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass through authentication, LSA SID/name Lookup etc.
|
||||
|
||||
This setting determines whether or not all secure channel traffic initiated by the domain member meets minimum security requirements. Specifically it determines whether all secure channel traffic initiated by the domain member must be signed or encrypted. If this policy is enabled, then the secure channel will not be established unless either signing or encryption of all secure channel traffic is negotiated. If this policy is disabled, then encryption and signing of all secure channel traffic is negotiated with the Domain Controller in which case the level of signing and encryption depends on the version of the Domain Controller and the settings of the following two policies:
|
||||
|
||||
Domain member: Digitally encrypt secure channel data (when possible)
|
||||
Domain member: Digitally sign secure channel data (when possible)
|
||||
|
||||
Default: Enabled.
|
||||
|
||||
Notes:
|
||||
|
||||
If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic.
|
||||
If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic.
|
||||
Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Digitally encrypt or sign secure channel data (always)*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible"></a>**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Digitally encrypt secure channel data (when possible)
|
||||
|
||||
This security setting determines whether a domain member attempts to negotiate encryption for all secure channel traffic that it initiates.
|
||||
|
||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass-through authentication, LSA SID/name Lookup etc.
|
||||
|
||||
This setting determines whether or not the domain member attempts to negotiate encryption for all secure channel traffic that it initiates. If enabled, the domain member will request encryption of all secure channel traffic. If the domain controller supports encryption of all secure channel traffic, then all secure channel traffic will be encrypted. Otherwise only logon information transmitted over the secure channel will be encrypted. If this setting is disabled, then the domain member will not attempt to negotiate secure channel encryption.
|
||||
|
||||
Default: Enabled.
|
||||
|
||||
Important
|
||||
|
||||
There is no known reason for disabling this setting. Besides unnecessarily reducing the potential confidentiality level of the secure channel, disabling this setting may unnecessarily reduce secure channel throughput, because concurrent API calls that use the secure channel are only possible when the secure channel is signed or encrypted.
|
||||
|
||||
Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Digitally encrypt secure channel data (when possible)*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-digitallysignsecurechanneldatawhenpossible"></a>**LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Digitally sign secure channel data (when possible)
|
||||
|
||||
This security setting determines whether a domain member attempts to negotiate signing for all secure channel traffic that it initiates.
|
||||
|
||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass through authentication, LSA SID/name Lookup etc.
|
||||
|
||||
This setting determines whether or not the domain member attempts to negotiate signing for all secure channel traffic that it initiates. If enabled, the domain member will request signing of all secure channel traffic. If the Domain Controller supports signing of all secure channel traffic, then all secure channel traffic will be signed which ensures that it cannot be tampered with in transit.
|
||||
|
||||
Default: Enabled.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Digitally sign secure channel data (when possible)*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges"></a>**LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Disable machine account password changes
|
||||
|
||||
Determines whether a domain member periodically changes its computer account password. If this setting is enabled, the domain member does not attempt to change its computer account password. If this setting is disabled, the domain member attempts to change its computer account password as specified by the setting for Domain Member: Maximum age for machine account password, which by default is every 30 days.
|
||||
|
||||
Default: Disabled.
|
||||
|
||||
Notes
|
||||
|
||||
This security setting should not be enabled. Computer account passwords are used to establish secure channel communications between members and domain controllers and, within the domain, between the domain controllers themselves. Once it is established, the secure channel is used to transmit sensitive information that is necessary for making authentication and authorization decisions.
|
||||
This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Disable machine account password changes*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-maximummachineaccountpasswordage"></a>**LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Maximum machine account password age
|
||||
|
||||
This security setting determines how often a domain member will attempt to change its computer account password.
|
||||
|
||||
Default: 30 days.
|
||||
|
||||
Important
|
||||
|
||||
This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Maximum machine account password age*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-domainmember-requirestrongsessionkey"></a>**LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Domain member: Require strong (Windows 2000 or later) session key
|
||||
|
||||
This security setting determines whether 128-bit key strength is required for encrypted secure channel data.
|
||||
|
||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller within the domain. This secure channel is used to perform operations such as NTLM pass-through authentication, LSA SID/name Lookup, and so on.
|
||||
|
||||
Depending on what version of Windows is running on the domain controller that the domain member is communicating with and the settings of the parameters:
|
||||
|
||||
Domain member: Digitally encrypt or sign secure channel data (always)
|
||||
Domain member: Digitally encrypt secure channel data (when possible)
|
||||
Some or all of the information that is transmitted over the secure channel will be encrypted. This policy setting determines whether or not 128-bit key strength is required for the secure channel information that is encrypted.
|
||||
|
||||
If this setting is enabled, then the secure channel will not be established unless 128-bit encryption can be performed. If this setting is disabled, then the key strength is negotiated with the domain controller.
|
||||
|
||||
Default: Enabled.
|
||||
|
||||
Important
|
||||
|
||||
In order to take advantage of this policy on member workstations and servers, all domain controllers that constitute the member's domain must be running Windows 2000 or later.
|
||||
In order to take advantage of this policy on domain controllers, all domain controllers in the same domain as well as all trusted domains must run Windows 2000 or later.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Domain member: Require strong (Windows 2000 or later) session key*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked"></a>**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked**
|
||||
|
||||
@ -1650,77 +1254,6 @@ GP Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsalways"></a>**LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Microsoft network client: Digitally sign communications (always)
|
||||
|
||||
This security setting determines whether packet signing is required by the SMB client component.
|
||||
|
||||
The server message block (SMB) protocol provides the basis for Microsoft file and print sharing and many other networking operations, such as remote Windows administration. To prevent man-in-the-middle attacks that modify SMB packets in transit, the SMB protocol supports the digital signing of SMB packets. This policy setting determines whether SMB packet signing must be negotiated before further communication with an SMB server is permitted.
|
||||
|
||||
If this setting is enabled, the Microsoft network client will not communicate with a Microsoft network server unless that server agrees to perform SMB packet signing. If this policy is disabled, SMB packet signing is negotiated between the client and server.
|
||||
|
||||
Default: Disabled.
|
||||
|
||||
Important
|
||||
|
||||
For this policy to take effect on computers running Windows 2000, client-side packet signing must also be enabled. To enable client-side SMB packet signing, set Microsoft network client: Digitally sign communications (if server agrees).
|
||||
|
||||
Notes
|
||||
|
||||
All Windows operating systems support both a client-side SMB component and a server-side SMB component. On Windows 2000 and later operating systems, enabling or requiring packet signing for client and server-side SMB components is controlled by the following four policy settings:
|
||||
Microsoft network client: Digitally sign communications (always) - Controls whether or not the client-side SMB component requires packet signing.
|
||||
Microsoft network client: Digitally sign communications (if server agrees) - Controls whether or not the client-side SMB component has packet signing enabled.
|
||||
Microsoft network server: Digitally sign communications (always) - Controls whether or not the server-side SMB component requires packet signing.
|
||||
Microsoft network server: Digitally sign communications (if client agrees) - Controls whether or not the server-side SMB component has packet signing enabled.
|
||||
SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors.
|
||||
For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Microsoft network client: Digitally sign communications (always)*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-microsoftnetworkclient-digitallysigncommunicationsifserveragrees"></a>**LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees**
|
||||
|
||||
@ -2334,63 +1867,6 @@ GP Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-networksecurity-allowlocalsystemtousecomputeridentityforntlm"></a>**LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Network security: Allow Local System to use computer identity for NTLM
|
||||
|
||||
This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication.
|
||||
|
||||
If you enable this policy setting, services running as Local System that use Negotiate will use the computer identity. This might cause some authentication requests between Windows operating systems to fail and log an error.
|
||||
|
||||
If you disable this policy setting, services running as Local System that use Negotiate when reverting to NTLM authentication will authenticate anonymously.
|
||||
|
||||
By default, this policy is enabled on Windows 7 and above.
|
||||
|
||||
By default, this policy is disabled on Windows Vista.
|
||||
|
||||
This policy is supported on at least Windows Vista or Windows Server 2008.
|
||||
|
||||
Note: Windows Vista or Windows Server 2008 do not expose this setting in Group Policy.
|
||||
|
||||
<!--/Description-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-networksecurity-allowpku2uauthenticationrequests"></a>**LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests**
|
||||
|
||||
@ -2586,66 +2062,6 @@ GP Info:
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedclients"></a>**LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients**
|
||||
|
||||
<!--SupportedSKUs-->
|
||||
<table>
|
||||
<tr>
|
||||
<th>Home</th>
|
||||
<th>Pro</th>
|
||||
<th>Business</th>
|
||||
<th>Enterprise</th>
|
||||
<th>Education</th>
|
||||
<th>Mobile</th>
|
||||
<th>Mobile Enterprise</th>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
<!--/SupportedSKUs-->
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Network security: Minimum session security for NTLM SSP based (including secure RPC) clients
|
||||
|
||||
This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are:
|
||||
|
||||
Require NTLMv2 session security: The connection will fail if NTLMv2 protocol is not negotiated.
|
||||
Require 128-bit encryption: The connection will fail if strong encryption (128-bit) is not negotiated.
|
||||
|
||||
Default:
|
||||
|
||||
Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Server 2008: No requirements.
|
||||
|
||||
Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
|
||||
|
||||
<!--/Description-->
|
||||
<!--RegistryMapped-->
|
||||
GP Info:
|
||||
- GP English name: *Network security: Minimum session security for NTLM SSP based (including secure RPC) clients*
|
||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
||||
|
||||
<!--/RegistryMapped-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="localpoliciessecurityoptions-networksecurity-minimumsessionsecurityforntlmsspbasedservers"></a>**LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers**
|
||||
|
||||
@ -3529,6 +2945,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Location
|
||||
@ -99,6 +99,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - LockDown
|
||||
@ -91,6 +91,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Maps
|
||||
@ -148,6 +148,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Messaging
|
||||
@ -201,6 +201,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
246
windows/client-management/mdm/policy-csp-mssecurityguide.md
Normal file
246
windows/client-management/mdm/policy-csp-mssecurityguide.md
Normal file
@ -0,0 +1,246 @@
|
||||
---
|
||||
title: Policy CSP - MSSecurityGuide
|
||||
description: Policy CSP - MSSecurityGuide
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - MSSecurityGuide
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## MSSecurityGuide policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon">MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-configuresmbv1clientdriver">MSSecurityGuide/ConfigureSMBV1ClientDriver</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-configuresmbv1server">MSSecurityGuide/ConfigureSMBV1Server</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection">MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications">MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#mssecurityguide-wdigestauthentication">MSSecurityGuide/WDigestAuthentication</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-applyuacrestrictionstolocalaccountsonnetworklogon"></a>**MSSecurityGuide/ApplyUACRestrictionsToLocalAccountsOnNetworkLogon**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0201_LATFP*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-configuresmbv1clientdriver"></a>**MSSecurityGuide/ConfigureSMBV1ClientDriver**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0002_SMBv1_ClientDriver*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-configuresmbv1server"></a>**MSSecurityGuide/ConfigureSMBV1Server**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0001_SMBv1_Server*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-enablestructuredexceptionhandlingoverwriteprotection"></a>**MSSecurityGuide/EnableStructuredExceptionHandlingOverwriteProtection**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0102_SEHOP*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-turnonwindowsdefenderprotectionagainstpotentiallyunwantedapplications"></a>**MSSecurityGuide/TurnOnWindowsDefenderProtectionAgainstPotentiallyUnwantedApplications**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0101_WDPUA*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="mssecurityguide-wdigestauthentication"></a>**MSSecurityGuide/WDigestAuthentication**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_SecGuide_0202_WDigestAuthn*
|
||||
- GP ADMX file name: *SecGuide.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
176
windows/client-management/mdm/policy-csp-msslegacy.md
Normal file
176
windows/client-management/mdm/policy-csp-msslegacy.md
Normal file
@ -0,0 +1,176 @@
|
||||
---
|
||||
title: Policy CSP - MSSLegacy
|
||||
description: Policy CSP - MSSLegacy
|
||||
ms.author: maricia
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - MSSLegacy
|
||||
|
||||
> [!WARNING]
|
||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policies-->
|
||||
## MSSLegacy policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#msslegacy-allowicmpredirectstooverrideospfgeneratedroutes">MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers">MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#msslegacy-ipsourceroutingprotectionlevel">MSSLegacy/IPSourceRoutingProtectionLevel</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#msslegacy-ipv6sourceroutingprotectionlevel">MSSLegacy/IPv6SourceRoutingProtectionLevel</a>
|
||||
</dd>
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="msslegacy-allowicmpredirectstooverrideospfgeneratedroutes"></a>**MSSLegacy/AllowICMPRedirectsToOverrideOSPFGeneratedRoutes**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_MSS_EnableICMPRedirect*
|
||||
- GP ADMX file name: *mss-legacy.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="msslegacy-allowthecomputertoignorenetbiosnamereleaserequestsexceptfromwinsservers"></a>**MSSLegacy/AllowTheComputerToIgnoreNetBIOSNameReleaseRequestsExceptFromWINSServers**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_MSS_NoNameReleaseOnDemand*
|
||||
- GP ADMX file name: *mss-legacy.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="msslegacy-ipsourceroutingprotectionlevel"></a>**MSSLegacy/IPSourceRoutingProtectionLevel**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_MSS_DisableIPSourceRouting*
|
||||
- GP ADMX file name: *mss-legacy.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="msslegacy-ipv6sourceroutingprotectionlevel"></a>**MSSLegacy/IPv6SourceRoutingProtectionLevel**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP name: *Pol_MSS_DisableIPSourceRoutingIPv6*
|
||||
- GP ADMX file name: *mss-legacy.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnote:
|
||||
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - NetworkIsolation
|
||||
@ -480,6 +480,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Notifications
|
||||
@ -93,6 +93,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 03/05/2018
|
||||
ms.date: 03/12/2018
|
||||
---
|
||||
|
||||
# Policy CSP - Power
|
||||
@ -19,6 +19,9 @@ ms.date: 03/05/2018
|
||||
## Power policies
|
||||
|
||||
<dl>
|
||||
<dd>
|
||||
<a href="#power-allowstandbystateswhensleepingonbattery">Power/AllowStandbyStatesWhenSleepingOnBattery</a>
|
||||
</dd>
|
||||
<dd>
|
||||
<a href="#power-allowstandbywhensleepingpluggedin">Power/AllowStandbyWhenSleepingPluggedIn</a>
|
||||
</dd>
|
||||
@ -49,6 +52,45 @@ ms.date: 03/05/2018
|
||||
</dl>
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
<a href="" id="power-allowstandbystateswhensleepingonbattery"></a>**Power/AllowStandbyStatesWhenSleepingOnBattery**
|
||||
|
||||
<!--Scope-->
|
||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||
|
||||
> [!div class = "checklist"]
|
||||
> * Device
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state.
|
||||
|
||||
If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state.
|
||||
|
||||
If you disable this policy setting, standby states (S1-S3) are not allowed.
|
||||
|
||||
<!--/Description-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||
|
||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||
|
||||
<!--ADMXBacked-->
|
||||
ADMX Info:
|
||||
- GP English name: *Allow standby states (S1-S3) when sleeping (on battery)*
|
||||
- GP name: *AllowStandbyStatesDC_2*
|
||||
- GP path: *System/Power Management/Sleep Settings*
|
||||
- GP ADMX file name: *power.admx*
|
||||
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--Policy-->
|
||||
@ -625,6 +667,7 @@ Footnote:
|
||||
- 1 - Added in Windows 10, version 1607.
|
||||
- 2 - Added in Windows 10, version 1703.
|
||||
- 3 - Added in Windows 10, version 1709.
|
||||
- 4 - Added in Windows 10, version 1803.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user