mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 21:37:22 +00:00
Merge branch 'master' into 4872174-nimishasatapathy-filerecovery
This commit is contained in:
commit
3b52bfd941
@ -13992,12 +13992,12 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/manage/sign-up-windows-store-for-business.md",
|
"source_path": "windows/manage/sign-up-windows-store-for-business.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/microsoft-store/sign-up-windows-store-for-business",
|
"redirect_url": "https://docs.microsoft.com/microsoft-store/index.md",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "store-for-business/sign-up-windows-store-for-business.md",
|
"source_path": "store-for-business/sign-up-windows-store-for-business.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/microsoft-store/sign-up-microsoft-store-for-business",
|
"redirect_url": "https://docs.microsoft.com/microsoft-store/index.md",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -16546,9 +16546,10 @@
|
|||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
|
"source_path": "windows/client-management/mdm/policies-in-policy-csp-supported-by-iot-enterprise.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr",
|
"redirect_url": "https://docs.microsoft.com/windows/client-management/mdm/configuration-service-provider-reference",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
}
|
},
|
||||||
|
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -3,7 +3,6 @@
|
|||||||
## [Sign up and get started](sign-up-microsoft-store-for-business-overview.md)
|
## [Sign up and get started](sign-up-microsoft-store-for-business-overview.md)
|
||||||
### [Microsoft Store for Business and Microsoft Store for Education overview](microsoft-store-for-business-overview.md)
|
### [Microsoft Store for Business and Microsoft Store for Education overview](microsoft-store-for-business-overview.md)
|
||||||
### [Prerequisites for Microsoft Store for Business and Education](prerequisites-microsoft-store-for-business.md)
|
### [Prerequisites for Microsoft Store for Business and Education](prerequisites-microsoft-store-for-business.md)
|
||||||
### [Sign up for Microsoft Store for Business or Microsoft Store for Education](sign-up-microsoft-store-for-business.md)
|
|
||||||
### [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md)
|
### [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md)
|
||||||
### [Settings reference: Microsoft Store for Business and Education](settings-reference-microsoft-store-for-business.md)
|
### [Settings reference: Microsoft Store for Business and Education](settings-reference-microsoft-store-for-business.md)
|
||||||
## [Find and acquire apps](find-and-acquire-apps-overview.md)
|
## [Find and acquire apps](find-and-acquire-apps-overview.md)
|
||||||
|
@ -5,16 +5,20 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
ms.date: 10/23/2018
|
manager: scotv
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Acquire apps in Microsoft Store for Business and Education
|
# Acquire apps in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
As an admin, you can acquire apps from the Microsoft Store for Business and Education for your employees. Some apps are free, and some have a price. For info on app types that are supported, see [Apps in the Microsoft Store for Business](apps-in-microsoft-store-for-business.md). The following sections explain some of the settings for shopping.
|
As an admin, you can acquire apps from the Microsoft Store for Business and Education for your employees. Some apps are free, and some have a price. For info on app types that are supported, see [Apps in the Microsoft Store for Business](apps-in-microsoft-store-for-business.md). The following sections explain some of the settings for shopping.
|
||||||
|
|
||||||
## App licensing model
|
## App licensing model
|
||||||
|
@ -3,16 +3,16 @@ title: Add unsigned app to code integrity policy (Windows 10)
|
|||||||
description: When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device.
|
description: When you want to add an unsigned app to a code integrity policy, you need to start with a code integrity policy created from a reference device.
|
||||||
ms.assetid: 580E18B1-2FFD-4EE4-8CC5-6F375BE224EA
|
ms.assetid: 580E18B1-2FFD-4EE4-8CC5-6F375BE224EA
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store, security
|
ms.pagetype: store, security
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Add unsigned app to code integrity policy
|
# Add unsigned app to code integrity policy
|
||||||
@ -99,7 +99,7 @@ After you're done, the files are saved to your desktop. You still need to sign t
|
|||||||
|
|
||||||
## <a href="" id="catalog-signing-device-guard-portal"></a>Catalog signing with Device Guard signing portal
|
## <a href="" id="catalog-signing-device-guard-portal"></a>Catalog signing with Device Guard signing portal
|
||||||
|
|
||||||
To sign catalog files with the Device Guard signing portal, you need to be signed up with the Microsoft Store for Business. For more information, see [Sign up for the Microsoft Store for Business](sign-up-microsoft-store-for-business.md).
|
To sign catalog files with the Device Guard signing portal, you need to be signed up with the Microsoft Store for Business.
|
||||||
|
|
||||||
Catalog signing is a vital step to adding your unsigned apps to your code integrity policy.
|
Catalog signing is a vital step to adding your unsigned apps to your code integrity policy.
|
||||||
|
|
||||||
|
@ -2,21 +2,20 @@
|
|||||||
title: Microsoft Store for Business and Education (Windows 10)
|
title: Microsoft Store for Business and Education (Windows 10)
|
||||||
description: Welcome to the Microsoft Store for Business and Education. You can use Microsoft Store, to find, acquire, distribute, and manage apps for your organization or school.
|
description: Welcome to the Microsoft Store for Business and Education. You can use Microsoft Store, to find, acquire, distribute, and manage apps for your organization or school.
|
||||||
ms.assetid: 527E611E-4D47-44F0-9422-DCC2D1ACBAB8
|
ms.assetid: 527E611E-4D47-44F0-9422-DCC2D1ACBAB8
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 05/14/2020
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Store for Business and Education
|
# Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
@ -24,6 +23,11 @@ ms.date: 05/14/2020
|
|||||||
|
|
||||||
Welcome to the Microsoft Store for Business and Education! You can use Microsoft Store to find, acquire, distribute, and manage apps for your organization or school.
|
Welcome to the Microsoft Store for Business and Education! You can use Microsoft Store to find, acquire, distribute, and manage apps for your organization or school.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting April 14, 2021, all apps that charge a base price above free will no longer be available to buy in the Microsoft Store for Business and Education. If you’ve already bought a paid app, you can still use it, but no new purchases will be possible from businessstore.microsoft.com or educationstore.microsoft.com. Also, you won’t be able to buy additional licenses for apps you already bought. You can still assign and reassign licenses for apps that you already own and use the private store. Apps with a base price of “free” will still be available. This change doesn’t impact apps in the Microsoft Store on Windows 10.
|
||||||
|
>
|
||||||
|
> Also starting April 14, 2021, you must sign in with your Azure Active Directory (Azure AD) account before you browse Microsoft Store for Business and Education.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
|
@ -3,16 +3,16 @@ title: Microsoft Store for Business and Microsoft Store for Education overview (
|
|||||||
description: With Microsoft Store for Business and Microsoft Store for Education, organizations and schools can make volume purchases of Windows apps.
|
description: With Microsoft Store for Business and Microsoft Store for Education, organizations and schools can make volume purchases of Windows apps.
|
||||||
ms.assetid: 9DA71F6B-654D-4121-9A40-D473CC654A1C
|
ms.assetid: 9DA71F6B-654D-4121-9A40-D473CC654A1C
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.pagetype: store, mobile
|
ms.pagetype: store, mobile
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date:
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Store for Business and Microsoft Store for Education overview
|
# Microsoft Store for Business and Microsoft Store for Education overview
|
||||||
@ -22,6 +22,9 @@ ms.date:
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
Designed for organizations, Microsoft Store for Business and Microsoft Store for Education give IT decision makers and administrators in businesses or schools a flexible way to find, acquire, manage, and distribute free and paid apps in select markets to Windows 10 devices in volume. IT administrators can manage Microsoft Store apps and private line-of-business apps in one inventory, plus assign and re-use licenses as needed. You can choose the best distribution method for your organization: directly assign apps to individuals and teams, publish apps to private pages in Microsoft Store, or connect with management solutions for more options.
|
Designed for organizations, Microsoft Store for Business and Microsoft Store for Education give IT decision makers and administrators in businesses or schools a flexible way to find, acquire, manage, and distribute free and paid apps in select markets to Windows 10 devices in volume. IT administrators can manage Microsoft Store apps and private line-of-business apps in one inventory, plus assign and re-use licenses as needed. You can choose the best distribution method for your organization: directly assign apps to individuals and teams, publish apps to private pages in Microsoft Store, or connect with management solutions for more options.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
@ -80,8 +83,6 @@ While not required, you can use a management tool to distribute and manage apps.
|
|||||||
|
|
||||||
The first step for getting your organization started with Store for Business and Education is signing up. Sign up using an existing account (the same one you use for Office 365, Dynamics 365, Intune, Azure, etc.) or we’ll quickly create an account for you. You must be a Global Administrator for your organization.
|
The first step for getting your organization started with Store for Business and Education is signing up. Sign up using an existing account (the same one you use for Office 365, Dynamics 365, Intune, Azure, etc.) or we’ll quickly create an account for you. You must be a Global Administrator for your organization.
|
||||||
|
|
||||||
For more information, see [Sign up for Store for Business and Education](sign-up-microsoft-store-for-business.md).
|
|
||||||
|
|
||||||
## Set up
|
## Set up
|
||||||
|
|
||||||
After your admin signs up for the Store for Business and Education, they can assign roles to other employees in your company or school. The admin needs Azure AD User Admin permissions to assign Microsoft Store for Business and Education roles. These are the roles and their permissions.
|
After your admin signs up for the Store for Business and Education, they can assign roles to other employees in your company or school. The admin needs Azure AD User Admin permissions to assign Microsoft Store for Business and Education roles. These are the roles and their permissions.
|
||||||
|
@ -3,16 +3,16 @@ title: Prerequisites for Microsoft Store for Business and Education (Windows 10)
|
|||||||
description: There are a few prerequisites for using Microsoft Store for Business or Microsoft Store for Education.
|
description: There are a few prerequisites for using Microsoft Store for Business or Microsoft Store for Education.
|
||||||
ms.assetid: CEBC6870-FFDD-48AD-8650-8B0DC6B2651D
|
ms.assetid: CEBC6870-FFDD-48AD-8650-8B0DC6B2651D
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date:
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prerequisites for Microsoft Store for Business and Education
|
# Prerequisites for Microsoft Store for Business and Education
|
||||||
@ -22,6 +22,9 @@ ms.date:
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Customers who are in the Office 365 GCC environment or are eligible to buy with government pricing cannot use Microsoft Store for Business.
|
> Customers who are in the Office 365 GCC environment or are eligible to buy with government pricing cannot use Microsoft Store for Business.
|
||||||
|
|
||||||
|
@ -4,19 +4,23 @@ description: The first person to sign in to Microsoft Store for Business or Micr
|
|||||||
keywords: roles, permissions
|
keywords: roles, permissions
|
||||||
ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE
|
ms.assetid: CB6281E1-37B1-4B8B-991D-BC5ED361F1EE
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Roles and permissions in Microsoft Store for Business and Education
|
# Roles and permissions in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
The first person to sign in to Microsoft Store for Business or Microsoft Store for Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees.
|
||||||
|
|
||||||
Microsoft Store for Business and Education has a set of roles that help admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access the Store. Global Administrators and global user accounts that are used with other Microsoft services, such as Azure, or Office 365 can sign in to Microsoft Store. Global user accounts have some permissions in Microsoft Store, and Microsoft Store has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store.
|
Microsoft Store for Business and Education has a set of roles that help admins and employees manage access to apps and tasks for Microsoft Store. Employees with these roles will need to use their Azure AD account to access the Store. Global Administrators and global user accounts that are used with other Microsoft services, such as Azure, or Office 365 can sign in to Microsoft Store. Global user accounts have some permissions in Microsoft Store, and Microsoft Store has a set of roles that help IT admins and employees manage access to apps and tasks for Microsoft Store.
|
||||||
|
@ -3,16 +3,16 @@ title: Sign up and get started (Windows 10)
|
|||||||
description: IT admins can sign up for the Microsoft Store for Business or Microsoft Store for Education and get started working with apps.
|
description: IT admins can sign up for the Microsoft Store for Business or Microsoft Store for Education and get started working with apps.
|
||||||
ms.assetid: 87C6FA60-3AB9-4152-A85C-6A1588A20C7B
|
ms.assetid: 87C6FA60-3AB9-4152-A85C-6A1588A20C7B
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
ms.author: cmcatee
|
||||||
ms.author: TrudyHa
|
author: cmcatee-MSFT
|
||||||
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/03/2019
|
ms.date: 03/10/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Sign up and get started
|
# Sign up and get started
|
||||||
@ -24,13 +24,15 @@ ms.date: 10/03/2019
|
|||||||
|
|
||||||
IT admins can sign up for Microsoft Store for Business and Education, and get started working with apps.
|
IT admins can sign up for Microsoft Store for Business and Education, and get started working with apps.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
| Topic | Description |
|
| Topic | Description |
|
||||||
| ----- | ----------- |
|
| ----- | ----------- |
|
||||||
| [Microsoft Store for Business and Education overview](windows-store-for-business-overview.md) | Learn about Microsoft Store for Business. |
|
| [Microsoft Store for Business and Education overview](windows-store-for-business-overview.md) | Learn about Microsoft Store for Business. |
|
||||||
| [Prerequisites for Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/prerequisites-microsoft-store-for-business) | There are a few prerequisites for using Microsoft Store for Business and Education.](https://docs.microsoft.com/microsoft-store/prerequisites-microsoft-store-for-business) |
|
| [Prerequisites for Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/prerequisites-microsoft-store-for-business) | There are a few prerequisites for using Microsoft Store for Business and Education.](https://docs.microsoft.com/microsoft-store/prerequisites-microsoft-store-for-business) |
|
||||||
| [Sign up for Microsoft Store for Business or Microsoft Store for Education](https://docs.microsoft.com/microsoft-store/sign-up-microsoft-store-for-business) | Before you sign up for Store for Business and Education, at a minimum, you'll need an Azure Active Directory (AD) or Office 365 account for your organization, and you'll need to be the global administrator for your organization. If your organization is already using Azure AD, you can go ahead and sign up for Store for Business. If not, we'll help you create an Azure AD or Office 365 account and directory as part of the sign up process. |
|
|
||||||
| [Roles and permissions in Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/roles-and-permissions-microsoft-store-for-business)| The first person to sign in to Microsoft Store for Business and Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. |
|
| [Roles and permissions in Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/roles-and-permissions-microsoft-store-for-business)| The first person to sign in to Microsoft Store for Business and Education must be a Global Admin of the Azure Active Directory (AD) tenant. Once the Global Admin has signed in, they can give permissions to others employees. |
|
||||||
| [Settings reference: Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/settings-reference-microsoft-store-for-business) | Microsoft Store for Business and Education has a group of settings that admins use to manage the store. |
|
| [Settings reference: Microsoft Store for Business and Education](https://docs.microsoft.com/microsoft-store/settings-reference-microsoft-store-for-business) | Microsoft Store for Business and Education has a group of settings that admins use to manage the store. |
|
||||||
|
|
||||||
|
@ -1,105 +0,0 @@
|
|||||||
---
|
|
||||||
title: Sign up for Microsoft Store for Business or Microsoft Store for Education (Windows 10)
|
|
||||||
description: Before you sign up for Microsoft Store for Business or Microsoft Store for Education, at a minimum, you'll need an Azure Active Directory (AD) account for your organization, and you'll need to be the global administrator for your organization.
|
|
||||||
ms.assetid: 296AAC02-5C79-4999-B221-4F5F8CEA1F12
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: store
|
|
||||||
author: TrudyHa
|
|
||||||
ms.author: TrudyHa
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 10/17/2017
|
|
||||||
---
|
|
||||||
|
|
||||||
# Sign up for Microsoft Store for Business or Microsoft Store for Education
|
|
||||||
|
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
Before you sign up for Microsoft Store for Business or Microsoft Store for Education, you'll need an Azure Active Directory (AD) or Office 365 account for your organization, and you'll need to be the global administrator for your organization. If your organization is already using Azure AD, you can go ahead and sign up for Microsoft Store for Business or Microsoft Store for Education. If not, we'll help you create an Azure AD or Office 365 account and directory as part of the sign up process.
|
|
||||||
|
|
||||||
## Sign up for Microsoft Store
|
|
||||||
|
|
||||||
|
|
||||||
Before signing up for Microsoft Store, make sure you're the global administrator for your organization.
|
|
||||||
|
|
||||||
**To sign up for Microsoft Store**
|
|
||||||
|
|
||||||
1. Go to [https://www.microsoft.com/business-store](https://www.microsoft.com/business-store), or [https://www.microsoft.com/education-store](https://www.microsoft.com/education-store) and click **Sign up**.
|
|
||||||
|
|
||||||
- If you start Microsoft Store sign-up process, and don't have an Azure AD directory for your organization, we'll help you create one. For more info, see [Sign up for Azure AD accounts](#o365-welcome).
|
|
||||||
|
|
||||||
<!-- -->
|
|
||||||
|
|
||||||
- If you already have an Azure AD directory, you'll [sign in to Store for Business](#sign-in), and then accept Store for Business terms.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
**To sign up for Azure AD accounts through Office 365 for Business**
|
|
||||||
|
|
||||||
- <a href="" id="o365-welcome"></a>Signing up for Microsoft Store will create an Azure AD directory and global administrator account for you. There are just a few steps.
|
|
||||||
|
|
||||||
Step 1: About you.
|
|
||||||
|
|
||||||
Type the required info and click **Next.**
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Step 2: Create an ID.
|
|
||||||
|
|
||||||
We'll use info you provided on the previous page to build your user ID. Check the info and click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Step 3: You're in.
|
|
||||||
|
|
||||||
Let us know how you'd like to receive a verification code, and click either **Text me**, or **Call me**. We'll send you a verification code
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Verification.
|
|
||||||
|
|
||||||
Type your verification code and click **Create my account**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- Save this info.
|
|
||||||
|
|
||||||
Be sure to save the portal sign-in page and your user ID info. Click **You're ready to go**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- At this point, you'll have an Azure AD directory created with one user account. That user account is the global administrator. You can use that account to sign in to Store for Business.
|
|
||||||
|
|
||||||
2. <a href="" id="sign-in"></a>Sign in with your Azure AD account.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. <a href="" id="accept-terms"></a>Read through and accept Microsoft Store for Business and Education terms.
|
|
||||||
|
|
||||||
4. Welcome to the Store for Business. Click **Next** to continue.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Next steps
|
|
||||||
|
|
||||||
After signing up for Microsoft Store for Business or Microsoft Store for Education, you can:
|
|
||||||
|
|
||||||
- **Add users to your Azure AD directory**. If you created your Azure AD directory during sign up, additional user accounts are required for employees to install apps you assign to them, or to browse the private store in Store app. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-microsoft-store-for-business.md).
|
|
||||||
- **Assign roles to employees**. For more information, see [Roles and permissions in Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md).
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
@ -159,16 +159,15 @@
|
|||||||
### [Personalization CSP](personalization-csp.md)
|
### [Personalization CSP](personalization-csp.md)
|
||||||
#### [Personalization DDF file](personalization-ddf.md)
|
#### [Personalization DDF file](personalization-ddf.md)
|
||||||
### [Policy CSP](policy-configuration-service-provider.md)
|
### [Policy CSP](policy-configuration-service-provider.md)
|
||||||
#### [Policy CSP DDF file](policy-ddf-file.md)
|
#### [Policy DDF file](policy-ddf-file.md)
|
||||||
#### [Policies in Policy CSP supported by Group Policy](policies-in-policy-csp-supported-by-group-policy.md)
|
#### [Policies in Policy CSP supported by Group Policy](policy-csps-supported-by-group-policy.md)
|
||||||
#### [ADMX-backed policies in Policy CSP](policies-in-policy-csp-admx-backed.md)
|
#### [ADMX-backed policies in Policy CSP](policy-csps-admx-backed.md)
|
||||||
#### [Policies in Policy CSP supported by HoloLens 2](policies-in-policy-csp-supported-by-hololens2.md)
|
#### [Policies in Policy CSP supported by HoloLens 2](policy-csps-supported-by-hololens2.md)
|
||||||
#### [Policies in Policy CSP supported by HoloLens (1st gen) Commercial Suite](policies-in-policy-csp-supported-by-hololens-1st-gen-commercial-suite.md)
|
#### [Policies in Policy CSP supported by HoloLens (1st gen) Commercial Suite](policy-csps-supported-by-hololens-1st-gen-commercial-suite.md)
|
||||||
#### [Policies in Policy CSP supported by HoloLens (1st gen) Development Edition](policies-in-policy-csp-supported-by-hololens-1st-gen-development-edition.md)
|
#### [Policies in Policy CSP supported by HoloLens (1st gen) Development Edition](policy-csps-supported-by-hololens-1st-gen-development-edition.md)
|
||||||
#### [Policies in Policy CSP supported by Windows 10 IoT Enterprise](policies-in-policy-csp-supported-by-iot-enterprise.md)
|
#### [Policies in Policy CSP supported by Windows 10 IoT Core](policy-csps-supported-by-iot-core.md)
|
||||||
#### [Policies in Policy CSP supported by Windows 10 IoT Core](policies-in-policy-csp-supported-by-iot-core.md)
|
#### [Policies in Policy CSP supported by Microsoft Surface Hub](policy-csps-supported-by-surface-hub.md)
|
||||||
#### [Policies in Policy CSP supported by Microsoft Surface Hub](policies-in-policy-csp-supported-by-surface-hub.md)
|
#### [Policy CSPs that can be set using Exchange Active Sync (EAS)](policy-csps-that-can-be-set-using-eas.md)
|
||||||
#### [Policy CSPs that can be set using Exchange Active Sync (EAS)](policies-in-policy-csp-that-can-be-set-using-eas.md)
|
|
||||||
#### [AboveLock](policy-csp-abovelock.md)
|
#### [AboveLock](policy-csp-abovelock.md)
|
||||||
#### [Accounts](policy-csp-accounts.md)
|
#### [Accounts](policy-csp-accounts.md)
|
||||||
#### [ActiveXControls](policy-csp-activexcontrols.md)
|
#### [ActiveXControls](policy-csp-activexcontrols.md)
|
||||||
|
@ -11,15 +11,24 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Accounts CSP
|
# Accounts Configuration Service Provider
|
||||||
|
|
||||||
|
|
||||||
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803.
|
The Accounts configuration service provider (CSP) is used by the enterprise (1) to rename a device, (2) to create a new local Windows account and join it to a local user group. This CSP was added in Windows 10, version 1803.
|
||||||
|
|
||||||
|
|
||||||
The following diagram shows the Accounts configuration service provider in tree format.
|
The following shows the Accounts configuration service provider in tree format.
|
||||||
|
|
||||||

|
```
|
||||||
|
./Device/Vendor/MSFT
|
||||||
|
Accounts
|
||||||
|
----Domain
|
||||||
|
--------ComputerName
|
||||||
|
----Users
|
||||||
|
--------UserName
|
||||||
|
------------Password
|
||||||
|
------------LocalUserGroup
|
||||||
|
```
|
||||||
|
|
||||||
<a href="" id="accounts"></a>**./Device/Vendor/MSFT/Accounts**
|
<a href="" id="accounts"></a>**./Device/Vendor/MSFT/Accounts**
|
||||||
Root node.
|
Root node.
|
||||||
|
@ -19,8 +19,8 @@ The ActiveSync configuration service provider is used to set up and change setti
|
|||||||
|
|
||||||
Configuring Windows Live ActiveSync accounts through this configuration service provider is not supported.
|
Configuring Windows Live ActiveSync accounts through this configuration service provider is not supported.
|
||||||
|
|
||||||
> **Note**
|
> [!NOTE]
|
||||||
The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
||||||
|
|
||||||
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync path will work if the user is logged in. The CSP fails when no user is logged in.
|
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync path will work if the user is logged in. The CSP fails when no user is logged in.
|
||||||
|
|
||||||
@ -28,15 +28,45 @@ The ./Vendor/MSFT/ActiveSync path is deprecated, but will continue to work in th
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
The following diagram shows the ActiveSync configuration service provider management objects in tree format as used by Open Mobile Alliance Device Management (OMA DM), OMA Client Provisioning, and Enterprise DM.
|
The following shows the ActiveSync configuration service provider management objects in tree format as used by Open Mobile Alliance Device Management (OMA DM), OMA Client Provisioning, and Enterprise DM.
|
||||||
|
|
||||||

|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
ActiveSync
|
||||||
|
----Accounts
|
||||||
|
--------Account GUID
|
||||||
|
------------EmailAddress
|
||||||
|
------------Domain
|
||||||
|
------------AccountIcon
|
||||||
|
------------AccountType
|
||||||
|
------------AccountName
|
||||||
|
------------Password
|
||||||
|
------------ServerName
|
||||||
|
------------UserName
|
||||||
|
------------Options
|
||||||
|
----------------CalendarAgeFilter
|
||||||
|
----------------Logging
|
||||||
|
----------------MailBodyType
|
||||||
|
----------------MailHTMLTruncation
|
||||||
|
----------------MailPlainTextTruncation
|
||||||
|
----------------Schedule
|
||||||
|
----------------UseSSL
|
||||||
|
----------------MailAgeFilter
|
||||||
|
----------------ContentTypes
|
||||||
|
--------------------Content Type GUID
|
||||||
|
------------------------Enabled
|
||||||
|
------------------------Name
|
||||||
|
------------Policies
|
||||||
|
----------------MailBodyType
|
||||||
|
----------------MaxMailAgeFilter
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
<a href="" id="--user-vendor-msft-activesync"></a>**./User/Vendor/MSFT/ActiveSync**
|
<a href="" id="--user-vendor-msft-activesync"></a>**./User/Vendor/MSFT/ActiveSync**
|
||||||
The root node for the ActiveSync configuration service provider.
|
The root node for the ActiveSync configuration service provider.
|
||||||
|
|
||||||
> **Note**
|
> [!NOTE]
|
||||||
The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
> The target user must be logged in for the CSP to succeed. The correct way to configure an account is to use the ./User/Vendor/MSFT/ActiveSync path.
|
||||||
|
|
||||||
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync will work if the user is logged in. The CSP fails when no user is logged in.
|
On the desktop, only per user configuration (./User/Vendor/MSFT/ActiveSync) is supported. However, the ./Vendor/MSFT/ActiveSync will work if the user is logged in. The CSP fails when no user is logged in.
|
||||||
|
|
||||||
@ -231,8 +261,8 @@ Valid values are one of the following:
|
|||||||
<a href="" id="options-contenttypes-content-type-guid-name"></a>**Options/ContentTypes/*Content Type GUID*/Name**
|
<a href="" id="options-contenttypes-content-type-guid-name"></a>**Options/ContentTypes/*Content Type GUID*/Name**
|
||||||
Required. A character string that specifies the name of the content type.
|
Required. A character string that specifies the name of the content type.
|
||||||
|
|
||||||
> **Note** In Windows 10, this node is currently not working.
|
> [!NOTE]
|
||||||
|
> In Windows 10, this node is currently not working.
|
||||||
|
|
||||||
|
|
||||||
Supported operations are Get, Replace, and Add (cannot Add after the account is created).
|
Supported operations are Get, Replace, and Add (cannot Add after the account is created).
|
||||||
|
@ -17,8 +17,8 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
The AllJoynManagement configuration service provider (CSP) allows an IT administrator to enumerate the AllJoyn devices that are connected to the AllJoyn bus. The devices must support the Microsoft AllJoyn configuration interface (com.microsoft.alljoynmanagement.config). You can also push configuration files to the same devices. To populate the various nodes when setting new configuration, we recommend that you do a query first, to get the actual values for all the nodes in all the attached devices. You can then use the information from the query to set the node values when pushing the new configuration.
|
The AllJoynManagement configuration service provider (CSP) allows an IT administrator to enumerate the AllJoyn devices that are connected to the AllJoyn bus. The devices must support the Microsoft AllJoyn configuration interface (com.microsoft.alljoynmanagement.config). You can also push configuration files to the same devices. To populate the various nodes when setting new configuration, we recommend that you do a query first, to get the actual values for all the nodes in all the attached devices. You can then use the information from the query to set the node values when pushing the new configuration.
|
||||||
|
|
||||||
> **Note**
|
> [!NOTE]
|
||||||
The AllJoynManagement configuration service provider (CSP) is only supported in Windows 10 IoT Core (IoT Core).
|
> The AllJoynManagement configuration service provider (CSP) is only supported in Windows 10 IoT Core (IoT Core).
|
||||||
|
|
||||||
This CSP was added in Windows 10, version 1511.
|
This CSP was added in Windows 10, version 1511.
|
||||||
|
|
||||||
@ -26,9 +26,37 @@ This CSP was added in Windows 10, version 1511.
|
|||||||
|
|
||||||
For the firewall settings, note that PublicProfile and PrivateProfile are mutually exclusive. The Private Profile must be set on the directly on the device itself, and the only supported operation is Get. For PublicProfile, both Add and Get are supported. This CSP is intended to be used in conjunction with the AllJoyn Device System Bridge, and an understanding of the bridge will help when determining when and how to use this CSP. For more information, see [Device System Bridge (DSB) Project](https://go.microsoft.com/fwlink/p/?LinkId=615876) and [AllJoyn Device System Bridge](https://go.microsoft.com/fwlink/p/?LinkId=615877).
|
For the firewall settings, note that PublicProfile and PrivateProfile are mutually exclusive. The Private Profile must be set on the directly on the device itself, and the only supported operation is Get. For PublicProfile, both Add and Get are supported. This CSP is intended to be used in conjunction with the AllJoyn Device System Bridge, and an understanding of the bridge will help when determining when and how to use this CSP. For more information, see [Device System Bridge (DSB) Project](https://go.microsoft.com/fwlink/p/?LinkId=615876) and [AllJoyn Device System Bridge](https://go.microsoft.com/fwlink/p/?LinkId=615877).
|
||||||
|
|
||||||
The following diagram shows the AllJoynManagement configuration service provider in tree format
|
The following shows the AllJoynManagement configuration service provider in tree format
|
||||||
|
|
||||||

|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
AllJoynManagement
|
||||||
|
----Configurations
|
||||||
|
--------ServiceID
|
||||||
|
------------Port
|
||||||
|
----------------PortNum
|
||||||
|
--------------------ConfigurableObjects
|
||||||
|
------------------------CfgObjectPath
|
||||||
|
----Credentials
|
||||||
|
--------ServiceID
|
||||||
|
------------Key
|
||||||
|
----Firewall
|
||||||
|
--------PublicProfile
|
||||||
|
--------PrivateProfile
|
||||||
|
----Services
|
||||||
|
--------ServiceID
|
||||||
|
------------AppId
|
||||||
|
------------DeviceId
|
||||||
|
------------AppName
|
||||||
|
------------Manufacturer
|
||||||
|
------------ModelNumber
|
||||||
|
------------Description
|
||||||
|
------------SoftwareVersion
|
||||||
|
------------AJSoftwareVersion
|
||||||
|
------------HardwareVersion
|
||||||
|
----Options
|
||||||
|
--------QueryIdleTime
|
||||||
|
```
|
||||||
|
|
||||||
The following list describes the characteristics and parameters.
|
The following list describes the characteristics and parameters.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: ApplicationControl CSP
|
title: ApplicationControl CSP
|
||||||
description: The ApplicationControl CSP allows you to manage multiple Windows Defender Application Control (WDAC) policies from a MDM server.
|
description: The ApplicationControl CSP allows you to manage multiple Windows Defender Application Control (WDAC) policies from an MDM server.
|
||||||
keywords: security, malware
|
keywords: security, malware
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -16,10 +16,33 @@ ms.date: 09/10/2020
|
|||||||
Windows Defender Application Control (WDAC) policies can be managed from an MDM server or locally using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and consequently does not schedule a reboot.
|
Windows Defender Application Control (WDAC) policies can be managed from an MDM server or locally using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and consequently does not schedule a reboot.
|
||||||
Existing WDAC policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although WDAC policy deployment via the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
Existing WDAC policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although WDAC policy deployment via the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||||
|
|
||||||
The following diagram shows the ApplicationControl CSP in tree format.
|
The following shows the ApplicationControl CSP in tree format.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
ApplicationControl
|
||||||
|
----Policies
|
||||||
|
--------Policy GUID
|
||||||
|
------------Policy
|
||||||
|
------------PolicyInfo
|
||||||
|
----------------Version
|
||||||
|
----------------IsEffective
|
||||||
|
----------------IsDeployed
|
||||||
|
----------------IsAuthorized
|
||||||
|
----------------Status
|
||||||
|
----------------FriendlyName
|
||||||
|
------------Token
|
||||||
|
----------------TokenID
|
||||||
|
----Tokens
|
||||||
|
--------ID
|
||||||
|
------------Token
|
||||||
|
------------TokenInfo
|
||||||
|
----------------Status
|
||||||
|
------------PolicyIDs
|
||||||
|
----------------Policy GUID
|
||||||
|
----TenantID
|
||||||
|
----DeviceID
|
||||||
|
```
|
||||||
<a href="" id="vendor-msft-applicationcontrol"></a>**./Vendor/MSFT/ApplicationControl**
|
<a href="" id="vendor-msft-applicationcontrol"></a>**./Vendor/MSFT/ApplicationControl**
|
||||||
Defines the root node for the ApplicationControl CSP.
|
Defines the root node for the ApplicationControl CSP.
|
||||||
|
|
||||||
@ -99,7 +122,7 @@ The following table provides the result of this policy based on different values
|
|||||||
|False|False|True|Not Reachable.|
|
|False|False|True|Not Reachable.|
|
||||||
|False|False|False|*Not Reachable.|
|
|False|False|False|*Not Reachable.|
|
||||||
|
|
||||||
`*` denotes a valid intermediary state; however, if an MDM transaction results in this state configuration, the END_COMMAND_PROCESSING will result in a fail.
|
\* denotes a valid intermediary state; however, if an MDM transaction results in this state configuration, the END_COMMAND_PROCESSING will result in a fail.
|
||||||
|
|
||||||
<a href="" id="applicationcontrol-policies-policyguid-policyinfo-status"></a>**ApplicationControl/Policies/_Policy GUID_/PolicyInfo/Status**
|
<a href="" id="applicationcontrol-policies-policyguid-policyinfo-status"></a>**ApplicationControl/Policies/_Policy GUID_/PolicyInfo/Status**
|
||||||
This node specifies whether the deployment of the policy indicated by the GUID was successful.
|
This node specifies whether the deployment of the policy indicated by the GUID was successful.
|
||||||
@ -117,7 +140,7 @@ Value type is char.
|
|||||||
|
|
||||||
## Microsoft Endpoint Manager (MEM) Intune Usage Guidance
|
## Microsoft Endpoint Manager (MEM) Intune Usage Guidance
|
||||||
|
|
||||||
For customers using Intune standalone or hybrid management with Configuration Manager (MEMCM) to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune)
|
For customers using Intune standalone or hybrid management with Configuration Manager (MEMCM) to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||||
|
|
||||||
## Generic MDM Server Usage Guidance
|
## Generic MDM Server Usage Guidance
|
||||||
|
|
||||||
@ -125,11 +148,11 @@ In order to leverage the ApplicationControl CSP without using Intune, you must:
|
|||||||
|
|
||||||
1. Know a generated policy's GUID, which can be found in the policy xml as `<PolicyID>` or `<PolicyTypeID>` for pre-1903 systems.
|
1. Know a generated policy's GUID, which can be found in the policy xml as `<PolicyID>` or `<PolicyTypeID>` for pre-1903 systems.
|
||||||
2. Convert the policies to binary format using the ConvertFrom-CIPolicy cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
2. Convert the policies to binary format using the ConvertFrom-CIPolicy cmdlet in order to be deployed. The binary policy may be signed or unsigned.
|
||||||
3. Create a policy node (a Base64-encoded blob of the binary policy representation) using the certutil -encode command line tool.
|
3. Create a policy node (a Base64-encoded blob of the binary policy representation) using the certutil -encode command-line tool.
|
||||||
|
|
||||||
Below is a sample certutil invocation:
|
Below is a sample certutil invocation:
|
||||||
|
|
||||||
```cmd
|
```console
|
||||||
certutil -encode WinSiPolicy.p7b WinSiPolicy.cer
|
certutil -encode WinSiPolicy.p7b WinSiPolicy.cer
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -141,7 +164,7 @@ An alternative to using certutil would be to use the following PowerShell invoca
|
|||||||
|
|
||||||
### Deploy Policies
|
### Deploy Policies
|
||||||
|
|
||||||
To deploy a new base policy using the CSP, perform an ADD on **./Vendor/MSFT/ApplicationControl/Policies/_Policy GUID_/Policy** using the Base64-encoded policy node as {Data}. Refer to the the Format section in the Example 1 below.
|
To deploy a new base policy using the CSP, perform an ADD on **./Vendor/MSFT/ApplicationControl/Policies/_Policy GUID_/Policy** using the Base64-encoded policy node as {Data}. Refer to the Format section in the Example 1 below.
|
||||||
|
|
||||||
To deploy base policy and supplemental policies:
|
To deploy base policy and supplemental policies:
|
||||||
|
|
||||||
@ -285,7 +308,7 @@ The ApplicationControl CSP can also be managed locally from PowerShell or via Mi
|
|||||||
Run the following command. PolicyID is a GUID which can be found in the policy xml, and should be used here without braces.
|
Run the following command. PolicyID is a GUID which can be found in the policy xml, and should be used here without braces.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
New-CimInstance -Namespace $namespace -ClassName $policyClassName -Property @{ParentID="./Vendor/MSFT/ApplicationControl/Policies";InstanceID="<PolicyID>";Policy=$policyBase64}
|
New-CimInstance -Namespace $namespace -ClassName $policyClassName -Property @{ParentID="./Vendor/MSFT/ApplicationControl/Policies";InstanceID="<PolicyID>";Policy=$policyBase64}
|
||||||
```
|
```
|
||||||
|
|
||||||
### Querying all policies via WMI Bridge
|
### Querying all policies via WMI Bridge
|
||||||
|
@ -17,10 +17,54 @@ ms.date: 11/19/2019
|
|||||||
|
|
||||||
The AppLocker configuration service provider is used to specify which applications are allowed or disallowed. There is no user interface shown for apps that are blocked.
|
The AppLocker configuration service provider is used to specify which applications are allowed or disallowed. There is no user interface shown for apps that are blocked.
|
||||||
|
|
||||||
The following diagram shows the AppLocker configuration service provider in tree format.
|
The following shows the AppLocker configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Vendor/MSFT
|
||||||
|
AppLocker
|
||||||
|
----ApplicationLaunchRestrictions
|
||||||
|
--------Grouping
|
||||||
|
------------EXE
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
----------------NonInteractiveProcessEnforcement
|
||||||
|
------------MSI
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
------------Script
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
------------StoreApps
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
------------DLL
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
----------------NonInteractiveProcessEnforcement
|
||||||
|
------------CodeIntegrity
|
||||||
|
----------------Policy
|
||||||
|
----EnterpriseDataProtection
|
||||||
|
--------Grouping
|
||||||
|
------------EXE
|
||||||
|
----------------Policy
|
||||||
|
------------StoreApps
|
||||||
|
----------------Policy
|
||||||
|
----LaunchControl
|
||||||
|
--------Grouping
|
||||||
|
------------EXE
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
------------StoreApps
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
----FamilySafety
|
||||||
|
--------Grouping
|
||||||
|
------------EXE
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
------------StoreApps
|
||||||
|
----------------Policy
|
||||||
|
----------------EnforcementMode
|
||||||
|
```
|
||||||
<a href="" id="--vendor-msft-applocker"></a>**./Vendor/MSFT/AppLocker**
|
<a href="" id="--vendor-msft-applocker"></a>**./Vendor/MSFT/AppLocker**
|
||||||
Defines the root node for the AppLocker configuration service provider.
|
Defines the root node for the AppLocker configuration service provider.
|
||||||
|
|
||||||
@ -288,7 +332,7 @@ The following table show the mapping of information to the AppLocker publisher r
|
|||||||
|
|
||||||
Here is an example AppLocker publisher rule:
|
Here is an example AppLocker publisher rule:
|
||||||
|
|
||||||
``` syntax
|
```xml
|
||||||
<FilePublisherCondition PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Reader" BinaryName="*">
|
<FilePublisherCondition PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" ProductName="Microsoft.Reader" BinaryName="*">
|
||||||
<BinaryVersionRange LowSection="*" HighSection="*" />
|
<BinaryVersionRange LowSection="*" HighSection="*" />
|
||||||
</FilePublisherCondition>
|
</FilePublisherCondition>
|
||||||
@ -299,7 +343,9 @@ You can get the publisher name and product name of apps using a web API.
|
|||||||
**To find publisher and product name for Microsoft apps in Microsoft Store for Business**
|
**To find publisher and product name for Microsoft apps in Microsoft Store for Business**
|
||||||
|
|
||||||
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
1. Go to the Microsoft Store for Business website, and find your app. For example, Microsoft OneNote.
|
||||||
|
|
||||||
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, **9wzdncrfhvjl**.
|
2. Copy the ID value from the app URL. For example, Microsoft OneNote's ID URL is https://www.microsoft.com/store/apps/onenote/9wzdncrfhvjl, and you'd copy the ID value, **9wzdncrfhvjl**.
|
||||||
|
|
||||||
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
3. In your browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
@ -322,13 +368,13 @@ Here is the example for Microsoft OneNote:
|
|||||||
|
|
||||||
Request
|
Request
|
||||||
|
|
||||||
``` syntax
|
```http
|
||||||
https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata
|
https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9wzdncrfhvjl/applockerdata
|
||||||
```
|
```
|
||||||
|
|
||||||
Result
|
Result
|
||||||
|
|
||||||
``` syntax
|
```json
|
||||||
{
|
{
|
||||||
"packageFamilyName": "Microsoft.Office.OneNote_8wekyb3d8bbwe",
|
"packageFamilyName": "Microsoft.Office.OneNote_8wekyb3d8bbwe",
|
||||||
"packageIdentityName": "Microsoft.Office.OneNote",
|
"packageIdentityName": "Microsoft.Office.OneNote",
|
||||||
|
@ -29,10 +29,17 @@ For a step-by-step guide for setting up devices to run in kiosk mode, see [Set u
|
|||||||
> [!Note]
|
> [!Note]
|
||||||
> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S. Starting in Windows 10, version 1803, it is also supported in Windows Holographic for Business edition.
|
> The AssignedAccess CSP is supported in Windows 10 Enterprise and Windows 10 Education. Starting from Windows 10, version 1709 it is also supported in Windows 10 Pro and Windows 10 S. Starting in Windows 10, version 1803, it is also supported in Windows Holographic for Business edition.
|
||||||
|
|
||||||
The following diagram shows the AssignedAccess configuration service provider in tree format
|
The following shows the AssignedAccess configuration service provider in tree format
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
AssignedAccess
|
||||||
|
----KioskModeApp
|
||||||
|
----Configuration (Added in Windows 10, version 1709)
|
||||||
|
----Status (Added in Windows 10, version 1803)
|
||||||
|
----ShellLauncher (Added in Windows 10, version 1803)
|
||||||
|
----StatusConfiguration (Added in Windows 10, version 1803)
|
||||||
|
```
|
||||||
<a href="" id="--vendor-msft-assignedaccess"></a>**./Device/Vendor/MSFT/AssignedAccess**
|
<a href="" id="--vendor-msft-assignedaccess"></a>**./Device/Vendor/MSFT/AssignedAccess**
|
||||||
Root node for the CSP.
|
Root node for the CSP.
|
||||||
|
|
||||||
@ -53,7 +60,7 @@ Starting in Windows 10, version 1607, you can use a provisioned app to configur
|
|||||||
|
|
||||||
Here's an example:
|
Here's an example:
|
||||||
|
|
||||||
``` syntax
|
```json
|
||||||
{"Account":"contoso\\kioskuser","AUMID":"Microsoft.Windows.Contoso_cw5n1h2txyewy!Microsoft.ContosoApp.ContosoApp"}
|
{"Account":"contoso\\kioskuser","AUMID":"Microsoft.Windows.Contoso_cw5n1h2txyewy!Microsoft.ContosoApp.ContosoApp"}
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -97,7 +104,8 @@ In Windows 10, version 1803, Assigned Access runtime status only supports monito
|
|||||||
| KioskModeAppNotFound | This occurs when the kiosk app is not deployed to the machine. |
|
| KioskModeAppNotFound | This occurs when the kiosk app is not deployed to the machine. |
|
||||||
| KioskModeAppActivationFailure | This happens when the assigned access controller detects the process terminated unexpectedly after exceeding the max retry. |
|
| KioskModeAppActivationFailure | This happens when the assigned access controller detects the process terminated unexpectedly after exceeding the max retry. |
|
||||||
|
|
||||||
Note that status codes available in the Status payload correspond to a specific KioskModeAppRuntimeStatus.
|
> [!NOTE]
|
||||||
|
> Status codes available in the Status payload correspond to a specific KioskModeAppRuntimeStatus.
|
||||||
|
|
||||||
|Status code | KioskModeAppRuntimeStatus |
|
|Status code | KioskModeAppRuntimeStatus |
|
||||||
|---------|---------|
|
|---------|---------|
|
||||||
@ -116,7 +124,8 @@ In Windows 10, version 1809, Assigned Access runtime status supports monitoring
|
|||||||
|ActivationFailed|The AssignedAccess account (kiosk or multi-app) failed to sign in.|
|
|ActivationFailed|The AssignedAccess account (kiosk or multi-app) failed to sign in.|
|
||||||
|AppNoResponse|The kiosk app launched successfully but is now unresponsive.|
|
|AppNoResponse|The kiosk app launched successfully but is now unresponsive.|
|
||||||
|
|
||||||
Note that status codes available in the Status payload correspond to a specific AssignedAccessRuntimeStatus.
|
> [!NOTE]
|
||||||
|
> Status codes available in the Status payload correspond to a specific AssignedAccessRuntimeStatus.
|
||||||
|
|
||||||
|Status code|AssignedAccessRuntimeStatus|
|
|Status code|AssignedAccessRuntimeStatus|
|
||||||
|---|---|
|
|---|---|
|
||||||
@ -573,7 +582,7 @@ Escape and CDATA are mechanisms when handling xml in xml. Consider it’s a tran
|
|||||||
|
|
||||||
This example shows escaped XML of the Data node.
|
This example shows escaped XML of the Data node.
|
||||||
|
|
||||||
```
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Add>
|
<Add>
|
||||||
@ -642,8 +651,10 @@ This example shows escaped XML of the Data node.
|
|||||||
</SyncBody>
|
</SyncBody>
|
||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
This example shows escaped XML of the Data node.
|
This example shows escaped XML of the Data node.
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Replace>
|
<Replace>
|
||||||
@ -714,7 +725,8 @@ This example shows escaped XML of the Data node.
|
|||||||
```
|
```
|
||||||
|
|
||||||
This example uses CData for the XML.
|
This example uses CData for the XML.
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Add>
|
<Add>
|
||||||
@ -785,7 +797,8 @@ This example uses CData for the XML.
|
|||||||
```
|
```
|
||||||
|
|
||||||
Example of Get command that returns the configuration in the device.
|
Example of Get command that returns the configuration in the device.
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Get>
|
<Get>
|
||||||
@ -802,7 +815,8 @@ Example of Get command that returns the configuration in the device.
|
|||||||
```
|
```
|
||||||
|
|
||||||
Example of the Delete command.
|
Example of the Delete command.
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Delete>
|
<Delete>
|
||||||
@ -1122,6 +1136,7 @@ Shell Launcher V2 uses a separate XSD and namespace for backward compatibility.
|
|||||||
</xs:element>
|
</xs:element>
|
||||||
</xs:schema>
|
</xs:schema>
|
||||||
```
|
```
|
||||||
|
|
||||||
### Shell Launcher V2 XSD
|
### Shell Launcher V2 XSD
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
@ -1151,7 +1166,8 @@ Shell Launcher V2 uses a separate XSD and namespace for backward compatibility.
|
|||||||
## ShellLauncherConfiguration examples
|
## ShellLauncherConfiguration examples
|
||||||
|
|
||||||
ShellLauncherConfiguration Add
|
ShellLauncherConfiguration Add
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Add>
|
<Add>
|
||||||
@ -1220,7 +1236,8 @@ ShellLauncherConfiguration Add
|
|||||||
```
|
```
|
||||||
|
|
||||||
ShellLauncherConfiguration Add AutoLogon
|
ShellLauncherConfiguration Add AutoLogon
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Add>
|
<Add>
|
||||||
@ -1268,7 +1285,8 @@ ShellLauncherConfiguration Add AutoLogon
|
|||||||
```
|
```
|
||||||
|
|
||||||
ShellLauncher V2 Add
|
ShellLauncher V2 Add
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Add>
|
<Add>
|
||||||
@ -1323,7 +1341,8 @@ xmlns:V2="http://schemas.microsoft.com/ShellLauncher/2019/Configuration">
|
|||||||
```
|
```
|
||||||
|
|
||||||
ShellLauncherConfiguration Get
|
ShellLauncherConfiguration Get
|
||||||
```
|
|
||||||
|
```xml
|
||||||
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
<SyncML xmlns='SYNCML:SYNCML1.2'>
|
||||||
<SyncBody>
|
<SyncBody>
|
||||||
<Get>
|
<Get>
|
||||||
|
@ -17,6 +17,7 @@ The BitLocker configuration service provider (CSP) is used by the enterprise to
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Settings are enforced only at the time encryption is started. Encryption is not restarted with settings changes.
|
> Settings are enforced only at the time encryption is started. Encryption is not restarted with settings changes.
|
||||||
|
>
|
||||||
> You must send all the settings together in a single SyncML to be effective.
|
> You must send all the settings together in a single SyncML to be effective.
|
||||||
|
|
||||||
A Get operation on any of the settings, except for RequireDeviceEncryption and RequireStorageCardEncryption, returns
|
A Get operation on any of the settings, except for RequireDeviceEncryption and RequireStorageCardEncryption, returns
|
||||||
@ -24,11 +25,29 @@ the setting configured by the admin.
|
|||||||
|
|
||||||
For RequireDeviceEncryption and RequireStorageCardEncryption, the Get operation returns the actual status of enforcement to the admin, such as if Trusted Platform Module (TPM) protection is required and if encryption is required. And if the device has BitLocker enabled but with password protector, the status reported is 0. A Get operation on RequireDeviceEncryption does not verify that the a minimum PIN length is enforced (SystemDrivesMinimumPINLength).
|
For RequireDeviceEncryption and RequireStorageCardEncryption, the Get operation returns the actual status of enforcement to the admin, such as if Trusted Platform Module (TPM) protection is required and if encryption is required. And if the device has BitLocker enabled but with password protector, the status reported is 0. A Get operation on RequireDeviceEncryption does not verify that the a minimum PIN length is enforced (SystemDrivesMinimumPINLength).
|
||||||
|
|
||||||
The following diagram shows the BitLocker configuration service provider in tree format.
|
The following shows the BitLocker configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Device/Vendor/MSFT
|
||||||
|
BitLocker
|
||||||
|
----RequireStorageCardEncryption
|
||||||
|
----RequireDeviceEncryption
|
||||||
|
----EncryptionMethodByDriveType
|
||||||
|
----SystemDrivesRequireStartupAuthentication
|
||||||
|
----SystemDrivesMinimumPINLength
|
||||||
|
----SystemDrivesRecoveryMessage
|
||||||
|
----SystemDrivesRecoveryOptions
|
||||||
|
----FixedDrivesRecoveryOptions
|
||||||
|
----FixedDrivesRequireEncryption
|
||||||
|
----RemovableDrivesRequireEncryption
|
||||||
|
----AllowWarningForOtherDiskEncryption
|
||||||
|
----AllowStandardUserEncryption
|
||||||
|
----ConfigureRecoveryPasswordRotation
|
||||||
|
----RotateRecoveryPasswords
|
||||||
|
----Status
|
||||||
|
--------DeviceEncryptionStatus
|
||||||
|
--------RotateRecoveryPasswordsStatus
|
||||||
|
--------RotateRecoveryPasswordsRequestID
|
||||||
|
```
|
||||||
<a href="" id="--device-vendor-msft-bitlocker"></a>**./Device/Vendor/MSFT/BitLocker**
|
<a href="" id="--device-vendor-msft-bitlocker"></a>**./Device/Vendor/MSFT/BitLocker**
|
||||||
Defines the root node for the BitLocker configuration service provider.
|
Defines the root node for the BitLocker configuration service provider.
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
@ -225,7 +244,7 @@ EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for remov
|
|||||||
If you want to disable this policy use the following SyncML:
|
If you want to disable this policy use the following SyncML:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<Replace>
|
<Replace>
|
||||||
<CmdID>$CmdID$</CmdID>
|
<CmdID>$CmdID$</CmdID>
|
||||||
<Item>
|
<Item>
|
||||||
<Target>
|
<Target>
|
||||||
@ -236,7 +255,7 @@ EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for remov
|
|||||||
</Meta>
|
</Meta>
|
||||||
<Data><disabled/></Data>
|
<Data><disabled/></Data>
|
||||||
</Item>
|
</Item>
|
||||||
</Replace>
|
</Replace>
|
||||||
```
|
```
|
||||||
|
|
||||||
Data type is string. Supported operations are Add, Get, Replace, and Delete.
|
Data type is string. Supported operations are Add, Get, Replace, and Delete.
|
||||||
|
@ -25,16 +25,94 @@ The CertificateStore configuration service provider is used to add secure socket
|
|||||||
|
|
||||||
For the CertificateStore CSP, you cannot use the Replace command unless the node already exists.
|
For the CertificateStore CSP, you cannot use the Replace command unless the node already exists.
|
||||||
|
|
||||||
The following diagram shows the CertificateStore configuration service provider management object in tree format as used by both Open Mobile Alliance Device Management (OMA DM) and OMA Client Provisioning.
|
The following shows the CertificateStore configuration service provider management object in tree format as used by both Open Mobile Alliance Device Management (OMA DM) and OMA Client Provisioning.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
CertificateStore
|
||||||
|
----ROOT
|
||||||
|
--------*
|
||||||
|
------------EncodedCertificate
|
||||||
|
------------IssuedBy
|
||||||
|
------------IssuedTo
|
||||||
|
------------ValidFrom
|
||||||
|
------------ValidTo
|
||||||
|
------------TemplateName
|
||||||
|
--------System
|
||||||
|
------------*
|
||||||
|
----------------EncodedCertificate
|
||||||
|
----------------IssuedBy
|
||||||
|
----------------IssuedTo
|
||||||
|
----------------ValidFrom
|
||||||
|
----------------ValidTo
|
||||||
|
----------------TemplateName
|
||||||
|
----MY
|
||||||
|
--------User
|
||||||
|
------------*
|
||||||
|
----------------EncodedCertificate
|
||||||
|
----------------IssuedBy
|
||||||
|
----------------IssuedTo
|
||||||
|
----------------ValidFrom
|
||||||
|
----------------ValidTo
|
||||||
|
----------------TemplateName
|
||||||
|
--------SCEP
|
||||||
|
------------*
|
||||||
|
----------------Install
|
||||||
|
--------------------ServerURL
|
||||||
|
--------------------Challenge
|
||||||
|
--------------------EKUMapping
|
||||||
|
--------------------KeyUsage
|
||||||
|
--------------------SubjectName
|
||||||
|
--------------------KeyProtection
|
||||||
|
--------------------RetryDelay
|
||||||
|
--------------------RetryCount
|
||||||
|
--------------------TemplateName
|
||||||
|
--------------------KeyLength
|
||||||
|
--------------------HashAlgrithm
|
||||||
|
--------------------CAThumbPrint
|
||||||
|
--------------------SubjectAlternativeNames
|
||||||
|
--------------------ValidPeriod
|
||||||
|
--------------------ValidPeriodUnit
|
||||||
|
--------------------Enroll
|
||||||
|
----------------CertThumbPrint
|
||||||
|
----------------Status
|
||||||
|
----------------ErrorCode
|
||||||
|
--------WSTEP
|
||||||
|
------------CertThumprint
|
||||||
|
------------Renew
|
||||||
|
----------------RenewPeriod
|
||||||
|
----------------ServerURL
|
||||||
|
----------------RetryInterval
|
||||||
|
----------------ROBOSupport
|
||||||
|
----------------Status
|
||||||
|
----------------ErrorCode
|
||||||
|
----------------LastRenewalAttemptTime (Added in Windows 10, version 1607)
|
||||||
|
----------------RenewNow (Added in Windows 10, version 1607)
|
||||||
|
----------------RetryAfterExpiryInterval (Added in Windows 10, version 1703)
|
||||||
|
----CA
|
||||||
|
--------*
|
||||||
|
------------EncodedCertificate
|
||||||
|
------------IssuedBy
|
||||||
|
------------IssuedTo
|
||||||
|
------------ValidFrom
|
||||||
|
------------ValidTo
|
||||||
|
------------TemplateName
|
||||||
|
--------System
|
||||||
|
------------*
|
||||||
|
----------------EncodedCertificate
|
||||||
|
----------------IssuedBy
|
||||||
|
----------------IssuedTo
|
||||||
|
----------------ValidFrom
|
||||||
|
----------------ValidTo
|
||||||
|
----------------TemplateName
|
||||||
|
```
|
||||||
<a href="" id="root-system"></a>**Root/System**
|
<a href="" id="root-system"></a>**Root/System**
|
||||||
Defines the certificate store that contains root, or self-signed, certificates.
|
Defines the certificate store that contains root, or self-signed, certificates.
|
||||||
|
|
||||||
Supported operation is Get.
|
Supported operation is Get.
|
||||||
|
|
||||||
> **Note** Root/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing root certificates.
|
> [!NOTE]
|
||||||
|
> Root/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing root certificates.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -43,7 +121,8 @@ Defines the certificate store that contains cryptographic information, including
|
|||||||
|
|
||||||
Supported operation is Get.
|
Supported operation is Get.
|
||||||
|
|
||||||
> **Note** CA/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing CA certificates.
|
> [!NOTE]
|
||||||
|
> CA/System is case sensitive. Please use the RootCATrustedCertificates CSP moving forward for installing CA certificates.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -52,7 +131,8 @@ Defines the certificate store that contains public keys for client certificates.
|
|||||||
|
|
||||||
Supported operation is Get.
|
Supported operation is Get.
|
||||||
|
|
||||||
> **Note** My/User is case sensitive.
|
> [!NOTE]
|
||||||
|
> My/User is case sensitive.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -61,7 +141,8 @@ Defines the certificate store that contains public key for client certificate. T
|
|||||||
|
|
||||||
Supported operation is Get.
|
Supported operation is Get.
|
||||||
|
|
||||||
> **Note** My/System is case sensitive.
|
> [!NOTE]
|
||||||
|
> My/System is case sensitive.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -105,7 +186,8 @@ Required for Simple Certificate Enrollment Protocol (SCEP) certificate enrollmen
|
|||||||
|
|
||||||
Supported operation is Get.
|
Supported operation is Get.
|
||||||
|
|
||||||
> **Note** Please use the ClientCertificateInstall CSP to install SCEP certificates moving forward. All enhancements to SCEP will happen in that CSP.
|
> [!NOTE]
|
||||||
|
> Please use the ClientCertificateInstall CSP to install SCEP certificates moving forward. All enhancements to SCEP will happen in that CSP.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -119,7 +201,8 @@ Required for SCEP certificate enrollment. Parent node to group SCEP certificate
|
|||||||
|
|
||||||
Supported operations are Add, Replace, and Delete.
|
Supported operations are Add, Replace, and Delete.
|
||||||
|
|
||||||
> **Note** Though the children nodes under Install support Replace commands, after the Exec command is sent to the device, the device takes the values that are set when the Exec command is accepted. You should not expect the node value change that occurs after the Exec command is accepted to impact the current undergoing enrollment. You should check the Status node value and make sure that the device is not at an unknown stage before changing the children node values.
|
> [!NOTE]
|
||||||
|
> Though the children nodes under Install support Replace commands, after the Exec command is sent to the device, the device takes the values that are set when the Exec command is accepted. You should not expect the node value change that occurs after the Exec command is accepted to impact the current undergoing enrollment. You should check the Status node value and make sure that the device is not at an unknown stage before changing the children node values.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -219,7 +302,8 @@ Valid values are one of the following:
|
|||||||
- Months
|
- Months
|
||||||
- Years
|
- Years
|
||||||
|
|
||||||
> **Note** The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server.
|
> [!NOTE]
|
||||||
|
> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -228,7 +312,8 @@ Optional. Specifies desired number of units used in validity period and subject
|
|||||||
|
|
||||||
Supported operations are Get, Add, Delete, and Replace.
|
Supported operations are Get, Add, Delete, and Replace.
|
||||||
|
|
||||||
> **Note** The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server.
|
> [!NOTE]
|
||||||
|
> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) of the SCEP server as part of certificate enrollment request. How this valid period is used to create the certificate depends on the MDM server.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -285,7 +370,8 @@ Supported operation is Get.
|
|||||||
<a href="" id="my-wstep-renew-serverurl"></a>**My/WSTEP/Renew/ServerURL**
|
<a href="" id="my-wstep-renew-serverurl"></a>**My/WSTEP/Renew/ServerURL**
|
||||||
Optional. Specifies the URL of certificate renewal server. If this node does not exist, the client uses the initial certificate enrollment URL.
|
Optional. Specifies the URL of certificate renewal server. If this node does not exist, the client uses the initial certificate enrollment URL.
|
||||||
|
|
||||||
> **Note** The renewal process follows the same steps as device enrollment, which means that it starts with Discovery service, followed by Enrollment policy service, and then Enrollment web service.
|
> [!NOTE]
|
||||||
|
> The renewal process follows the same steps as device enrollment, which means that it starts with Discovery service, followed by Enrollment policy service, and then Enrollment web service.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -298,7 +384,8 @@ The default value is 42 and the valid values are 1 – 1000. Value type is an in
|
|||||||
|
|
||||||
Supported operations are Add, Get, Delete, and Replace.
|
Supported operations are Add, Get, Delete, and Replace.
|
||||||
|
|
||||||
> **Note** When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
> [!NOTE]
|
||||||
|
> When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -313,7 +400,8 @@ The default value is 7 and the valid values are 1 – 1000 AND =< RenewalPeriod,
|
|||||||
|
|
||||||
Supported operations are Add, Get, Delete, and Replace.
|
Supported operations are Add, Get, Delete, and Replace.
|
||||||
|
|
||||||
> **Note** When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
> [!NOTE]
|
||||||
|
> When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -324,7 +412,8 @@ ROBO is the only supported renewal method for Windows 10. This value is ignored
|
|||||||
|
|
||||||
Supported operations are Add, Get, Delete, and Replace.
|
Supported operations are Add, Get, Delete, and Replace.
|
||||||
|
|
||||||
> **Note** When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
> [!NOTE]
|
||||||
|
> When you set the renewal schedule over SyncML DM commands to ROBOSupport, RenewalPeriod, and RetryInterval, you must wrap them in Atomic commands.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -15,10 +15,13 @@ manager: dansimp
|
|||||||
|
|
||||||
The CleanPC configuration service provider (CSP) allows removal of user-installed and pre-installed applications, with the option to persist user data. This CSP was added in Windows 10, version 1703.
|
The CleanPC configuration service provider (CSP) allows removal of user-installed and pre-installed applications, with the option to persist user data. This CSP was added in Windows 10, version 1703.
|
||||||
|
|
||||||
The following diagram shows the CleanPC configuration service provider in tree format.
|
The following shows the CleanPC configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Device/Vendor/MSFT
|
||||||
|
CleanPC
|
||||||
|
----CleanPCWithoutRetainingUserData
|
||||||
|
----CleanPCRetainingUserData
|
||||||
|
```
|
||||||
<a href="" id="--device-vendor-msft-cleanpc"></a>**./Device/Vendor/MSFT/CleanPC**
|
<a href="" id="--device-vendor-msft-cleanpc"></a>**./Device/Vendor/MSFT/CleanPC**
|
||||||
<p style="margin-left: 20px">The root node for the CleanPC configuration service provider.</p>
|
<p style="margin-left: 20px">The root node for the CleanPC configuration service provider.</p>
|
||||||
|
|
||||||
|
@ -23,10 +23,48 @@ For PFX certificate installation and SCEP installation, the SyncML commands must
|
|||||||
|
|
||||||
You can only set PFXKeyExportable to true if KeyLocation=3. For any other KeyLocation value, the CSP will fail.
|
You can only set PFXKeyExportable to true if KeyLocation=3. For any other KeyLocation value, the CSP will fail.
|
||||||
|
|
||||||
The following image shows the ClientCertificateInstall configuration service provider in tree format.
|
The following shows the ClientCertificateInstall configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Vendor/MSFT
|
||||||
|
ClientCertificateInstall
|
||||||
|
----PFXCertInstall
|
||||||
|
--------UniqueID
|
||||||
|
------------KeyLocation
|
||||||
|
------------ContainerName
|
||||||
|
------------PFXCertBlob
|
||||||
|
------------PFXCertPassword
|
||||||
|
------------PFXCertPasswordEncryptionType
|
||||||
|
------------PFXKeyExportable
|
||||||
|
------------Thumbprint
|
||||||
|
------------Status
|
||||||
|
------------PFXCertPasswordEncryptionStore (Added in Windows 10, version 1511)
|
||||||
|
----SCEP
|
||||||
|
--------UniqueID
|
||||||
|
------------Install
|
||||||
|
----------------ServerURL
|
||||||
|
----------------Challenge
|
||||||
|
----------------EKUMapping
|
||||||
|
----------------KeyUsage
|
||||||
|
----------------SubjectName
|
||||||
|
----------------KeyProtection
|
||||||
|
----------------RetryDelay
|
||||||
|
----------------RetryCount
|
||||||
|
----------------TemplateName
|
||||||
|
----------------KeyLength
|
||||||
|
----------------HashAlgorithm
|
||||||
|
----------------CAThumbprint
|
||||||
|
----------------SubjectAlternativeNames
|
||||||
|
----------------ValidPeriod
|
||||||
|
----------------ValidPeriodUnits
|
||||||
|
----------------ContainerName
|
||||||
|
----------------CustomTextToShowInPrompt
|
||||||
|
----------------Enroll
|
||||||
|
----------------AADKeyIdentifierList (Added in Windows 10, version 1703)
|
||||||
|
------------CertThumbprint
|
||||||
|
------------Status
|
||||||
|
------------ErrorCode
|
||||||
|
------------RespondentServerUrl
|
||||||
|
```
|
||||||
<a href="" id="device-or-user"></a>**Device or User**
|
<a href="" id="device-or-user"></a>**Device or User**
|
||||||
For device certificates, use <strong>./Device/Vendor/MSFT</strong> path and for user certificates use <strong>./User/Vendor/MSFT</strong> path.
|
For device certificates, use <strong>./Device/Vendor/MSFT</strong> path and for user certificates use <strong>./User/Vendor/MSFT</strong> path.
|
||||||
|
|
||||||
@ -287,7 +325,8 @@ Valid values are:
|
|||||||
- Months
|
- Months
|
||||||
- Years
|
- Years
|
||||||
|
|
||||||
> **Note** The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) to the SCEP server as part of certificate enrollment request. Depending on the server configuration, the server defines how to use this valid period to create the certificate.
|
> [!NOTE]
|
||||||
|
> The device only sends the MDM server expected certificate validation period (ValidPeriodUnits + ValidPeriod) to the SCEP server as part of certificate enrollment request. Depending on the server configuration, the server defines how to use this valid period to create the certificate.
|
||||||
|
|
||||||
Supported operations are Add, Get, Delete, and Replace.
|
Supported operations are Add, Get, Delete, and Replace.
|
||||||
|
|
||||||
|
@ -17,18 +17,49 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
The CM\_ProxyEntries configuration service provider is used to configure proxy connections on the mobile device.
|
The CM\_ProxyEntries configuration service provider is used to configure proxy connections on the mobile device.
|
||||||
|
|
||||||
> **Note** CM\_ProxyEntries CSP is only supported in Windows 10 Mobile.
|
> [!NOTE]
|
||||||
>
|
> CM\_ProxyEntries CSP is only supported in Windows 10 Mobile.
|
||||||
>
|
|
||||||
>
|
> [!IMPORTANT]
|
||||||
> **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
The following diagram shows the CM\_ProxyEntries configuration service provider management object in tree format as used by Open Mobile Alliance Client Provisioning (OMA CP) and OMA Device Management(OMA DM). Support for OMA DM was added in Windows 10, version 1607.
|
The following shows the CM\_ProxyEntries configuration service provider management object in tree format as used by Open Mobile Alliance Client Provisioning (OMA CP) and OMA Device Management(OMA DM). Support for OMA DM was added in Windows 10, version 1607.
|
||||||
|
|
||||||

|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
CM_ProxyEntries
|
||||||
|
----Entry
|
||||||
|
--------ConnectionName
|
||||||
|
--------BypassLocal
|
||||||
|
--------Enable
|
||||||
|
--------Exception
|
||||||
|
--------Password
|
||||||
|
--------Port
|
||||||
|
--------Server
|
||||||
|
--------Type
|
||||||
|
--------Username
|
||||||
|
|
||||||
|
|
||||||
|
./Device/Vendor/MSFT
|
||||||
|
Root
|
||||||
|
|
||||||
|
|
||||||
|
./Vendor/MSFT
|
||||||
|
./Device/Vendor/MSFT
|
||||||
|
CM_ProxyEntries
|
||||||
|
----Entry
|
||||||
|
--------ConnectionName
|
||||||
|
--------BypassLocal
|
||||||
|
--------Enable
|
||||||
|
--------Exception
|
||||||
|
--------Password
|
||||||
|
--------Port
|
||||||
|
--------Server
|
||||||
|
--------Type
|
||||||
|
--------Username
|
||||||
|
```
|
||||||
<a href="" id="entryname"></a>**entryname**
|
<a href="" id="entryname"></a>**entryname**
|
||||||
Defines the name of the connection proxy.
|
Defines the name of the connection proxy.
|
||||||
|
|
||||||
|
@ -17,9 +17,8 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
The CMPolicy configuration service provider defines rules that the Connection Manager uses to identify the correct connection for a connection request.
|
The CMPolicy configuration service provider defines rules that the Connection Manager uses to identify the correct connection for a connection request.
|
||||||
|
|
||||||
> **Note**
|
> [!NOTE]
|
||||||
This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Each policy entry identifies one or more applications in combination with a host pattern. The policy entry is assigned a list of connection details that Connection Manager uses to satisfy connection requests matching the application and host patterns. CMPolicy configuration service provider can have multiple policies
|
Each policy entry identifies one or more applications in combination with a host pattern. The policy entry is assigned a list of connection details that Connection Manager uses to satisfy connection requests matching the application and host patterns. CMPolicy configuration service provider can have multiple policies
|
||||||
@ -28,10 +27,21 @@ Each policy entry identifies one or more applications in combination with a host
|
|||||||
|
|
||||||
**Default Policies**: Policies are applied in order of their scope with the most specific policies considered before the more general policies. The phone’s default behavior applies to all applications and all domains and is only used when no other, more specific policy is available. The default policy is to use any available Wi-Fi network first and then any available APN.
|
**Default Policies**: Policies are applied in order of their scope with the most specific policies considered before the more general policies. The phone’s default behavior applies to all applications and all domains and is only used when no other, more specific policy is available. The default policy is to use any available Wi-Fi network first and then any available APN.
|
||||||
|
|
||||||
The following diagram shows the CMPolicy configuration service provider management object in tree format as used by both Open Mobile Alliance (OMA) Client Provisioning and OMA Device Management.
|
The following shows the CMPolicy configuration service provider management object in tree format as used by both Open Mobile Alliance (OMA) Client Provisioning and OMA Device Management.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
CMPolicy
|
||||||
|
----PolicyName
|
||||||
|
--------SID
|
||||||
|
--------ClientType
|
||||||
|
--------Host
|
||||||
|
--------OrderedConnections
|
||||||
|
--------Connections
|
||||||
|
------------ConnXXX
|
||||||
|
----------------ConnectionID
|
||||||
|
----------------Type
|
||||||
|
```
|
||||||
<a href="" id="policyname"></a>***policyName***
|
<a href="" id="policyname"></a>***policyName***
|
||||||
Defines the name of the policy.
|
Defines the name of the policy.
|
||||||
|
|
||||||
@ -64,7 +74,7 @@ Specifies whether the list of connections is in preference order.
|
|||||||
A value of "0" specifies that the connections are not listed in order of preference. A value of "1" indicates that the listed connections are in order of preference.
|
A value of "0" specifies that the connections are not listed in order of preference. A value of "1" indicates that the listed connections are in order of preference.
|
||||||
|
|
||||||
<a href="" id="connxxx"></a>**Conn**<strong>*XXX*</strong>
|
<a href="" id="connxxx"></a>**Conn**<strong>*XXX*</strong>
|
||||||
Enumerates the connections associated with the policy. Element names begin with "Conn" followed by three digits which increment starting from "000". For example, a policy which applied to five connections would have element entries named "Conn000", "Conn001", "Conn002", "Conn003", and "Conn004".
|
Enumerates the connections associated with the policy. Element names begin with "Conn" followed by three digits, which increment starting from "000". For example, a policy, which applied to five connections would have element entries named "Conn000", "Conn001", "Conn002", "Conn003", and "Conn004".
|
||||||
|
|
||||||
<a href="" id="connectionid"></a>**ConnectionID**
|
<a href="" id="connectionid"></a>**ConnectionID**
|
||||||
Specifies a unique identifier for a connection within a group of connections. The exact value is based on the Type parameter.
|
Specifies a unique identifier for a connection within a group of connections. The exact value is based on the Type parameter.
|
||||||
@ -173,11 +183,11 @@ For `CMST_CONNECTION_NETWORK_TYPE`, specify the GUID for the desired network typ
|
|||||||
<td><p>{7CFA04A5-0F3F-445C-88A4-C86ED2AD94EA}</p></td>
|
<td><p>{7CFA04A5-0F3F-445C-88A4-C86ED2AD94EA}</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td><p>Ethernet 10Mbps</p></td>
|
<td><p>Ethernet 10 Mbps</p></td>
|
||||||
<td><p>{97D3D1B3-854A-4C32-BD1C-C13069078370}</p></td>
|
<td><p>{97D3D1B3-854A-4C32-BD1C-C13069078370}</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td><p>Ethernet 100Mbps</p></td>
|
<td><p>Ethernet 100 Mbps</p></td>
|
||||||
<td><p>{A8F4FE66-8D04-43F5-9DD2-2A85BD21029B}</p></td>
|
<td><p>{A8F4FE66-8D04-43F5-9DD2-2A85BD21029B}</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
@ -486,14 +496,14 @@ Adding a host-based mapping policy:
|
|||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td><p>nocharacteristic</p></td>
|
<td><p>uncharacteristic</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td><p>characteristic-query</p></td>
|
<td><p>characteristic-query</p></td>
|
||||||
<td><p>Yes</p>
|
<td><p>Yes</p>
|
||||||
<p>Recursive query: Yes</p>
|
<p>Recursive query: Yes</p>
|
||||||
<p>Top level query: Yes</p></td>
|
<p>Top-level query: Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
@ -17,8 +17,8 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
The CMPolicyEnterprise configuration service provider is used by the enterprise to define rules that the Connection Manager uses to identify the correct connection for a connection request.
|
The CMPolicyEnterprise configuration service provider is used by the enterprise to define rules that the Connection Manager uses to identify the correct connection for a connection request.
|
||||||
|
|
||||||
> **Note**
|
> [!NOTE]
|
||||||
This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_NETWORKING\_ADMIN capabilities to be accessed from a network configuration application.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -28,10 +28,20 @@ Each policy entry identifies one or more applications in combination with a host
|
|||||||
|
|
||||||
**Default Policies**: Policies are applied in order of their scope with the most specific policies considered before the more general policies. The phone’s default behavior applies to all applications and all domains and is only used when no other, more specific policy is available. The default policy is to use any available Wi-Fi network first and then any available APN.
|
**Default Policies**: Policies are applied in order of their scope with the most specific policies considered before the more general policies. The phone’s default behavior applies to all applications and all domains and is only used when no other, more specific policy is available. The default policy is to use any available Wi-Fi network first and then any available APN.
|
||||||
|
|
||||||
The following diagram shows the CMPolicyEnterprise configuration service provider management object in tree format as used by both Open Mobile Alliance (OMA) Client Provisioning and OMA Device Management.
|
The following shows the CMPolicyEnterprise configuration service provider management object in tree format as used by both Open Mobile Alliance (OMA) Client Provisioning and OMA Device Management.
|
||||||
|
```
|
||||||

|
./Vendor/MSFT
|
||||||
|
CMPolicy
|
||||||
|
----PolicyName
|
||||||
|
--------SID
|
||||||
|
--------ClientType
|
||||||
|
--------Host
|
||||||
|
--------OrderedConnections
|
||||||
|
--------Connections
|
||||||
|
------------ConnXXX
|
||||||
|
----------------ConnectionID
|
||||||
|
----------------Type
|
||||||
|
```
|
||||||
<a href="" id="policyname"></a>***policyName***
|
<a href="" id="policyname"></a>***policyName***
|
||||||
Defines the name of the policy.
|
Defines the name of the policy.
|
||||||
|
|
||||||
|
@ -15,11 +15,18 @@ ms.date: 06/26/2017
|
|||||||
# CustomDeviceUI CSP
|
# CustomDeviceUI CSP
|
||||||
|
|
||||||
The CustomDeviceUI configuration service provider allows OEMs to implement their custom foreground application, as well as the background tasks to run on an IoT device running IoT Core. Only one foreground application is supported per device. Multiple background tasks are supported.
|
The CustomDeviceUI configuration service provider allows OEMs to implement their custom foreground application, as well as the background tasks to run on an IoT device running IoT Core. Only one foreground application is supported per device. Multiple background tasks are supported.
|
||||||
The following diagram shows the CustomDeviceUI configuration service provider in tree format as used by both the Open Mobile Alliance (OMA) Device Management (DM) and OMA Client Provisioning.
|
The following shows the CustomDeviceUI configuration service provider in tree format as used by both the Open Mobile Alliance (OMA) Device Management (DM) and OMA Client Provisioning.
|
||||||
|
|
||||||
> **Note** This configuration service provider only applies to Windows 10 IoT Core (IoT Core).
|
> [!NOTE]
|
||||||
|
> This configuration service provider only applies to Windows 10 IoT Core (IoT Core).
|
||||||
|
|
||||||

|
```
|
||||||
|
./Vendor/MSFT
|
||||||
|
CustomDeviceUI
|
||||||
|
----StartupAppID
|
||||||
|
----BackgroundTasksToLaunch
|
||||||
|
--------BackgroundTaskPackageName
|
||||||
|
```
|
||||||
|
|
||||||
<a href="" id="./Vendor/MSFT/CustomDeviceUI"></a>**./Vendor/MSFT/CustomDeviceUI**
|
<a href="" id="./Vendor/MSFT/CustomDeviceUI"></a>**./Vendor/MSFT/CustomDeviceUI**
|
||||||
The root node for the CustomDeviceUI configuration service provider. The supported operation is Get.
|
The root node for the CustomDeviceUI configuration service provider. The supported operation is Get.
|
||||||
|
@ -20,10 +20,49 @@ ms.date: 08/11/2020
|
|||||||
|
|
||||||
The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise.
|
The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise.
|
||||||
|
|
||||||
The following image shows the Windows Defender configuration service provider in tree format.
|
The following shows the Windows Defender configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Vendor/MSFT
|
||||||
|
Defender
|
||||||
|
----Detections
|
||||||
|
--------ThreatId
|
||||||
|
------------Name
|
||||||
|
------------URL
|
||||||
|
------------Severity
|
||||||
|
------------Category
|
||||||
|
------------CurrentStatus
|
||||||
|
------------ExecutionStatus
|
||||||
|
------------InitialDetectionTime
|
||||||
|
------------LastThreatStatusChangeTime
|
||||||
|
------------NumberOfDetections
|
||||||
|
----Health
|
||||||
|
--------ProductStatus (Added in Windows 10 version 1809)
|
||||||
|
--------ComputerState
|
||||||
|
--------DefenderEnabled
|
||||||
|
--------RtpEnabled
|
||||||
|
--------NisEnabled
|
||||||
|
--------QuickScanOverdue
|
||||||
|
--------FullScanOverdue
|
||||||
|
--------SignatureOutOfDate
|
||||||
|
--------RebootRequired
|
||||||
|
--------FullScanRequired
|
||||||
|
--------EngineVersion
|
||||||
|
--------SignatureVersion
|
||||||
|
--------DefenderVersion
|
||||||
|
--------QuickScanTime
|
||||||
|
--------FullScanTime
|
||||||
|
--------QuickScanSigVersion
|
||||||
|
--------FullScanSigVersion
|
||||||
|
--------TamperProtectionEnabled (Added in Windows 10, version 1903)
|
||||||
|
--------IsVirtualMachine (Added in Windows 10, version 1903)
|
||||||
|
----Configuration (Added in Windows 10, version 1903)
|
||||||
|
--------TamperProetection (Added in Windows 10, version 1903)
|
||||||
|
--------EnableFileHashcomputation (Added in Windows 10, version 1903)
|
||||||
|
--------SupportLogLocation (Added in the next major release of Windows 10)
|
||||||
|
----Scan
|
||||||
|
----UpdateSignature
|
||||||
|
----OfflineScan (Added in Windows 10 version 1803)
|
||||||
|
```
|
||||||
<a href="" id="detections"></a>**Detections**
|
<a href="" id="detections"></a>**Detections**
|
||||||
An interior node to group all threats detected by Windows Defender.
|
An interior node to group all threats detected by Windows Defender.
|
||||||
|
|
||||||
|
@ -21,10 +21,43 @@ The DevDetail configuration service provider handles the management object which
|
|||||||
|
|
||||||
For the DevDetail CSP, you cannot use the Replace command unless the node already exists.
|
For the DevDetail CSP, you cannot use the Replace command unless the node already exists.
|
||||||
|
|
||||||
The following diagram shows the DevDetail configuration service provider management object in tree format as used by OMA Device Management. The OMA Client Provisioning protocol is not supported for this configuration service provider.
|
The following shows the DevDetail configuration service provider management object in tree format as used by OMA Device Management. The OMA Client Provisioning protocol is not supported for this configuration service provider.
|
||||||
|
```
|
||||||

|
.
|
||||||
|
DevDetail
|
||||||
|
----URI
|
||||||
|
--------MaxDepth
|
||||||
|
--------MaxTotLen
|
||||||
|
--------MaxSegLen
|
||||||
|
----DevTyp
|
||||||
|
----OEM
|
||||||
|
----FwV
|
||||||
|
----SwV
|
||||||
|
----HwV
|
||||||
|
----LrgObj
|
||||||
|
----Ext
|
||||||
|
--------Microsoft
|
||||||
|
------------MobileID
|
||||||
|
------------RadioSwV
|
||||||
|
------------Resolution
|
||||||
|
------------CommercializationOperator
|
||||||
|
------------ProcessorArchitecture
|
||||||
|
------------ProcessorType
|
||||||
|
------------OSPlatform
|
||||||
|
------------LocalTime
|
||||||
|
------------DeviceName
|
||||||
|
------------DNSComputerName (Added in Windows 10, version 2004)
|
||||||
|
------------TotalStorage
|
||||||
|
------------TotalRAM
|
||||||
|
------------SMBIOSSerialNumber (Added in Windows 10, version 1809)
|
||||||
|
--------WLANMACAddress
|
||||||
|
--------VoLTEServiceSetting
|
||||||
|
--------WlanIPv4Address
|
||||||
|
--------WlanIPv6Address
|
||||||
|
--------WlanDnsSuffix
|
||||||
|
--------WlanSubnetMask
|
||||||
|
--------DeviceHardwareData (Added in Windows 10, version 1703)
|
||||||
|
```
|
||||||
<a href="" id="devtyp"></a>**DevTyp**
|
<a href="" id="devtyp"></a>**DevTyp**
|
||||||
Required. Returns the device model name /SystemProductName as a string.
|
Required. Returns the device model name /SystemProductName as a string.
|
||||||
|
|
||||||
@ -143,8 +176,10 @@ The following are the available naming macros:
|
|||||||
|
|
||||||
Value type is string. Supported operations are Get and Replace.
|
Value type is string. Supported operations are Get and Replace.
|
||||||
|
|
||||||
> [!Note]
|
> [!NOTE]
|
||||||
> On desktop PCs, this setting specifies the DNS hostname of the computer (Computer Name) up to 63 characters. Use `%RAND:x%` to generate x number of random digits in the name, where x must be a number less than 63. For domain joined computers, the unique name must use `%RAND:x%`. Use `%SERIAL%` to generate the name with the `computer"s` serial number embedded. If the serial number exceeds the character limit, it will be truncated from the beginning of the sequence. The character restriction limit does not count the length of the macros, `%RAND:x%` and `%SERIAL%`. This setting is supported only in Windows 10, version 1803 and later. To change this setting in Windows 10, version 1709 and earlier releases, use the **ComputerName** setting under **Accounts** > **ComputerAccount**.
|
> We recommend using `%SERIAL%` or `%RAND:x%` with a high character limit to reduce the chance of name collision when generating a random name. This feature doesn't check if a particular name is already present in the environment.
|
||||||
|
|
||||||
|
On desktop PCs, this setting specifies the DNS hostname of the computer (Computer Name) up to 63 characters. Use `%RAND:x%` to generate x number of random digits in the name, where x must be a number less than 63. For domain-joined computers, the unique name must use `%RAND:x%`. Use `%SERIAL%` to generate the name with the `computer's` serial number embedded. If the serial number exceeds the character limit, it will be truncated from the beginning of the sequence. The character restriction limit does not count the length of the macros, `%RAND:x%` and `%SERIAL%`. This setting is supported only in Windows 10, version 1803 and later. To change this setting in Windows 10, version 1709 and earlier releases, use the **ComputerName** setting under **Accounts** > **ComputerAccount**.
|
||||||
|
|
||||||
<a href="" id="ext-microsoft-totalstorage"></a>**Ext/Microsoft/TotalStorage**
|
<a href="" id="ext-microsoft-totalstorage"></a>**Ext/Microsoft/TotalStorage**
|
||||||
Added in Windows 10, version 1511. Integer that specifies the total available storage in MB from first internal drive on the device (may be less than total physical storage).
|
Added in Windows 10, version 1511. Integer that specifies the total available storage in MB from first internal drive on the device (may be less than total physical storage).
|
||||||
@ -215,6 +250,3 @@ Supported operation is Get.
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -19,10 +19,21 @@ The DeveloperSetup configuration service provider (CSP) is used to configure Dev
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The DeveloperSetup configuration service provider (CSP) is only supported in Windows 10 Holographic Enterprise edition and with runtime provisioning via provisioning packages. It is not supported in MDM.
|
> The DeveloperSetup configuration service provider (CSP) is only supported in Windows 10 Holographic Enterprise edition and with runtime provisioning via provisioning packages. It is not supported in MDM.
|
||||||
|
|
||||||
The following diagram shows the DeveloperSetup configuration service provider in tree format.
|
The following shows the DeveloperSetup configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Device/Vendor/MSFT
|
||||||
|
DeveloperSetup
|
||||||
|
----EnableDeveloperMode
|
||||||
|
----DevicePortal
|
||||||
|
--------Authentication
|
||||||
|
------------Mode
|
||||||
|
------------BasicAuth
|
||||||
|
----------------Username
|
||||||
|
----------------Password
|
||||||
|
--------Connection
|
||||||
|
------------HttpPort
|
||||||
|
------------HttpsPort
|
||||||
|
```
|
||||||
<a href="" id="developersetup"></a>**DeveloperSetup**
|
<a href="" id="developersetup"></a>**DeveloperSetup**
|
||||||
<p style="margin-left: 20px">The root node for the DeveloperSetup configuration service provider.
|
<p style="margin-left: 20px">The root node for the DeveloperSetup configuration service provider.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: DeviceManageability CSP
|
title: DeviceManageability CSP
|
||||||
description: The DeviceManageability configuration service provider (CSP) is used retrieve general information about MDM configuration capabilities on the device.
|
description: The DeviceManageability configuration service provider (CSP) is used to retrieve general information about MDM configuration capabilities on the device.
|
||||||
ms.assetid: FE563221-D5B5-4EFD-9B60-44FE4066B0D2
|
ms.assetid: FE563221-D5B5-4EFD-9B60-44FE4066B0D2
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -15,14 +15,21 @@ ms.date: 11/01/2017
|
|||||||
# DeviceManageability CSP
|
# DeviceManageability CSP
|
||||||
|
|
||||||
|
|
||||||
The DeviceManageability configuration service provider (CSP) is used retrieve the general information about MDM configuration capabilities on the device. This CSP was added in Windows 10, version 1607.
|
The DeviceManageability configuration service provider (CSP) is used to retrieve the general information about MDM configuration capabilities on the device. This CSP was added in Windows 10, version 1607.
|
||||||
|
|
||||||
For performance reasons DeviceManageability CSP directly reads the CSP version from the registry. Specifically, the value csp\_version is used to determine each of the CSP versions. The csp\_version is a value under each of the CSP registration keys. To have consistency on the CSP version, the CSP GetProperty implementation for CFGMGR\_PROPERTY\_SEMANTICTYPE has to be updated to read from the registry as well, so that the both paths return the same information.
|
For performance reasons, DeviceManageability CSP directly reads the CSP version from the registry. Specifically, the value csp\_version is used to determine each of the CSP versions. The csp\_version is a value under each of the CSP registration keys. To have consistency on the CSP version, the CSP GetProperty implementation for CFGMGR\_PROPERTY\_SEMANTICTYPE has to be updated to read from the registry as well, so that the both paths return the same information.
|
||||||
|
|
||||||
The following diagram shows the DeviceManageability configuration service provider in a tree format.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
The following shows the DeviceManageability configuration service provider in a tree format.
|
||||||
|
```
|
||||||
|
./Device/Vendor/MSFT
|
||||||
|
DeviceManageability
|
||||||
|
----Capabilities
|
||||||
|
--------CSPVersions
|
||||||
|
----Provider (Added in Windows 10, version 1709)
|
||||||
|
--------ProviderID (Added in Windows 10, version 1709)
|
||||||
|
------------ConfigInfo (Added in Windows 10, version 1709)
|
||||||
|
------------EnrollmentInfo (Added in Windows 10, version 1709)
|
||||||
|
```
|
||||||
<a href="" id="--device-vendor-msft-devicemanageability"></a>**./Device/Vendor/MSFT/DeviceManageability**
|
<a href="" id="--device-vendor-msft-devicemanageability"></a>**./Device/Vendor/MSFT/DeviceManageability**
|
||||||
Root node to group information about runtime MDM configuration capability on the target device.
|
Root node to group information about runtime MDM configuration capability on the target device.
|
||||||
|
|
||||||
|
@ -17,10 +17,52 @@ ms.date: 04/30/2019
|
|||||||
|
|
||||||
The DeviceStatus configuration service provider is used by the enterprise to keep track of device inventory and query the state of compliance of these devices with their enterprise policies.
|
The DeviceStatus configuration service provider is used by the enterprise to keep track of device inventory and query the state of compliance of these devices with their enterprise policies.
|
||||||
|
|
||||||
The following image shows the DeviceStatus configuration service provider in tree format.
|
The following shows the DeviceStatus configuration service provider in tree format.
|
||||||
|
```
|
||||||

|
./Vendor/MSFT
|
||||||
|
DeviceStatus
|
||||||
|
----SecureBootState
|
||||||
|
----CellularIdentities
|
||||||
|
--------IMEI
|
||||||
|
------------IMSI
|
||||||
|
------------ICCID
|
||||||
|
------------PhoneNumber
|
||||||
|
------------CommercializationOperator
|
||||||
|
------------RoamingStatus
|
||||||
|
------------RoamingCompliance
|
||||||
|
----NetworkIdentifiers
|
||||||
|
--------MacAddress
|
||||||
|
------------IPAddressV4
|
||||||
|
------------IPAddressV6
|
||||||
|
------------IsConnected
|
||||||
|
------------Type
|
||||||
|
----Compliance
|
||||||
|
--------EncryptionCompliance
|
||||||
|
----TPM
|
||||||
|
--------SpecificationVersion
|
||||||
|
----OS
|
||||||
|
--------Edition
|
||||||
|
--------Mode
|
||||||
|
----Antivirus
|
||||||
|
--------SignatureStatus
|
||||||
|
--------Status
|
||||||
|
----Antispyware
|
||||||
|
--------SignatureStatus
|
||||||
|
--------Status
|
||||||
|
----Firewall
|
||||||
|
--------Status
|
||||||
|
----UAC
|
||||||
|
--------Status
|
||||||
|
----Battery
|
||||||
|
--------Status
|
||||||
|
--------EstimatedChargeRemaining
|
||||||
|
--------EstimatedRuntime
|
||||||
|
----DomainName
|
||||||
|
----DeviceGuard
|
||||||
|
--------VirtualizationBasedSecurityHwReq
|
||||||
|
--------VirtualizationBasedSecurityStatus
|
||||||
|
--------LsaCfgCredGuardStatus
|
||||||
|
```
|
||||||
<a href="" id="devicestatus"></a>**DeviceStatus**
|
<a href="" id="devicestatus"></a>**DeviceStatus**
|
||||||
The root node for the DeviceStatus configuration service provider.
|
The root node for the DeviceStatus configuration service provider.
|
||||||
|
|
||||||
|
@ -17,16 +17,23 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
The DevInfo configuration service provider handles the managed object which provides device information to the OMA DM server. This device information is automatically sent to the OMA DM server at the beginning of each OMA DM session.
|
The DevInfo configuration service provider handles the managed object which provides device information to the OMA DM server. This device information is automatically sent to the OMA DM server at the beginning of each OMA DM session.
|
||||||
|
|
||||||
> **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_DEVICE\_MANAGEMENT\_ADMIN capabilities to be accessed from a network configuration application.
|
> [!NOTE]
|
||||||
|
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_DEVICE\_MANAGEMENT\_ADMIN capabilities to be accessed from a network configuration application.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
For the DevInfo CSP, you cannot use the Replace command unless the node already exists.
|
For the DevInfo CSP, you cannot use the Replace command unless the node already exists.
|
||||||
|
|
||||||
The following diagram shows the DevInfo configuration service provider management object in tree format as used by OMA Device Management. The OMA Client provisioning protocol is not supported by this configuration service provider.
|
The following shows the DevInfo configuration service provider management object in tree format as used by OMA Device Management. The OMA Client provisioning protocol is not supported by this configuration service provider.
|
||||||
|
```
|
||||||

|
.
|
||||||
|
DevInfo
|
||||||
|
----DevId
|
||||||
|
----Man
|
||||||
|
----Mod
|
||||||
|
----DmV
|
||||||
|
----Lang
|
||||||
|
```
|
||||||
<a href="" id="devid"></a>**DevId**
|
<a href="" id="devid"></a>**DevId**
|
||||||
Required. Returns an application-specific global unique device identifier by default.
|
Required. Returns an application-specific global unique device identifier by default.
|
||||||
|
|
||||||
|
@ -1379,7 +1379,7 @@ ms.date: 10/08/2020
|
|||||||
- [Autoplay/SetDefaultAutoRunBehavior](./policy-csp-autoplay.md#autoplay-setdefaultautorunbehavior)
|
- [Autoplay/SetDefaultAutoRunBehavior](./policy-csp-autoplay.md#autoplay-setdefaultautorunbehavior)
|
||||||
- [Autoplay/TurnOffAutoPlay](./policy-csp-autoplay.md#autoplay-turnoffautoplay)
|
- [Autoplay/TurnOffAutoPlay](./policy-csp-autoplay.md#autoplay-turnoffautoplay)
|
||||||
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
|
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
|
||||||
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-diableprintingoverhttp)
|
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-disableprintingoverhttp)
|
||||||
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
|
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
|
||||||
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
|
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
|
||||||
- [Connectivity/HardenedUNCPaths](./policy-csp-connectivity.md#connectivity-hardeneduncpaths)
|
- [Connectivity/HardenedUNCPaths](./policy-csp-connectivity.md#connectivity-hardeneduncpaths)
|
||||||
|
@ -137,7 +137,7 @@ ms.date: 07/18/2019
|
|||||||
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
|
- [Cellular/ShowAppCellularAccessUI](./policy-csp-cellular.md#cellular-showappcellularaccessui)
|
||||||
- [Connectivity/AllowCellularDataRoaming](./policy-csp-connectivity.md#connectivity-allowcellulardataroaming)
|
- [Connectivity/AllowCellularDataRoaming](./policy-csp-connectivity.md#connectivity-allowcellulardataroaming)
|
||||||
- [Connectivity/AllowPhonePCLinking](./policy-csp-connectivity.md#connectivity-allowphonepclinking)
|
- [Connectivity/AllowPhonePCLinking](./policy-csp-connectivity.md#connectivity-allowphonepclinking)
|
||||||
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-diableprintingoverhttp)
|
- [Connectivity/DiablePrintingOverHTTP](./policy-csp-connectivity.md#connectivity-disableprintingoverhttp)
|
||||||
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
|
- [Connectivity/DisableDownloadingOfPrintDriversOverHTTP](./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp)
|
||||||
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
|
- [Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards](./policy-csp-connectivity.md#connectivity-disableinternetdownloadforwebpublishingandonlineorderingwizards)
|
||||||
- [Connectivity/DisallowNetworkConnectivityActiveTests](./policy-csp-connectivity.md#connectivity-disallownetworkconnectivityactivetests)
|
- [Connectivity/DisallowNetworkConnectivityActiveTests](./policy-csp-connectivity.md#connectivity-disallownetworkconnectivityactivetests)
|
||||||
|
@ -16,7 +16,6 @@ ms.date: 09/16/2019
|
|||||||
|
|
||||||
> [!div class="op_single_selector"]
|
> [!div class="op_single_selector"]
|
||||||
>
|
>
|
||||||
> - [IoT Enterprise](policy-csps-supported-by-iot-enterprise.md)
|
|
||||||
> - [IoT Core](policy-csps-supported-by-iot-core.md)
|
> - [IoT Core](policy-csps-supported-by-iot-core.md)
|
||||||
>
|
>
|
||||||
|
|
||||||
|
@ -1,73 +0,0 @@
|
|||||||
---
|
|
||||||
title: Policies in Policy CSP supported by Windows 10 IoT Enterprise
|
|
||||||
description: Policies in Policy CSP supported by Windows 10 IoT Enterprise
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
ms.author: dansimp
|
|
||||||
ms.topic: article
|
|
||||||
ms.prod: w10
|
|
||||||
ms.technology: windows
|
|
||||||
author: manikadhiman
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 07/18/2019
|
|
||||||
---
|
|
||||||
|
|
||||||
# Policies in Policy CSP supported by Windows 10 IoT Enterprise
|
|
||||||
|
|
||||||
> [!div class="op_single_selector"]
|
|
||||||
>
|
|
||||||
> - [IoT Enterprise](policy-csps-supported-by-iot-enterprise.md)
|
|
||||||
> - [IoT Core](policy-csps-supported-by-iot-core.md)
|
|
||||||
>
|
|
||||||
|
|
||||||
- [InternetExplorer/AllowEnhancedSuggestionsInAddressBar](policy-csp-internetexplorer.md#internetexplorer-allowenhancedsuggestionsinaddressbar)
|
|
||||||
- [InternetExplorer/DisableActiveXVersionListAutoDownload](policy-csp-internetexplorer.md#internetexplorer-disableactivexversionlistautodownload)
|
|
||||||
- [InternetExplorer/DisableCompatView](policy-csp-internetexplorer.md#internetexplorer-disablecompatview)
|
|
||||||
- [InternetExplorer/DisableFeedsBackgroundSync](policy-csp-internetexplorer.md#internetexplorer-disablefeedsbackgroundsync)
|
|
||||||
- [InternetExplorer/DisableGeolocation](policy-csp-internetexplorer.md#internetexplorer-disablegeolocation)
|
|
||||||
- [InternetExplorer/DisableWebAddressAutoComplete](policy-csp-internetexplorer.md#internetexplorer-disablewebaddressautocomplete)
|
|
||||||
- [InternetExplorer/NewTabDefaultPage](policy-csp-internetexplorer.md#internetexplorer-newtabdefaultpage)
|
|
||||||
- [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize)
|
|
||||||
- [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching)
|
|
||||||
- [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost)
|
|
||||||
- [DeliveryOptimization/DOCacheHostSource](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehostsource)
|
|
||||||
- [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp)
|
|
||||||
- [DeliveryOptimization/DODelayForegroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp)
|
|
||||||
- [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground)
|
|
||||||
- [DeliveryOptimization/DODelayCacheServerFallbackForeground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackforeground)
|
|
||||||
- [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode)
|
|
||||||
- [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid)
|
|
||||||
- [DeliveryOptimization/DOGroupIdSource](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource)
|
|
||||||
- [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth)
|
|
||||||
- [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage)
|
|
||||||
- [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize)
|
|
||||||
- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) (deprecated)
|
|
||||||
- [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth)
|
|
||||||
- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) (deprecated)
|
|
||||||
- [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos)
|
|
||||||
- [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload)
|
|
||||||
- [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer)
|
|
||||||
- [DeliveryOptimization/DOMinFileSizeToCache](policy-csp-deliveryoptimization.md#deliveryoptimization-dominfilesizetocache)
|
|
||||||
- [DeliveryOptimization/DOMinRAMAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-dominramallowedtopeer)
|
|
||||||
- [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive)
|
|
||||||
- [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap)
|
|
||||||
- [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth)
|
|
||||||
- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) (deprecated)
|
|
||||||
- [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth)
|
|
||||||
- [DeliveryOptimization/DORestrictPeerSelectionBy](policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby)
|
|
||||||
- [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth)
|
|
||||||
- [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitforegrounddownloadbandwidth)
|
|
||||||
- [DeviceHealthMonitoring/AllowDeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-allowdevicehealthmonitoring)
|
|
||||||
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringScope](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringscope)
|
|
||||||
- [DeviceHealthMonitoring/ConfigDeviceHealthMonitoringUploadDestination](policy-csp-devicehealthmonitoring.md#devicehealthmonitoring-configdevicehealthmonitoringuploaddestination)
|
|
||||||
- [Privacy/LetAppsActivateWithVoice](policy-csp-privacy.md#privacy-letappsactivatewithvoice)
|
|
||||||
- [Privacy/LetAppsActivateWithVoiceAboveLock](policy-csp-privacy.md#privacy-letappsactivatewithvoiceabovelock)
|
|
||||||
- [Update/ConfigureDeadlineForFeatureUpdates](policy-csp-update.md#update-configuredeadlineforfeatureupdates)
|
|
||||||
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
|
|
||||||
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
|
|
||||||
- [Update/ConfigureDeadlineNoAutoReboot](policy-csp-update.md#update-configuredeadlinenoautoreboot)
|
|
||||||
- [Update/SetProxyBehaviorForUpdateDetection](policy-csp-update.md#update-setproxybehaviorforupdatedetection)
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
[Policy CSP](policy-configuration-service-provider.md)
|
|
@ -5303,7 +5303,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<a href="./policy-csp-connectivity.md#connectivity-allowvpnroamingovercellular" id="connectivity-allowvpnroamingovercellular">Connectivity/AllowVPNRoamingOverCellular</a>
|
<a href="./policy-csp-connectivity.md#connectivity-allowvpnroamingovercellular" id="connectivity-allowvpnroamingovercellular">Connectivity/AllowVPNRoamingOverCellular</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-connectivity.md#connectivity-diableprintingoverhttp" id="connectivity-diableprintingoverhttp">Connectivity/DiablePrintingOverHTTP</a>
|
<a href="./policy-csp-connectivity.md#connectivity-disableprintingoverhttp" id="connectivity-disableprintingoverhttp">Connectivity/DiablePrintingOverHTTP</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp" id="connectivity-disabledownloadingofprintdriversoverhttp">Connectivity/DisableDownloadingOfPrintDriversOverHTTP</a>
|
<a href="./policy-csp-connectivity.md#connectivity-disabledownloadingofprintdriversoverhttp" id="connectivity-disabledownloadingofprintdriversoverhttp">Connectivity/DisableDownloadingOfPrintDriversOverHTTP</a>
|
||||||
@ -8567,7 +8567,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [Policies in Policy CSP supported by HoloLens (1st gen) Development Edition](policy-csps-supported-by-hololens-1st-gen-development-edition.md)
|
- [Policies in Policy CSP supported by HoloLens (1st gen) Development Edition](policy-csps-supported-by-hololens-1st-gen-development-edition.md)
|
||||||
|
|
||||||
## Policies in Policy CSP supported by Windows 10 IoT
|
## Policies in Policy CSP supported by Windows 10 IoT
|
||||||
- [Policies in Policy CSP supported by Windows 10 IoT Enterprise](policy-csps-supported-by-iot-enterprise.md)
|
|
||||||
- [Policies in Policy CSP supported by Windows 10 IoT Core](policy-csps-supported-by-iot-core.md)
|
- [Policies in Policy CSP supported by Windows 10 IoT Core](policy-csps-supported-by-iot-core.md)
|
||||||
|
|
||||||
## Policies in Policy CSP supported by Microsoft Surface Hub
|
## Policies in Policy CSP supported by Microsoft Surface Hub
|
||||||
|
@ -14,8 +14,6 @@ manager: dansimp
|
|||||||
|
|
||||||
# Policy CSP - Connectivity
|
# Policy CSP - Connectivity
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policies-->
|
<!--Policies-->
|
||||||
@ -47,7 +45,7 @@ manager: dansimp
|
|||||||
<a href="#connectivity-allowvpnroamingovercellular">Connectivity/AllowVPNRoamingOverCellular</a>
|
<a href="#connectivity-allowvpnroamingovercellular">Connectivity/AllowVPNRoamingOverCellular</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#connectivity-diableprintingoverhttp">Connectivity/DiablePrintingOverHTTP</a>
|
<a href="#connectivity-disableprintingoverhttp">Connectivity/DisablePrintingOverHTTP</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#connectivity-disabledownloadingofprintdriversoverhttp">Connectivity/DisableDownloadingOfPrintDriversOverHTTP</a>
|
<a href="#connectivity-disabledownloadingofprintdriversoverhttp">Connectivity/DisableDownloadingOfPrintDriversOverHTTP</a>
|
||||||
@ -595,7 +593,7 @@ The following list shows the supported values:
|
|||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="connectivity-diableprintingoverhttp"></a>**Connectivity/DiablePrintingOverHTTP**
|
<a href="" id="connectivity-disableprintingoverhttp"></a>**Connectivity/DisablePrintingOverHTTP**
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
<!--SupportedSKUs-->
|
||||||
<table>
|
<table>
|
||||||
@ -656,7 +654,7 @@ Also, see the "Web-based printing" policy setting in Computer Configuration/Admi
|
|||||||
>
|
>
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||||
>
|
>
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
> The payload of the SyncML must be XML-encoded; for this XML encoding, there is a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
<!--ADMXBacked-->
|
<!--ADMXBacked-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -730,7 +728,7 @@ If you disable or do not configure this policy setting, users can download print
|
|||||||
>
|
>
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||||
>
|
>
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
> The payload of the SyncML must be XML-encoded; for this XML encoding, there is a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
<!--ADMXBacked-->
|
<!--ADMXBacked-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -804,7 +802,7 @@ See the documentation for the web publishing and online ordering wizards for mor
|
|||||||
>
|
>
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||||
>
|
>
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
> The payload of the SyncML must be XML-encoded; for this XML encoding, there is a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
<!--ADMXBacked-->
|
<!--ADMXBacked-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -933,7 +931,7 @@ If you enable this policy, Windows only allows access to the specified UNC paths
|
|||||||
>
|
>
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||||
>
|
>
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
> The payload of the SyncML must be XML-encoded; for this XML encoding, there is a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
<!--ADMXBacked-->
|
<!--ADMXBacked-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -1005,7 +1003,7 @@ If you disable this setting or do not configure it, the user will be able to cre
|
|||||||
>
|
>
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
||||||
>
|
>
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
> The payload of the SyncML must be XML-encoded; for this XML encoding, there is a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
||||||
|
|
||||||
<!--ADMXBacked-->
|
<!--ADMXBacked-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -1016,6 +1014,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/ADMXBacked-->
|
<!--/ADMXBacked-->
|
||||||
<!--/Policy-->
|
<!--/Policy-->
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
Footnotes:
|
Footnotes:
|
||||||
@ -1028,6 +1027,6 @@ Footnotes:
|
|||||||
- 6 - Available in Windows 10, version 1903.
|
- 6 - Available in Windows 10, version 1903.
|
||||||
- 7 - Available in Windows 10, version 1909.
|
- 7 - Available in Windows 10, version 1909.
|
||||||
- 8 - Available in Windows 10, version 2004.
|
- 8 - Available in Windows 10, version 2004.
|
||||||
|
- 9 - Available in Windows 10, version 2009.
|
||||||
|
|
||||||
<!--/Policies-->
|
<!--/Policies-->
|
||||||
|
|
||||||
|
@ -45,7 +45,7 @@ Specifies the settings you can configure when joining a device to a domain, incl
|
|||||||
| --- | --- | --- |
|
| --- | --- | --- |
|
||||||
| Account | string | Account to use to join computer to domain |
|
| Account | string | Account to use to join computer to domain |
|
||||||
| AccountOU | Enter the full path for the organizational unit. For example: OU=testOU,DC=domain,DC=Domain,DC=com. | Name of organizational unit for the computer account |
|
| AccountOU | Enter the full path for the organizational unit. For example: OU=testOU,DC=domain,DC=Domain,DC=com. | Name of organizational unit for the computer account |
|
||||||
| ComputerName | Specify a unique name for the domain-joined computers using %RAND:x%, where x is an integer that includes fewer than 15 digits, or using %SERIAL% characters in the name.</br></br>ComputerName is a string with a maximum length of 15 bytes of content:</br></br>- ComputerName can use ASCII characters (1 byte each) and/or multi-byte characters such as Kanji, so long as you do not exceed 15 bytes of content.</br></br>- ComputerName cannot use spaces or any of the following characters: \{ | \} ~ \[ \\ \] ^ ' : ; < = > ? @ ! " \# $ % ` \( \) + / . , \* &, or contain any spaces.</br></br>- ComputerName cannot use some non-standard characters, such as emoji.</br></br> Computer names that cannot be validated through the DnsValidateName function cannot be used, for example, computer names that only contain numbers (0-9). For more information, see the [DnsValidateName function](https://go.microsoft.com/fwlink/?LinkId=257040). | Specifies the name of the Windows device (computer name on PCs) |
|
| ComputerName | On desktop PCs, this setting specifies the DNS hostname of the computer (Computer Name) up to 63 characters. Use `%RAND:x%` to generate x number of random digits in the name, where x must be a number less than 63. For domain-joined computers, the unique name must use `%RAND:x%`. Use `%SERIAL%` to generate the name with the `computer's` serial number embedded. If the serial number exceeds the character limit, it will be truncated from the beginning of the sequence. The character restriction limit does not count the length of the macros, `%RAND:x%` and `%SERIAL%`. This setting is supported only in Windows 10, version 1803 and later. To change this setting in Windows 10, version 1709 and earlier releases, use the **ComputerName** setting under **Accounts**. | Specifies the name of the Windows device (computer name on PCs) |
|
||||||
| DomainName | string (cannot be empty) | Specify the name of the domain that the device will join |
|
| DomainName | string (cannot be empty) | Specify the name of the domain that the device will join |
|
||||||
| Password | string (cannot be empty) | Corresponds to the password of the user account that's authorized to join the computer account to the domain. |
|
| Password | string (cannot be empty) | Corresponds to the password of the user account that's authorized to join the computer account to the domain. |
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Volume-licensed media is available for each release of Windows 10 in the Volume
|
|||||||
|
|
||||||
## Dynamic Update
|
## Dynamic Update
|
||||||
|
|
||||||
Whenever installation of a feature update starts (whether from media or an environment connected to Windows Update), *Dynamic Update* is one of the first steps. Windows 10 Setup contacts a Microsoft endpoint to fetch Dynamic Update packages, and then applies those updates to your operating system installation media. The update packages includes the following kinds of updates:
|
Whenever installation of a feature update starts (whether from media or an environment connected to Windows Update), *Dynamic Update* is one of the first steps. Windows 10 Setup contacts a Microsoft endpoint to fetch Dynamic Update packages, and then applies those updates to your operating system installation media. The update packages include the following kinds of updates:
|
||||||
|
|
||||||
- Updates to Setup.exe binaries or other files that Setup uses for feature updates
|
- Updates to Setup.exe binaries or other files that Setup uses for feature updates
|
||||||
- Updates for the "safe operating system" (SafeOS) that is used for the Windows recovery environment
|
- Updates for the "safe operating system" (SafeOS) that is used for the Windows recovery environment
|
||||||
@ -44,9 +44,9 @@ You can obtain Dynamic Update packages from the [Microsoft Update Catalog](https
|
|||||||
|
|
||||||
The various Dynamic Update packages might not all be present in the results from a single search, so you might have to search with different keywords to find all of the updates. And you'll need to check various parts of the results to be sure you've identified the needed files. This table shows in **bold** the key items to search for or look for in the results. For example, to find the relevant "Setup Dynamic Update," you'll have to check the detailed description for the download by selecting the link in the **Title** column of the search results.
|
The various Dynamic Update packages might not all be present in the results from a single search, so you might have to search with different keywords to find all of the updates. And you'll need to check various parts of the results to be sure you've identified the needed files. This table shows in **bold** the key items to search for or look for in the results. For example, to find the relevant "Setup Dynamic Update," you'll have to check the detailed description for the download by selecting the link in the **Title** column of the search results.
|
||||||
|
|
||||||
|To find this Dynamic Update packages, search for or check the results here--> |Title |Product |Description (select the **Title** link to see **Details**) |
|
|To find this Dynamic Update packages, search for or check the results here |Title |Product |Description (select the **Title** link to see **Details**) |
|
||||||
|---------|---------|---------|---------|
|
|---------|---------|---------|---------|
|
||||||
|Safe OS Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update,Windows **Safe OS Dynamic Update** | ComponentUpdate: |
|
|Safe OS Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update, Windows **Safe OS Dynamic Update** | ComponentUpdate: |
|
||||||
|Setup Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update | **SetupUpdate** |
|
|Setup Dynamic Update | 2019-08 Dynamic Update... | Windows 10 Dynamic Update | **SetupUpdate** |
|
||||||
|Latest cumulative update | 2019-08 **Cumulative Update for Windows 10** | Windows 10 | Install this update to resolve issues in Windows... |
|
|Latest cumulative update | 2019-08 **Cumulative Update for Windows 10** | Windows 10 | Install this update to resolve issues in Windows... |
|
||||||
|Servicing stack Dynamic Update | 2019-09 **Servicing Stack Update for Windows 10** | Windows 10... | Install this update to resolve issues in Windows... |
|
|Servicing stack Dynamic Update | 2019-09 **Servicing Stack Update for Windows 10** | Windows 10... | Install this update to resolve issues in Windows... |
|
||||||
@ -81,6 +81,9 @@ This table shows the correct sequence for applying the various tasks to the file
|
|||||||
|Add .NET and .NET cumulative updates | | | 24 |
|
|Add .NET and .NET cumulative updates | | | 24 |
|
||||||
|Export image | 8 | 17 | 25 |
|
|Export image | 8 | 17 | 25 |
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Starting in February 2021, the latest cumulative update and servicing stack update will be combined and distributed in the Microsoft Update Catalog as a new combined cumulative update. For Steps 1, 9, and 18 that require the servicing stack update for updating the installation media, you should use the combined cumulative update. For more information on the combined cumulative update, see [Servicing stack updates](https://docs.microsoft.com/windows/deployment/update/servicing-stack-updates).
|
||||||
|
|
||||||
### Multiple Windows editions
|
### Multiple Windows editions
|
||||||
|
|
||||||
The main operating system file (install.wim) contains multiple editions of Windows 10. It’s possible that only an update for a given edition is required to deploy it, based on the index. Or, it might be that all editions need an update. Further, ensure that languages are installed before Features on Demand, and the latest cumulative update is always applied last.
|
The main operating system file (install.wim) contains multiple editions of Windows 10. It’s possible that only an update for a given edition is required to deploy it, based on the index. Or, it might be that all editions need an update. Further, ensure that languages are installed before Features on Demand, and the latest cumulative update is always applied last.
|
||||||
|
@ -29,8 +29,6 @@ Servicing stack updates provide fixes to the servicing stack, the component that
|
|||||||
|
|
||||||
Servicing stack updates improve the reliability of the update process to mitigate potential issues while installing the latest quality updates and feature updates. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes.
|
Servicing stack updates improve the reliability of the update process to mitigate potential issues while installing the latest quality updates and feature updates. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes.
|
||||||
|
|
||||||
For information about some changes to servicing stack updates, see [Simplifing Deployment of Servicing Stack Updates](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/simplifying-on-premises-deployment-of-servicing-stack-updates/ba-p/1646039) on the Windows IT Pro blog.
|
|
||||||
|
|
||||||
## When are they released?
|
## When are they released?
|
||||||
|
|
||||||
Servicing stack update are released depending on new issues or vulnerabilities. In rare occasions a servicing stack update may need to be released on demand to address an issue impacting systems installing the monthly security update. Starting in November 2018 new servicing stack updates will be classified as "Security" with a severity rating of "Critical."
|
Servicing stack update are released depending on new issues or vulnerabilities. In rare occasions a servicing stack update may need to be released on demand to address an issue impacting systems installing the monthly security update. Starting in November 2018 new servicing stack updates will be classified as "Security" with a severity rating of "Critical."
|
||||||
@ -44,7 +42,6 @@ Both Windows 10 and Windows Server use the cumulative update mechanism, in which
|
|||||||
|
|
||||||
Servicing stack updates must ship separately from the cumulative updates because they modify the component that installs Windows updates. The servicing stack is released separately because the servicing stack itself requires an update. For example, the cumulative update [KB4284880](https://support.microsoft.com/help/4284880/windows-10-update-kb4284880) requires the [May 17, 2018 servicing stack update](https://support.microsoft.com/help/4132216), which includes updates to Windows Update.
|
Servicing stack updates must ship separately from the cumulative updates because they modify the component that installs Windows updates. The servicing stack is released separately because the servicing stack itself requires an update. For example, the cumulative update [KB4284880](https://support.microsoft.com/help/4284880/windows-10-update-kb4284880) requires the [May 17, 2018 servicing stack update](https://support.microsoft.com/help/4132216), which includes updates to Windows Update.
|
||||||
|
|
||||||
|
|
||||||
## Is there any special guidance?
|
## Is there any special guidance?
|
||||||
|
|
||||||
Microsoft recommends you install the latest servicing stack updates for your operating system before installing the latest cumulative update.
|
Microsoft recommends you install the latest servicing stack updates for your operating system before installing the latest cumulative update.
|
||||||
@ -58,3 +55,7 @@ Typically, the improvements are reliability and performance improvements that do
|
|||||||
* Servicing stack update releases are specific to the operating system version (build number), much like quality updates.
|
* Servicing stack update releases are specific to the operating system version (build number), much like quality updates.
|
||||||
* Search to install latest available [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001).
|
* Search to install latest available [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001).
|
||||||
* Once a servicing stack update is installed, it cannot be removed or uninstalled from the machine.
|
* Once a servicing stack update is installed, it cannot be removed or uninstalled from the machine.
|
||||||
|
|
||||||
|
## Simplifying on-premises deployment of servicing stack updates
|
||||||
|
|
||||||
|
With the Windows Update experience, servicing stack updates and cumulative updates are deployed together to the device. The update stack automatically orchestrates the installation, so both are applied correctly. Starting in February 2021, the cumulative update will include the latest servicing stack updates, to provide a single cumulative update payload to both Windows Server Update Services (WSUS) and Microsoft Catalog. If you use an endpoint management tool backed by WSUS, such as Configuration Manager, you will only have to select and deploy the monthly cumulative update. The latest servicing stack updates will automatically be applied correctly. Release notes and file information for cumulative updates, including those related to the servicing stack, will be in a single KB article. The combined monthly cumulative update will be available on Windows 10, version 2004 and later starting with the 2021 2C release, KB4601382.
|
||||||
|
@ -64,10 +64,10 @@ To find your CommercialID within Azure:
|
|||||||
|
|
||||||
## Enroll devices in Update Compliance
|
## Enroll devices in Update Compliance
|
||||||
|
|
||||||
Once you've added Update Compliance to a workspace in your Azure subscription, you'll need to configure any devices you want to monitor. There are two ways to configure devices to use Update Compliance.
|
Once you've added Update Compliance to a workspace in your Azure subscription, you'll need to configure any devices you want to monitor. There are two ways to configure devices to use Update Compliance. After you configure devices, it can take up to 72 hours before devices are visible in the solution. Until then, Update Compliance will indicate it is still assessing devices.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> After configuring devices via one of the two methods below, it can take up to 72 hours before devices are visible in the solution. Until then, Update Compliance will indicate it is still assessing devices.
|
> If you use or plan to use [Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview), follow the steps in [Enroll devices in Desktop Analytics](https://docs.microsoft.com/mem/configmgr/desktop-analytics/enroll-devices) to also enroll devices in Update Compliance. You should be aware that the Commercial ID and Log Analytics workspace must be the same for both Desktop Analytics and Update Compliance.
|
||||||
|
|
||||||
### Configure devices using the Update Compliance Configuration Script
|
### Configure devices using the Update Compliance Configuration Script
|
||||||
|
|
||||||
|
@ -29,6 +29,9 @@ ms.topic: article
|
|||||||
>- Windows Server 2012
|
>- Windows Server 2012
|
||||||
>- Windows Server 2016
|
>- Windows Server 2016
|
||||||
>- Windows Server 2019
|
>- Windows Server 2019
|
||||||
|
>- Office 2013*
|
||||||
|
>- Office 2016*
|
||||||
|
>- Office 2019*
|
||||||
|
|
||||||
**Looking for retail activation?**
|
**Looking for retail activation?**
|
||||||
|
|
||||||
@ -47,9 +50,9 @@ The process proceeds as follows:
|
|||||||
- Install the Volume Activation Services server role on a domain controller and add a KMS host key by using the Volume Activation Tools Wizard.
|
- Install the Volume Activation Services server role on a domain controller and add a KMS host key by using the Volume Activation Tools Wizard.
|
||||||
- Extend the domain to the Windows Server 2012 R2 or higher schema level, and add a KMS host key by using the VAMT.
|
- Extend the domain to the Windows Server 2012 R2 or higher schema level, and add a KMS host key by using the VAMT.
|
||||||
|
|
||||||
1. Microsoft verifies the KMS host key, and an activation object is created.
|
2. Microsoft verifies the KMS host key, and an activation object is created.
|
||||||
|
|
||||||
1. Client computers are activated by receiving the activation object from a domain controller during startup.
|
3. Client computers are activated by receiving the activation object from a domain controller during startup.
|
||||||
|
|
||||||
> [!div class="mx-imgBorder"]
|
> [!div class="mx-imgBorder"]
|
||||||
> 
|
> 
|
||||||
@ -73,33 +76,33 @@ When a reactivation event occurs, the client queries AD DS for the activation o
|
|||||||
|
|
||||||
1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller.
|
1. Use an account with Domain Administrator and Enterprise Administrator credentials to sign in to a domain controller.
|
||||||
|
|
||||||
1. Launch Server Manager.
|
2. Launch Server Manager.
|
||||||
|
|
||||||
1. Add the Volume Activation Services role, as shown in Figure 11.
|
3. Add the Volume Activation Services role, as shown in Figure 11.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 11**. Adding the Volume Activation Services role
|
**Figure 11**. Adding the Volume Activation Services role
|
||||||
|
|
||||||
1. Click the link to launch the Volume Activation Tools (Figure 12).
|
4. Click the link to launch the Volume Activation Tools (Figure 12).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 12**. Launching the Volume Activation Tools
|
**Figure 12**. Launching the Volume Activation Tools
|
||||||
|
|
||||||
1. Select the **Active Directory-Based Activation** option (Figure 13).
|
5. Select the **Active Directory-Based Activation** option (Figure 13).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 13**. Selecting Active Directory-Based Activation
|
**Figure 13**. Selecting Active Directory-Based Activation
|
||||||
|
|
||||||
1. Enter your KMS host key and (optionally) a display name (Figure 14).
|
6. Enter your KMS host key and (optionally) a display name (Figure 14).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Figure 14**. Entering your KMS host key
|
**Figure 14**. Entering your KMS host key
|
||||||
|
|
||||||
1. Activate your KMS host key by phone or online (Figure 15).
|
7. Activate your KMS host key by phone or online (Figure 15).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -115,23 +118,18 @@ When a reactivation event occurs, the client queries AD DS for the activation o
|
|||||||
>
|
>
|
||||||
> - [Office 2019 VL pack](https://www.microsoft.com/download/details.aspx?id=57342)
|
> - [Office 2019 VL pack](https://www.microsoft.com/download/details.aspx?id=57342)
|
||||||
|
|
||||||
1. After activating the key, click **Commit**, and then click **Close**.
|
8. After activating the key, click **Commit**, and then click **Close**.
|
||||||
|
|
||||||
## Verifying the configuration of Active Directory-based activation
|
## Verifying the configuration of Active Directory-based activation
|
||||||
|
|
||||||
To verify your Active Directory-based activation configuration, complete the following steps:
|
To verify your Active Directory-based activation configuration, complete the following steps:
|
||||||
|
|
||||||
1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing.
|
1. After you configure Active Directory-based activation, start a computer that is running an edition of Windows that is configured by volume licensing.
|
||||||
|
2. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key.
|
||||||
1. If the computer has been previously configured with a MAK key, replace the MAK key with the GVLK by running the **slmgr.vbs /ipk** command and specifying the GLVK as the new product key.
|
3. If the computer is not joined to your domain, join it to the domain.
|
||||||
|
4. Sign in to the computer.
|
||||||
1. If the computer is not joined to your domain, join it to the domain.
|
5. Open Windows Explorer, right-click **Computer**, and then click **Properties**.
|
||||||
|
6. Scroll down to the **Windows activation** section, and verify that this client has been activated.
|
||||||
1. Sign in to the computer.
|
|
||||||
|
|
||||||
1. Open Windows Explorer, right-click **Computer**, and then click **Properties**.
|
|
||||||
|
|
||||||
1. Scroll down to the **Windows activation** section, and verify that this client has been activated.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you are using both KMS and Active Directory-based activation, it may be difficult to see whether a client has been activated by KMS or by Active Directory-based activation. Consider disabling KMS during the test, or make sure that you are using a client computer that has not already been activated by KMS. The **slmgr.vbs /dlv** command also indicates whether KMS has been used.
|
> If you are using both KMS and Active Directory-based activation, it may be difficult to see whether a client has been activated by KMS or by Active Directory-based activation. Consider disabling KMS during the test, or make sure that you are using a client computer that has not already been activated by KMS. The **slmgr.vbs /dlv** command also indicates whether KMS has been used.
|
||||||
|
@ -237,11 +237,11 @@ After the VM restarts, during OOBE, it's fine to select **Set up for personal us
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Once the installation is complete, sign in and verify that you are at the Windows 10 desktop, then create your first Hyper-V checkpoint. Checkpoints are used to restore the VM to a previous state. You will create multiple checkpoints throughout this lab, which can be used later to go through the process again.
|
Once the installation is complete, sign in and verify that you are at the Windows 10 desktop, then create your first Hyper-V checkpoint. Checkpoints are used to restore the VM to a previous state.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
To create your first checkpoint, open an elevated Windows PowerShell prompt on the computer running Hyper-V (not on the VM) and run the following:
|
To create a checkpoint, open an elevated Windows PowerShell prompt on the computer running Hyper-V (not on the VM) and run the following:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Checkpoint-VM -Name WindowsAutopilot -SnapshotName "Finished Windows install"
|
Checkpoint-VM -Name WindowsAutopilot -SnapshotName "Finished Windows install"
|
||||||
@ -573,9 +573,9 @@ Soon after reaching the desktop, the device should show up in Intune as an **ena
|
|||||||
Once you select a language and a keyboard layout, your company branded sign-in screen should appear. Provide your Azure Active Directory credentials and you're all done.
|
Once you select a language and a keyboard layout, your company branded sign-in screen should appear. Provide your Azure Active Directory credentials and you're all done.
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> If you recieve a message that "Something went wrong" and it "Looks like we can't connect to the URL for your organization's MDM terms of use" then verify you have correctly [assigned licenses](https://docs.microsoft.com/mem/intune/fundamentals/licenses-assign) to the current user.
|
> If you receive a message that "Something went wrong" and it "Looks like we can't connect to the URL for your organization's MDM terms of use", verify that you have correctly [assigned licenses](https://docs.microsoft.com/mem/intune/fundamentals/licenses-assign) to the current user.
|
||||||
|
|
||||||
Windows Autopilot will now take over to automatically join your device into Azure Active Directory and enroll it to Microsoft Intune. Use the checkpoints you've created to go through this process again with different settings.
|
Windows Autopilot will now take over to automatically join your device into Azure Active Directory and enroll it to Microsoft Intune. Use the checkpoint you've created to go through this process again with different settings.
|
||||||
|
|
||||||
## Remove devices from Autopilot
|
## Remove devices from Autopilot
|
||||||
|
|
||||||
|
@ -0,0 +1,209 @@
|
|||||||
|
---
|
||||||
|
title: Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
description: Learn how to deploy certificates to a Key Trust user to enable remote desktop with supplied credentials
|
||||||
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security, mobile
|
||||||
|
audience: ITPro
|
||||||
|
author: mapalko
|
||||||
|
ms.author: mapalko
|
||||||
|
manager: dansimp
|
||||||
|
ms.collection: M365-identity-device-management
|
||||||
|
ms.topic: article
|
||||||
|
localizationpriority: medium
|
||||||
|
ms.date: 02/22/2021
|
||||||
|
ms.reviewer:
|
||||||
|
---
|
||||||
|
|
||||||
|
# Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
|
||||||
|
**Applies To**
|
||||||
|
|
||||||
|
- Windows 10, version 1703 or later
|
||||||
|
- Hybrid deployment
|
||||||
|
- Key trust
|
||||||
|
|
||||||
|
Windows Hello for Business supports using a certificate as the supplied credential when establishing a remote desktop connection to a server or other device. For certificate trust deployments, creation of this certificate occurs at container creation time.
|
||||||
|
|
||||||
|
This document discusses an approach for key trust deployments where authentication certificates can be deployed to an existing key trust user.
|
||||||
|
|
||||||
|
Three approaches are documented here:
|
||||||
|
|
||||||
|
1. Deploying a certificate to hybrid joined devices using an on-premises Active Directory certificate enrollment policy.
|
||||||
|
|
||||||
|
1. Deploying a certificate to hybrid or Azure AD joined devices using Simple Certificate Enrollment Protocol (SCEP) and Intune.
|
||||||
|
|
||||||
|
1. Working with non-Microsoft enterprise certificate authorities.
|
||||||
|
|
||||||
|
## Deploying a certificate to a hybrid joined device using an on-premises Active Directory Certificate enrollment policy
|
||||||
|
|
||||||
|
### Create a Windows Hello for Business certificate template
|
||||||
|
|
||||||
|
1. Sign in to your issuing certificate authority (CA).
|
||||||
|
|
||||||
|
1. Open the **Certificate Authority** Console (%windir%\system32\certsrv.msc).
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, expand **Certification Authority (Local)**, and then expand your CA within the Certification Authority list.
|
||||||
|
|
||||||
|
1. Right-click **Certificate Templates** and then click **Manage** to open the **Certificate Templates** console.
|
||||||
|
|
||||||
|
1. Right-click the **Smartcard Logon** template and click **Duplicate Template**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. On the **Compatibility** tab:
|
||||||
|
1. Clear the **Show resulting changes** check box
|
||||||
|
1. Select **Windows Server 2012 or Windows Server 2012 R2** from the Certification Authority list
|
||||||
|
1. Select **Windows Server 2012 or Windows Server 2012 R2** from the Certification Recipient list
|
||||||
|
|
||||||
|
1. On the **General** tab:
|
||||||
|
1. Specify a Template display name, such as **WHfB Certificate Authentication**
|
||||||
|
1. Set the validity period to the desired value
|
||||||
|
1. Take note of the Template name for later, which should be the same as the Template display name minus spaces (**WHfBCertificateAuthentication** in this example).
|
||||||
|
|
||||||
|
1. On the **Extensions** tab, verify the **Application Policies** extension includes **Smart Card Logon**.
|
||||||
|
|
||||||
|
1. On the **Subject Name** tab:
|
||||||
|
1. Select the **Build from this Active Directory** information button if it is not already selected
|
||||||
|
1. Select **Fully distinguished name** from the **Subject name format** list if Fully distinguished name is not already selected
|
||||||
|
1. Select the **User Principal Name (UPN)** check box under **Include this information in alternative subject name**
|
||||||
|
1. On the **Request Handling** tab:
|
||||||
|
1. Select the **Renew with same key** check box
|
||||||
|
1. Set the Purpose to **Signature and smartcard logon**
|
||||||
|
1. Click **Yes** when prompted to change the certificate purpose
|
||||||
|
1. Click **Prompt the user during enrollment**
|
||||||
|
|
||||||
|
1. On the **Cryptography** tab:
|
||||||
|
1. Set the Provider Category to **Key Storage Provider**
|
||||||
|
1. Set the Algorithm name to **RSA**
|
||||||
|
1. Set the minimum key size to **2048**
|
||||||
|
1. Select **Requests must use one of the following providers**
|
||||||
|
1. Tick **Microsoft Software Key Storage Provider**
|
||||||
|
1. Set the Request hash to **SHA256**
|
||||||
|
|
||||||
|
1. On the **Security** tab, add the security group that you want to give **Enroll** access to. For example, if you want to give access to all users, select the **Authenticated** users group, and then select Enroll permissions for them .
|
||||||
|
|
||||||
|
1. Click **OK** to finalize your changes and create the new template. Your new template should now appear in the list of Certificate Templates.
|
||||||
|
|
||||||
|
1. Close the Certificate Templates console.
|
||||||
|
|
||||||
|
1. Open an elevated command prompt and change to a temporary working directory.
|
||||||
|
|
||||||
|
1. Execute the following command:
|
||||||
|
|
||||||
|
certutil -dstemplate \<TemplateName\> \> \<TemplateName\>.txt
|
||||||
|
|
||||||
|
Replace \<TemplateName\> with the Template name you took note of earlier in step 7.
|
||||||
|
|
||||||
|
1. Open the text file created by the command above.
|
||||||
|
1. Delete the last line of the output from the file that reads **CertUtil: -dsTemplate command completed successfully.**
|
||||||
|
1. Modify the line that reads **pKIDefaultCSPs = "1,Microsoft Software Key Storage Provider"** to **pKIDefaultCSPs = "1,Microsoft Passport Key Storage Provider"**
|
||||||
|
|
||||||
|
1. Save the text file.
|
||||||
|
|
||||||
|
1. Update the certificate template by executing the following command:
|
||||||
|
|
||||||
|
certutil - dsaddtemplate \<TemplateName\>.txt
|
||||||
|
|
||||||
|
1. In the Certificate Authority console, right-click **Certificate Templates**, select **New**, and select **Certificate Template to Issue**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. From the list of templates, select the template you previously created (**WHFB Certificate Authentication**) and click **OK**. It can take some time for the template to replicate to all servers and become available in this list.
|
||||||
|
|
||||||
|
1. After the template replicates, in the MMC, right-click in the Certification Authority list, click **All Tasks** and then click **Stop Service**. Right-click the name of the CA again, click **All Tasks**, and then click **Start Service**.
|
||||||
|
|
||||||
|
### Requesting a Certificate
|
||||||
|
|
||||||
|
1. Ensure the hybrid Azure AD joined device has network line of sight to Active Directory domain controllers and the issuing certificate authority.
|
||||||
|
|
||||||
|
1. Start the **Certificates – Current User** console (%windir%\system32\certmgr.msc).
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, right-click **Personal**, click **All Tasks**, and then click **Request New Certificate…**
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. On the Certificate Enrollment screen, click **Next**.
|
||||||
|
|
||||||
|
1. Under Select Certificate Enrollment Policy, ensure **Active Directory Enrollment Policy** is selected and then click **Next**.
|
||||||
|
|
||||||
|
1. Under Request Certificates, click the check-box next to the certificate template you created in the previous section (WHfB Certificate Authentication) and then click **Enroll**.
|
||||||
|
|
||||||
|
1. After a successful certificate request, click Finish on the Certificate Installation Results screen
|
||||||
|
|
||||||
|
## Deploying a certificate to Hybrid or Azure AD Joined Devices using Simple Certificate Enrollment Protocol (SCEP) via Intune
|
||||||
|
|
||||||
|
Deploying a certificate to Azure AD Joined Devices may be achieved with the Simple Certificate Enrollment Protocol (SCEP) via Intune. For guidance deploying the required infrastructure, refer to [Configure infrastructure to support SCEP certificate profiles with Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificates-scep-configure).
|
||||||
|
|
||||||
|
Next you should deploy the root CA certificate (and any other intermediate certificate authority certificates) to Azure AD Joined Devices using a Trusted root certificate profile with Intune. For guidance, refer to [Create trusted certificate profiles in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificates-trusted-root).
|
||||||
|
|
||||||
|
Once these requirements have been met, a new device configuration profile may be configured from Intune that provisions a certificate for the user of the device. Proceed as follows:
|
||||||
|
|
||||||
|
1. Sign in to the Microsoft [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||||
|
|
||||||
|
1. Navigate to Devices \> Configuration Profiles \> Create profile.
|
||||||
|
|
||||||
|
1. Enter the following properties:
|
||||||
|
1. For Platform, select **Windows 10 and later**.
|
||||||
|
1. For Profile, select **SCEP Certificate**.
|
||||||
|
1. Click **Create**.
|
||||||
|
|
||||||
|
1. In **Basics**, enter the following parameters:
|
||||||
|
1. **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is SCEP profile for entire company.
|
||||||
|
1. **Description**: Enter a description for the profile. This setting is optional, but recommended.
|
||||||
|
1. Select **Next**.
|
||||||
|
|
||||||
|
1. In the **Configuration settings**, complete the following:
|
||||||
|
1. For Certificate Type, choose **User**.
|
||||||
|
1. For Subject name format, set it to **CN={{UserPrincipalName}}**.
|
||||||
|
1. Under Subject alternative name, select **User principal name (UPN)** from the drop-down menu and set the value to **CN={{UserPrincipalName}}**.
|
||||||
|
1. For Certificate validity period, set a value of your choosing.
|
||||||
|
1. For Key storage provider (KSP), choose **Enroll to Windows Hello for Business, otherwise fail (Windows 10 and later)**.
|
||||||
|
1. For Key usage, choose **Digital Signature**.
|
||||||
|
1. For Key size (bits), choose **2048**.
|
||||||
|
1. For Hash algorithm, choose **SHA-2**.
|
||||||
|
1. Under Root Certificate, click **+Root Certificate** and select the trusted certificate profile you created earlier for the Root CA Certificate.
|
||||||
|
1. Under Extended key usage, add the following:
|
||||||
|
|
||||||
|
| Name | Object Identifier | Predefined Values |
|
||||||
|
|------|-------------------|-------------------|
|
||||||
|
| Smart Card Logon | 1.3.6.1.4.1.311.20.2.2 | Smart Card Logon |
|
||||||
|
| Client Authentication | 1.3.6.1.5.5.7.3.2 | Client Authentication |
|
||||||
|
|
||||||
|
1. For Renewal threshold (%), set a value of your choosing.
|
||||||
|
1. For SCEP Server URLs, provide the public endpoint that you configured during the deployment of your SCEP infrastructure.
|
||||||
|
1. Click **Next**
|
||||||
|
1. In Assignments, target the devices or users who should receive a certificate and click **Next**
|
||||||
|
|
||||||
|
1. In Applicability Rules, provide additional issuance restrictions if required and click **Next**
|
||||||
|
|
||||||
|
1. In Review + create, click **Create**
|
||||||
|
|
||||||
|
Once the configuration profile has been created, targeted clients will receive the profile from Intune on their next refresh cycle. You should find a new certificate in the user store. To validate the certificate is present, do the following steps:
|
||||||
|
|
||||||
|
1. Open the Certificates - Current User console (%windir%\system32\certmgr.msc)
|
||||||
|
|
||||||
|
1. In the left pane of the MMC, expand **Personal** and select **Certificates**
|
||||||
|
|
||||||
|
1. In the right-hand pane of the MMC, check for the new certificate
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This infrastructure may also deploy the same certificates to co-managed or modern-managed Hybrid AAD-Joined devices using Intune Policies.
|
||||||
|
|
||||||
|
## Using non-Microsoft Enterprise Certificate Authorities
|
||||||
|
|
||||||
|
If you are using a Public Key Infrastructure that uses non-Microsoft services, the certificate templates published to the on-premises Active Directory may not be available. For guidance with integration of Intune/SCEP with non-Microsoft PKI deployments, refer to [Use third-party certification authorities (CA) with SCEP in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/certificate-authority-add-scep-overview).
|
||||||
|
|
||||||
|
As an alternative to using SCEP or if none of the previously covered solutions will work in your environment, you can manually generate Certificate Signing Requests (CSR) for submission to your PKI. To assist with this approach, you can use the [Generate-CertificateRequest](https://www.powershellgallery.com/packages/Generate-CertificateRequest) PowerShell commandlet.
|
||||||
|
|
||||||
|
The Generate-CertificateRequest commandlet will generate an .inf file for a pre-existing Windows Hello for Business key. The .inf can be used to generate a certificate request manually using certreq.exe. The commandlet will also generate a .req file, which can be submitted to your PKI for a certificate.
|
||||||
|
|
||||||
|
## RDP Sign-in with Windows Hello for Business Certificate Authentication
|
||||||
|
|
||||||
|
After adding the certificate using an approach from any of the previous sections, you should be able to RDP to any Windows device or server in the same Forest as the user’s on-premises Active Directory account, provided the PKI certificate chain for the issuing certificate authority is deployed to that target server.
|
||||||
|
|
||||||
|
1. Open the Remote Desktop Client (%windir%\system32\mstsc.exe) on the Hybrid AAD-Joined client where the authentication certificate has been deployed.
|
||||||
|
1. Attempt an RDP session to a target server.
|
||||||
|
1. Use the certificate credential protected by your Windows Hello for Business gesture.
|
@ -65,7 +65,7 @@ If the error occurs again, check the error code against the following table to s
|
|||||||
| 0x801C03EA | Server failed to authorize user or device. | Check if the token is valid and user has permission to register Windows Hello for Business keys. |
|
| 0x801C03EA | Server failed to authorize user or device. | Check if the token is valid and user has permission to register Windows Hello for Business keys. |
|
||||||
| 0x801C03EB | Server response http status is not valid | Sign out and then sign in again. |
|
| 0x801C03EB | Server response http status is not valid | Sign out and then sign in again. |
|
||||||
| 0x801C03EC | Unhandled exception from server. | sign out and then sign in again. |
|
| 0x801C03EC | Unhandled exception from server. | sign out and then sign in again. |
|
||||||
| 0x801C03ED | Multi-factor authentication is required for a 'ProvisionKey' operation, but was not performed. <br><br> -or- <br><br> Token was not found in the Authorization header. <br><br> -or- <br><br> Failed to read one or more objects. <br><br> -or- <br><br> The request sent to the server was invalid. | Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure Active Directory (Azure AD) and rejoin.
|
| 0x801C03ED | Multi-factor authentication is required for a 'ProvisionKey' operation, but was not performed. <br><br> -or- <br><br> Token was not found in the Authorization header. <br><br> -or- <br><br> Failed to read one or more objects. <br><br> -or- <br><br> The request sent to the server was invalid. <br><br> -or- <br><br> User does not have permissions to join to Azure AD. | Sign out and then sign in again. If that doesn't resolve the issue, unjoin the device from Azure AD and rejoin. <br> Allow user(s) to join to Azure AD under Azure AD Device settings.
|
||||||
| 0x801C03EE | Attestation failed. | Sign out and then sign in again. |
|
| 0x801C03EE | Attestation failed. | Sign out and then sign in again. |
|
||||||
| 0x801C03EF | The AIK certificate is no longer valid. | Sign out and then sign in again. |
|
| 0x801C03EF | The AIK certificate is no longer valid. | Sign out and then sign in again. |
|
||||||
| 0x801C03F2 | Windows Hello key registration failed. | ERROR\_BAD\_DIRECTORY\_REQUEST. Another object with the same value for property proxyAddresses already exists. To resolve the issue, refer to [Duplicate Attributes Prevent Dirsync](https://docs.microsoft.com/office365/troubleshoot/administration/duplicate-attributes-prevent-dirsync). Also, if no sync conflict exists, please verify that the "Mail/Email address" in AAD and the Primary SMTP address are the same in the proxy address.
|
| 0x801C03F2 | Windows Hello key registration failed. | ERROR\_BAD\_DIRECTORY\_REQUEST. Another object with the same value for property proxyAddresses already exists. To resolve the issue, refer to [Duplicate Attributes Prevent Dirsync](https://docs.microsoft.com/office365/troubleshoot/administration/duplicate-attributes-prevent-dirsync). Also, if no sync conflict exists, please verify that the "Mail/Email address" in AAD and the Primary SMTP address are the same in the proxy address.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Remote Desktop
|
title: Remote Desktop
|
||||||
description: Learn how Windows Hello for Business supports using a certificate deployed to a WHFB container to a remote desktop to a server or another device.
|
description: Learn how Windows Hello for Business supports using biometrics with remote desktop
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, cert-trust, device, registration, unlock, remote desktop, RDP
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
localizationpriority: medium
|
localizationpriority: medium
|
||||||
ms.date: 09/16/2020
|
ms.date: 02/24/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.reviewer:
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, version 1703 or later
|
- Windows 10, version 1703 or later
|
||||||
- Hybrid deployment
|
- Hybrid deployment
|
||||||
- Key trust
|
- Certificate Trust
|
||||||
|
|
||||||
|
|
||||||
## Directory Synchronization
|
## Directory Synchronization
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 8.5 KiB |
Binary file not shown.
After Width: | Height: | Size: 7.8 KiB |
Binary file not shown.
After Width: | Height: | Size: 33 KiB |
@ -103,6 +103,8 @@
|
|||||||
href: hello-cert-trust-policy-settings.md
|
href: hello-cert-trust-policy-settings.md
|
||||||
- name: Managing Windows Hello for Business in your organization
|
- name: Managing Windows Hello for Business in your organization
|
||||||
href: hello-manage-in-organization.md
|
href: hello-manage-in-organization.md
|
||||||
|
- name: Deploying Certificates to Key Trust Users to Enable RDP
|
||||||
|
href: hello-deployment-rdp-certs.md
|
||||||
- name: Windows Hello for Business Features
|
- name: Windows Hello for Business Features
|
||||||
items:
|
items:
|
||||||
- name: Conditional Access
|
- name: Conditional Access
|
||||||
|
@ -32,14 +32,17 @@ Yes.
|
|||||||
|
|
||||||
**Suspend** keeps the data encrypted but encrypts the BitLocker volume master key with a clear key. The clear key is a cryptographic key stored unencrypted and unprotected on the disk drive. By storing this key unencrypted, the **Suspend** option allows for changes or upgrades to the computer without the time and cost of decrypting and re-encrypting the entire drive. After the changes are made and BitLocker is again enabled, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade, the volume master key is changed, the protectors are updated to match and the clear key is erased.
|
**Suspend** keeps the data encrypted but encrypts the BitLocker volume master key with a clear key. The clear key is a cryptographic key stored unencrypted and unprotected on the disk drive. By storing this key unencrypted, the **Suspend** option allows for changes or upgrades to the computer without the time and cost of decrypting and re-encrypting the entire drive. After the changes are made and BitLocker is again enabled, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade, the volume master key is changed, the protectors are updated to match and the clear key is erased.
|
||||||
|
|
||||||
## Do I have to decrypt my BitLocker-protected drive to download and install system updates and upgrades?
|
## Do I have to suspend BitLocker protection to download and install system updates and upgrades?
|
||||||
|
|
||||||
No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](https://technet.microsoft.com/itpro/windows/manage/waas-quick-start).
|
No user action is required for BitLocker in order to apply updates from Microsoft, including [Windows quality updates and feature updates](https://technet.microsoft.com/itpro/windows/manage/waas-quick-start).
|
||||||
Users need to suspend BitLocker for Non-Microsoft software updates, such as:
|
Users need to suspend BitLocker for Non-Microsoft software updates, such as:
|
||||||
|
|
||||||
- Computer manufacturer firmware updates
|
- Some TPM firmware updates if these updates clear the TPM outside of the Windows API. Not every TPM firmware update will clear the TPM and this happens if a known vulnerability has been discovered in the TPM firmware. Users don’t have to suspend BitLocker if the TPM firmware update uses Windows API to clear the TPM because in this case, BitLocker will be automatically suspended. We recommend users testing their TPM firmware updates if they don’t want to suspend BitLocker protection.
|
||||||
- TPM firmware updates
|
- Non-Microsoft application updates that modify the UEFI\BIOS configuration.
|
||||||
- Non-Microsoft application updates that modify boot components
|
- Manual or third-party updates to secure boot databases (only if BitLocker uses Secure Boot for integrity validation).
|
||||||
|
- Updates to UEFI\BIOS firmware, installation of additional UEFI drivers, or UEFI applications without using the Windows update mechanism (only if you update and BitLocker does not use Secure Boot for integrity validation).
|
||||||
|
- You can check if BitLocker uses Secure Boot for integrity validation with manage-bde -protectors -get C: (and see if "Uses Secure Boot for integrity validation" is reported).
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you have suspended BitLocker, you can resume BitLocker protection after you have installed the upgrade or update. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, your computer will enter recovery mode when restarting and will require a recovery key or password to access the computer.
|
> If you have suspended BitLocker, you can resume BitLocker protection after you have installed the upgrade or update. Upon resuming protection, BitLocker will reseal the encryption key to the new values of the measured components that changed as a part of the upgrade or update. If these types of upgrades or updates are applied without suspending BitLocker, your computer will enter recovery mode when restarting and will require a recovery key or password to access the computer.
|
||||||
|
@ -240,27 +240,27 @@ For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com
|
|||||||
|
|
||||||
4. On the **Before You Begin** page, click **Next**.
|
4. On the **Before You Begin** page, click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365.
|
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. On the updated **Publisher** page, click **Create**.
|
8. On the updated **Publisher** page, click **Create**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy.
|
9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
9. Review the Local Security Policy snap-in to make sure your rule is correct.
|
9. Review the Local Security Policy snap-in to make sure your rule is correct.
|
||||||
|
|
||||||
@ -318,11 +318,11 @@ The executable rule helps to create an AppLocker rule to sign any unsigned apps.
|
|||||||
|
|
||||||
6. On the **Conditions** page, click **Path** and then click **Next**.
|
6. On the **Conditions** page, click **Path** and then click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Click **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
7. Click **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. On the **Exceptions** page, add any exceptions and then click **Next**.
|
8. On the **Exceptions** page, add any exceptions and then click **Next**.
|
||||||
|
|
||||||
@ -458,7 +458,7 @@ contoso.sharepoint.com,contoso.internalproxy1.com|contoso.visualstudio.com,conto
|
|||||||
Value format without proxy:
|
Value format without proxy:
|
||||||
|
|
||||||
```console
|
```console
|
||||||
contoso.sharepoint.com,|contoso.visualstudio.com,|contoso.onedrive.com,
|
contoso.sharepoint.com|contoso.visualstudio.com|contoso.onedrive.com,
|
||||||
```
|
```
|
||||||
|
|
||||||
### Protected domains
|
### Protected domains
|
||||||
|
@ -269,6 +269,7 @@
|
|||||||
|
|
||||||
### [Microsoft Defender for Endpoint for iOS]()
|
### [Microsoft Defender for Endpoint for iOS]()
|
||||||
#### [Overview of Microsoft Defender for Endpoint for iOS](microsoft-defender-atp/microsoft-defender-atp-ios.md)
|
#### [Overview of Microsoft Defender for Endpoint for iOS](microsoft-defender-atp/microsoft-defender-atp-ios.md)
|
||||||
|
#### [What's New](microsoft-defender-atp/ios-whatsnew.md)
|
||||||
|
|
||||||
#### [Deploy]()
|
#### [Deploy]()
|
||||||
##### [Deploy Microsoft Defender for Endpoint for iOS via Intune](microsoft-defender-atp/ios-install.md)
|
##### [Deploy Microsoft Defender for Endpoint for iOS via Intune](microsoft-defender-atp/ios-install.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: "Change history for [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)"
|
title: "Change history for [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)"
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
description: This topic lists new and updated topics in the Defender for Endpoint content set.
|
description: This topic lists new and updated topics in the Defender for Endpoint content set.
|
||||||
|
@ -20,13 +20,13 @@ ms.technology: mde
|
|||||||
# Threat Protection
|
# Threat Protection
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
- [Microsoft 365 Defender](https://go.microsoft.com/fwlink/?linkid=2118804)
|
||||||
|
|
||||||
[Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture.
|
[Microsoft Defender for Endpoint](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) is a unified platform for preventative protection, post-breach detection, automated investigation, and response. Defender for Endpoint protects endpoints from cyber threats, detects advanced attacks and data breaches, automates security incidents, and improves security posture.
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> Enable your users to access cloud services and on-premises applications with ease and enable modern management capabilities for all devices. For more information, see [Secure your remote workforce](https://docs.microsoft.com/enterprise-mobility-security/remote-work/).
|
> Enable your users to access cloud services and on-premises applications with ease and enable modern management capabilities for all devices. For more information, see [Secure your remote workforce](https://docs.microsoft.com/enterprise-mobility-security/remote-work/).
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in.
|
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you might encounter when using the Microsoft Defender AV.
|
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you might encounter when using the Microsoft Defender AV.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can perform various Microsoft Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility is useful when you want to automate Microsoft Defender Antivirus use. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. You must run it from a command prompt.
|
You can perform various Microsoft Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility is useful when you want to automate Microsoft Defender Antivirus use. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. You must run it from a command prompt.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can manage and configure Microsoft Defender Antivirus with the following tools:
|
You can manage and configure Microsoft Defender Antivirus with the following tools:
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
## Use Microsoft Intune to configure scanning options
|
## Use Microsoft Intune to configure scanning options
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Block at first sight provides a way to detect and block new malware within seconds. This protection is enabled by default when certain prerequisite settings are enabled. These settings include cloud-delivered protection, a specified sample submission timeout (such as 50 seconds), and a file-blocking level of high. In most enterprise organizations, these settings are enabled by default with Microsoft Defender Antivirus deployments.
|
Block at first sight provides a way to detect and block new malware within seconds. This protection is enabled by default when certain prerequisite settings are enabled. These settings include cloud-delivered protection, a specified sample submission timeout (such as 50 seconds), and a file-blocking level of high. In most enterprise organizations, these settings are enabled by default with Microsoft Defender Antivirus deployments.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
When Microsoft Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Microsoft Defender Antivirus cloud service](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md).
|
When Microsoft Defender Antivirus finds a suspicious file, it can prevent the file from running while it queries the [Microsoft Defender Antivirus cloud service](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can configure how users of the endpoints on your network can interact with Microsoft Defender Antivirus.
|
You can configure how users of the endpoints on your network can interact with Microsoft Defender Antivirus.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can exclude certain files, folders, processes, and process-opened files from Microsoft Defender Antivirus scans. Such exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection.
|
You can exclude certain files, folders, processes, and process-opened files from Microsoft Defender Antivirus scans. Such exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md), [on-demand scans](run-scan-microsoft-defender-antivirus.md), and [always-on real-time protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md). Exclusions for process-opened files only apply to real-time protection.
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Microsoft Defender Antivirus exclusions don't apply to other Microsoft Defender for Endpoint capabilities, including [endpoint detection and response (EDR)](../microsoft-defender-atp/overview-endpoint-detection-response.md), [attack surface reduction (ASR) rules](../microsoft-defender-atp/attack-surface-reduction.md), and [controlled folder access](../microsoft-defender-atp/controlled-folders.md). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections. To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](../microsoft-defender-atp/manage-indicators.md).
|
> Microsoft Defender Antivirus exclusions don't apply to other Microsoft Defender for Endpoint capabilities, including [endpoint detection and response (EDR)](../microsoft-defender-atp/overview-endpoint-detection-response.md), [attack surface reduction (ASR) rules](../microsoft-defender-atp/attack-surface-reduction.md), and [controlled folder access](../microsoft-defender-atp/controlled-folders.md). Files that you exclude using the methods described in this article can still trigger EDR alerts and other detections. To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](../microsoft-defender-atp/manage-indicators.md).
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
By default, Microsoft Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances.
|
By default, Microsoft Defender Antivirus settings that are deployed via a Group Policy Object to the endpoints in your network will prevent users from locally changing the settings. You can change this in some instances.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can configure Microsoft Defender Antivirus with a number of tools, including:
|
You can configure Microsoft Defender Antivirus with a number of tools, including:
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
To ensure Microsoft Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers.
|
To ensure Microsoft Defender Antivirus cloud-delivered protection works properly, you need to configure your network to allow connections between your endpoints and certain Microsoft servers.
|
||||||
|
|
||||||
@ -41,16 +41,16 @@ See the blog post [Important changes to Microsoft Active Protection Services end
|
|||||||
|
|
||||||
## Allow connections to the Microsoft Defender Antivirus cloud service
|
## Allow connections to the Microsoft Defender Antivirus cloud service
|
||||||
|
|
||||||
The Microsoft Defender Antivirus cloud service provides fast, strong protection for your endpoints. Enabling the cloud-delivered protection service is optional, however it is highly recommended because it provides important protection against malware on your endpoints and across your network.
|
The Microsoft Defender Antivirus cloud service provides fast, strong protection for your endpoints. Enabling the cloud-delivered protection service is optional, however it's highly recommended because it provides important protection against malware on your endpoints and across your network.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
>The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it's called a cloud service, it's not simply protection for files stored in the cloud, rather it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
See [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) for details on enabling the service with Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
See [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) for details on enabling the service with Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||||
|
|
||||||
After you've enabled the service, you may need to configure your network or firewall to allow connections between it and your endpoints.
|
After you've enabled the service, you may need to configure your network or firewall to allow connections between it and your endpoints.
|
||||||
|
|
||||||
Because your protection is a cloud service, computers must have access to the internet and reach the Microsoft Defender for Office 365 machine learning services. Do not exclude the URL `*.blob.core.windows.net` from any kind of network inspection.
|
Because your protection is a cloud service, computers must have access to the internet and reach the Microsoft Defender for Office 365 machine learning services. Don't exclude the URL `*.blob.core.windows.net` from any kind of network inspection.
|
||||||
|
|
||||||
The table below lists the services and their associated URLs. Make sure that there are no firewall or network filtering rules denying access to these URLs, or you may need to create an allow rule specifically for them (excluding the URL `*.blob.core.windows.net`). Below mention URLs are using port 443 for communication.
|
The table below lists the services and their associated URLs. Make sure that there are no firewall or network filtering rules denying access to these URLs, or you may need to create an allow rule specifically for them (excluding the URL `*.blob.core.windows.net`). Below mention URLs are using port 443 for communication.
|
||||||
|
|
||||||
@ -60,14 +60,14 @@ The table below lists the services and their associated URLs. Make sure that the
|
|||||||
| Microsoft Defender Antivirus cloud-delivered protection service, also referred to as Microsoft Active Protection Service (MAPS)|Used by Microsoft Defender Antivirus to provide cloud-delivered protection|`*.wdcp.microsoft.com` <br/> `*.wdcpalt.microsoft.com` <br/> `*.wd.microsoft.com`|
|
| Microsoft Defender Antivirus cloud-delivered protection service, also referred to as Microsoft Active Protection Service (MAPS)|Used by Microsoft Defender Antivirus to provide cloud-delivered protection|`*.wdcp.microsoft.com` <br/> `*.wdcpalt.microsoft.com` <br/> `*.wd.microsoft.com`|
|
||||||
| Microsoft Update Service (MU) <br/> Windows Update Service (WU)| Security intelligence and product updates |`*.update.microsoft.com` <br/> `*.delivery.mp.microsoft.com`<br/> `*.windowsupdate.com` <br/><br/> For details see [Connection endpoints for Windows Update](https://docs.microsoft.com/windows/privacy/manage-windows-1709-endpoints#windows-update)|
|
| Microsoft Update Service (MU) <br/> Windows Update Service (WU)| Security intelligence and product updates |`*.update.microsoft.com` <br/> `*.delivery.mp.microsoft.com`<br/> `*.windowsupdate.com` <br/><br/> For details see [Connection endpoints for Windows Update](https://docs.microsoft.com/windows/privacy/manage-windows-1709-endpoints#windows-update)|
|
||||||
|Security intelligence updates Alternate Download Location (ADL)| Alternate location for Microsoft Defender Antivirus Security intelligence updates if the installed Security intelligence is out of date (7 or more days behind)| `*.download.microsoft.com` </br> `*.download.windowsupdate.com`</br> `https://fe3cr.delivery.mp.microsoft.com/ClientWebService/client.asmx`|
|
|Security intelligence updates Alternate Download Location (ADL)| Alternate location for Microsoft Defender Antivirus Security intelligence updates if the installed Security intelligence is out of date (7 or more days behind)| `*.download.microsoft.com` </br> `*.download.windowsupdate.com`</br> `https://fe3cr.delivery.mp.microsoft.com/ClientWebService/client.asmx`|
|
||||||
| Malware submission storage|Upload location for files submitted to Microsoft via the Submission form or automatic sample submission | `ussus1eastprod.blob.core.windows.net` <br/> `ussus1westprod.blob.core.windows.net` <br/> `usseu1northprod.blob.core.windows.net` <br/> `usseu1westprod.blob.core.windows.net` <br/> `ussuk1southprod.blob.core.windows.net` <br/> `ussuk1westprod.blob.core.windows.net` <br/> `ussas1eastprod.blob.core.windows.net` <br/> `ussas1southeastprod.blob.core.windows.net` <br/> `ussau1eastprod.blob.core.windows.net` <br/> `ussau1southeastprod.blob.core.windows.net` |
|
| Malware submission storage|Upload location for files submitted to Microsoft via the Submission form or automatic sample submission | `ussus1eastprod.blob.core.windows.net` <br/> `ussus2eastprod.blob.core.windows.net` <br/> `ussus3eastprod.blob.core.windows.net` <br/> `ussus4eastprod.blob.core.windows.net` <br/> `wsus1eastprod.blob.core.windows.net` <br/> `wsus2eastprod.blob.core.windows.net` <br/> `ussus1westprod.blob.core.windows.net` <br/> `ussus2westprod.blob.core.windows.net` <br/> `ussus3westprod.blob.core.windows.net` <br/> `ussus4westprod.blob.core.windows.net` <br/> `wsus1westprod.blob.core.windows.net` <br/> `wsus2westprod.blob.core.windows.net` <br/> `usseu1northprod.blob.core.windows.net` <br/> `wseu1northprod.blob.core.windows.net` <br/> `usseu1westprod.blob.core.windows.net` <br/> `wseu1westprod.blob.core.windows.net` <br/> `ussuk1southprod.blob.core.windows.net` <br/> `wsuk1southprod.blob.core.windows.net` <br/> `ussuk1westprod.blob.core.windows.net` <br/> `wsuk1westprod.blob.core.windows.net` |
|
||||||
| Certificate Revocation List (CRL)|Used by Windows when creating the SSL connection to MAPS for updating the CRL | `http://www.microsoft.com/pkiops/crl/` <br/> `http://www.microsoft.com/pkiops/certs` <br/> `http://crl.microsoft.com/pki/crl/products` <br/> `http://www.microsoft.com/pki/certs` |
|
| Certificate Revocation List (CRL)|Used by Windows when creating the SSL connection to MAPS for updating the CRL | `http://www.microsoft.com/pkiops/crl/` <br/> `http://www.microsoft.com/pkiops/certs` <br/> `http://crl.microsoft.com/pki/crl/products` <br/> `http://www.microsoft.com/pki/certs` |
|
||||||
| Symbol Store|Used by Microsoft Defender Antivirus to restore certain critical files during remediation flows | `https://msdl.microsoft.com/download/symbols` |
|
| Symbol Store|Used by Microsoft Defender Antivirus to restore certain critical files during remediation flows | `https://msdl.microsoft.com/download/symbols` |
|
||||||
| Universal Telemetry Client| Used by Windows to send client diagnostic data; Microsoft Defender Antivirus uses telemetry for product quality monitoring purposes | The update uses SSL (TCP Port 443) to download manifests and upload diagnostic data to Microsoft that uses the following DNS endpoints: `vortex-win.data.microsoft.com` <br/> `settings-win.data.microsoft.com`|
|
| Universal Telemetry Client| Used by Windows to send client diagnostic data; Microsoft Defender Antivirus uses telemetry for product quality monitoring purposes | The update uses SSL (TCP Port 443) to download manifests and upload diagnostic data to Microsoft that uses the following DNS endpoints: `vortex-win.data.microsoft.com` <br/> `settings-win.data.microsoft.com`|
|
||||||
|
|
||||||
## Validate connections between your network and the cloud
|
## Validate connections between your network and the cloud
|
||||||
|
|
||||||
After allowing the URLs listed above, you can test if you are connected to the Microsoft Defender Antivirus cloud service and are correctly reporting and receiving information to ensure you are fully protected.
|
After allowing the URLs listed above, you can test if you're connected to the Microsoft Defender Antivirus cloud service and are correctly reporting and receiving information to ensure you're fully protected.
|
||||||
|
|
||||||
**Use the cmdline tool to validate cloud-delivered protection:**
|
**Use the cmdline tool to validate cloud-delivered protection:**
|
||||||
|
|
||||||
@ -84,24 +84,24 @@ For more information, see [Manage Microsoft Defender Antivirus with the mpcmdrun
|
|||||||
|
|
||||||
**Attempt to download a fake malware file from Microsoft:**
|
**Attempt to download a fake malware file from Microsoft:**
|
||||||
|
|
||||||
You can download a sample file that Microsoft Defender Antivirus will detect and block if you are properly connected to the cloud.
|
You can download a sample file that Microsoft Defender Antivirus will detect and block if you're properly connected to the cloud.
|
||||||
|
|
||||||
Download the file by visiting [https://aka.ms/ioavtest](https://aka.ms/ioavtest).
|
Download the file by visiting [https://aka.ms/ioavtest](https://aka.ms/ioavtest).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>This file is not an actual piece of malware. It is a fake file that is designed to test if you are properly connected to the cloud.
|
>This file is not an actual piece of malware. It's a fake file that is designed to test if you're properly connected to the cloud.
|
||||||
|
|
||||||
If you are properly connected, you will see a warning Microsoft Defender Antivirus notification.
|
If you're properly connected, you'll see a warning Microsoft Defender Antivirus notification.
|
||||||
|
|
||||||
If you are using Microsoft Edge, you'll also see a notification message:
|
If you're using Microsoft Edge, you'll also see a notification message:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
A similar message occurs if you are using Internet Explorer:
|
A similar message occurs if you're using Internet Explorer:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
You will also see a detection under **Quarantined threats** in the **Scan history** section in the Windows Security app:
|
You'll also see a detection under **Quarantined threats** in the **Scan history** section in the Windows Security app:
|
||||||
|
|
||||||
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise.
|
In Windows 10, application notifications about malware detection and remediation are more robust, consistent, and concise.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can exclude files that have been opened by specific processes from Microsoft Defender Antivirus scans. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists.
|
You can exclude files that have been opened by specific processes from Microsoft Defender Antivirus scans. See [Recommendations for defining exclusions](configure-exclusions-microsoft-defender-antivirus.md#recommendations-for-defining-exclusions) before defining your exclusion lists.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus uses several methods to provide threat protection:
|
Microsoft Defender Antivirus uses several methods to provide threat protection:
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities.
|
Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
When Microsoft Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Microsoft Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats.
|
When Microsoft Defender Antivirus runs a scan, it will attempt to remediate or remove threats that it finds. You can configure how Microsoft Defender Antivirus should react to certain threats, whether it should create a restore point before remediating, and when it should remove remediated threats.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.date: 02/10/2021
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019 automatically enrolls you in certain exclusions, as defined by your specified server role. See the [list of automatic exclusions](#list-of-automatic-exclusions) (in this article). These exclusions do not appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md#exclusions).
|
Microsoft Defender Antivirus on Windows Server 2016 and Windows Server 2019 automatically enrolls you in certain exclusions, as defined by your specified server role. See the [list of automatic exclusions](#list-of-automatic-exclusions) (in this article). These exclusions do not appear in the standard exclusion lists that are shown in the [Windows Security app](microsoft-defender-security-center-antivirus.md#exclusions).
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans.
|
You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans.
|
You can use Group Policy, PowerShell, and Windows Management Instrumentation (WMI) to configure Microsoft Defender Antivirus scans.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can deploy, manage, and report on Microsoft Defender Antivirus in a number of ways.
|
You can deploy, manage, and report on Microsoft Defender Antivirus in a number of ways.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Depending on the management tool you are using, you may need to specifically enable or configure Microsoft Defender Antivirus protection.
|
Depending on the management tool you are using, you may need to specifically enable or configure Microsoft Defender Antivirus protection.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
In addition to standard on-premises or hardware configurations, you can also use Microsoft Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment.
|
In addition to standard on-premises or hardware configurations, you can also use Microsoft Defender Antivirus in a remote desktop (RDS) or virtual desktop infrastructure (VDI) environment.
|
||||||
|
|
||||||
|
@ -6,12 +6,12 @@ search.product: eADQiWindows 10XVcnh
|
|||||||
ms.prod: m365-security
|
ms.prod: m365-security
|
||||||
ms.mktglfcycl: detect
|
ms.mktglfcycl: detect
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: high
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.date: 02/03/2021
|
ms.date: 03/10/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge)
|
- [Microsoft Edge](https://docs.microsoft.com/microsoft-edge/deploy/microsoft-edge)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -41,9 +41,7 @@ Here are some examples:
|
|||||||
> [!TIP]
|
> [!TIP]
|
||||||
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](../intelligence/criteria.md).
|
> For more examples and a discussion of the criteria we use to label applications for special attention from security features, see [How Microsoft identifies malware and potentially unwanted applications](../intelligence/criteria.md).
|
||||||
|
|
||||||
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or waste IT resources in cleaning them up.
|
Potentially unwanted applications can increase the risk of your network being infected with actual malware, make malware infections harder to identify, or waste IT resources in cleaning them up. PUA protection is supported on Windows 10, Windows Server 2019, and Windows Server 2016.
|
||||||
|
|
||||||
PUA protection is supported on Windows 10, Windows Server 2019, and Windows Server 2016.
|
|
||||||
|
|
||||||
## Microsoft Edge
|
## Microsoft Edge
|
||||||
|
|
||||||
@ -64,9 +62,7 @@ Although potentially unwanted application protection in Microsoft Edge (Chromium
|
|||||||
|
|
||||||
In Chromium-based Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.
|
In Chromium-based Edge with PUA protection turned on, Microsoft Defender SmartScreen protects you from PUA-associated URLs.
|
||||||
|
|
||||||
Admins can [configure](https://docs.microsoft.com/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft
|
Security admins can [configure](https://docs.microsoft.com/DeployEdge/configure-microsoft-edge) how Microsoft Edge and Microsoft Defender SmartScreen work together to protect groups of users from PUA-associated URLs. There are several [group policy settings](https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#smartscreen-settings) explicitly for Microsoft Defender SmartScreen available, including [one for blocking PUA](https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can [configure Microsoft Defender SmartScreen](https://docs.microsoft.com/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
|
||||||
Defender SmartScreen available, including [one for blocking PUA](https://docs.microsoft.com/DeployEdge/microsoft-edge-policies#smartscreenpuaenabled). In addition, admins can
|
|
||||||
[configure Microsoft Defender SmartScreen](https://docs.microsoft.com/microsoft-edge/deploy/available-policies?source=docs#configure-windows-defender-smartscreen) as a whole, using group policy settings to turn Microsoft Defender SmartScreen on or off.
|
|
||||||
|
|
||||||
Although Microsoft Defender for Endpoint has its own block list based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you [create and manage indicators](../microsoft-defender-atp/manage-indicators.md) in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.
|
Although Microsoft Defender for Endpoint has its own block list based upon a data set managed by Microsoft, you can customize this list based on your own threat intelligence. If you [create and manage indicators](../microsoft-defender-atp/manage-indicators.md) in the Microsoft Defender for Endpoint portal, Microsoft Defender SmartScreen respects the new settings.
|
||||||
|
|
||||||
@ -77,9 +73,7 @@ The potentially unwanted application (PUA) protection feature in Microsoft Defen
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This feature is available in Windows 10, Windows Server 2019, and Windows Server 2016.
|
> This feature is available in Windows 10, Windows Server 2019, and Windows Server 2016.
|
||||||
|
|
||||||
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine.
|
Microsoft Defender Antivirus blocks detected PUA files and any attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantine. When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md)) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
|
||||||
|
|
||||||
When a PUA file is detected on an endpoint, Microsoft Defender Antivirus sends a notification to the user ([unless notifications have been disabled](configure-notifications-microsoft-defender-antivirus.md)) in the same format as other threat detections. The notification is prefaced with `PUA:` to indicate its content.
|
|
||||||
|
|
||||||
The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md#detection-history).
|
The notification appears in the usual [quarantine list within the Windows Security app](microsoft-defender-security-center-antivirus.md#detection-history).
|
||||||
|
|
||||||
@ -112,13 +106,21 @@ For System Center 2012 Configuration Manager, see [How to Deploy Potentially Unw
|
|||||||
#### Use Group Policy to configure PUA protection
|
#### Use Group Policy to configure PUA protection
|
||||||
|
|
||||||
1. Download and install [Administrative Templates (.admx) for Windows 10 October 2020 Update (20H2)](https://www.microsoft.com/download/details.aspx?id=102157)
|
1. Download and install [Administrative Templates (.admx) for Windows 10 October 2020 Update (20H2)](https://www.microsoft.com/download/details.aspx?id=102157)
|
||||||
|
|
||||||
2. On your Group Policy management computer, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
|
2. On your Group Policy management computer, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
|
||||||
|
|
||||||
3. Select the Group Policy Object you want to configure, and then choose **Edit**.
|
3. Select the Group Policy Object you want to configure, and then choose **Edit**.
|
||||||
|
|
||||||
4. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
|
4. In the **Group Policy Management Editor**, go to **Computer configuration** and select **Administrative templates**.
|
||||||
|
|
||||||
5. Expand the tree to **Windows Components** > **Microsoft Defender Antivirus**.
|
5. Expand the tree to **Windows Components** > **Microsoft Defender Antivirus**.
|
||||||
|
|
||||||
6. Double-click **Configure detection for potentially unwanted applications**.
|
6. Double-click **Configure detection for potentially unwanted applications**.
|
||||||
|
|
||||||
7. Select **Enabled** to enable PUA protection.
|
7. Select **Enabled** to enable PUA protection.
|
||||||
|
|
||||||
8. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
|
8. In **Options**, select **Block** to block potentially unwanted applications, or select **Audit Mode** to test how the setting works in your environment. Select **OK**.
|
||||||
|
|
||||||
9. Deploy your Group Policy object as you usually do.
|
9. Deploy your Group Policy object as you usually do.
|
||||||
|
|
||||||
#### Use PowerShell cmdlets to configure PUA protection
|
#### Use PowerShell cmdlets to configure PUA protection
|
||||||
|
@ -22,7 +22,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Use this guide to determine how well Microsoft Defender Antivirus protects you from viruses, malware, and potentially unwanted applications.
|
Use this guide to determine how well Microsoft Defender Antivirus protects you from viruses, malware, and potentially unwanted applications.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device.
|
Limited periodic scanning is a special type of threat detection and remediation that can be enabled when you have installed another antivirus product on a Windows 10 device.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service.
|
Microsoft Defender Antivirus allows you to determine if updates should (or should not) occur after certain events, such as at startup or after receiving specific reports from the cloud-delivered protection service.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis.
|
Microsoft Defender Antivirus lets you define how long an endpoint can avoid an update or how many scans it can miss before it is required to update and scan itself. This is especially useful in environments where devices are not often connected to a corporate or external network, or devices that are not used on a daily basis.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus lets you determine when it should look for and download updates.
|
Microsoft Defender Antivirus lets you determine when it should look for and download updates.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=22146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=22154037)
|
||||||
|
|
||||||
<a id="protection-updates"></a>
|
<a id="protection-updates"></a>
|
||||||
<!-- this has been used as anchor in VDI content -->
|
<!-- this has been used as anchor in VDI content -->
|
||||||
|
@ -13,7 +13,7 @@ ms.author: deniseb
|
|||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.reviewer: pahuijbr
|
ms.reviewer: pahuijbr
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.date: 03/05/2021
|
ms.date: 03/10/2021
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
|
There are two types of updates related to keeping Microsoft Defender Antivirus up to date:
|
||||||
|
|
||||||
@ -78,6 +78,23 @@ All our updates contain
|
|||||||
<br/><br/>
|
<br/><br/>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
|
<summary> February-2021 (Platform: 4.18.2102.3 | Engine: 1.1.17900.7)</summary>
|
||||||
|
|
||||||
|
 Security intelligence update version: **1.333.7.0**
|
||||||
|
 Released: **March 9, 2021**
|
||||||
|
 Platform: **4.19.2102.3**
|
||||||
|
 Engine: **1.1.17900.7**
|
||||||
|
 Support phase: **Security and Critical Updates**
|
||||||
|
|
||||||
|
### What's new
|
||||||
|
|
||||||
|
- Improved service recovery through [tamper protection](prevent-changes-to-security-settings-with-tamper-protection.md)
|
||||||
|
- Extend tamper protection scope
|
||||||
|
|
||||||
|
### Known Issues
|
||||||
|
No known issues
|
||||||
|
<br/>
|
||||||
|
</details><details>
|
||||||
<summary> January-2021 (Platform: 4.18.2101.9 | Engine: 1.1.17800.5)</summary>
|
<summary> January-2021 (Platform: 4.18.2101.9 | Engine: 1.1.17800.5)</summary>
|
||||||
|
|
||||||
 Security intelligence update version: **1.327.1854.0**
|
 Security intelligence update version: **1.327.1854.0**
|
||||||
@ -114,7 +131,13 @@ No known issues
|
|||||||
### Known Issues
|
### Known Issues
|
||||||
No known issues
|
No known issues
|
||||||
<br/>
|
<br/>
|
||||||
</details><details>
|
</details>
|
||||||
|
|
||||||
|
### Previous version updates: Technical upgrade support only
|
||||||
|
|
||||||
|
After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that are listed in this section, and are provided for technical upgrade support only.
|
||||||
|
<br/><br/>
|
||||||
|
<details>
|
||||||
<summary> October-2020 (Platform: 4.18.2010.7 | Engine: 1.1.17600.5)</summary>
|
<summary> October-2020 (Platform: 4.18.2010.7 | Engine: 1.1.17600.5)</summary>
|
||||||
|
|
||||||
 Security intelligence update version: **1.327.7.0**
|
 Security intelligence update version: **1.327.7.0**
|
||||||
@ -134,13 +157,7 @@ No known issues
|
|||||||
|
|
||||||
No known issues
|
No known issues
|
||||||
<br/>
|
<br/>
|
||||||
</details>
|
</details><details>
|
||||||
|
|
||||||
### Previous version updates: Technical upgrade support only
|
|
||||||
|
|
||||||
After a new package version is released, support for the previous two versions is reduced to technical support only. Versions older than that are listed in this section, and are provided for technical upgrade support only.
|
|
||||||
<br/><br/>
|
|
||||||
<details>
|
|
||||||
<summary> September-2020 (Platform: 4.18.2009.7 | Engine: 1.1.17500.4)</summary>
|
<summary> September-2020 (Platform: 4.18.2009.7 | Engine: 1.1.17500.4)</summary>
|
||||||
|
|
||||||
 Security intelligence update version: **1.325.10.0**
|
 Security intelligence update version: **1.325.10.0**
|
||||||
@ -334,7 +351,7 @@ Engine: **1.1.16700.2**
|
|||||||
|
|
||||||
- Fixed BSOD on WS2016 with Exchange
|
- Fixed BSOD on WS2016 with Exchange
|
||||||
- Support platform updates when TMP is redirected to network path
|
- Support platform updates when TMP is redirected to network path
|
||||||
- Platform and engine versions are added to [WDSI](https://www.microsoft.com/wdsi/defenderupdates)
|
- Platform and engine versions are added to [WDSI](https://www.microsoft.com/en-us/wdsi/defenderupdates) <!-- The preceding URL must include "/en-us" -->
|
||||||
- extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
- extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
||||||
- Fix 4.18.1911.3 hang
|
- Fix 4.18.1911.3 hang
|
||||||
|
|
||||||
@ -390,7 +407,7 @@ The below table provides the Microsoft Defender Antivirus platform and engine ve
|
|||||||
|
|
||||||
|Windows 10 release |Platform version |Engine version |Support phase |
|
|Windows 10 release |Platform version |Engine version |Support phase |
|
||||||
|:---|:---|:---|:---|
|
|:---|:---|:---|:---|
|
||||||
|2004 (20H1) |4.18.2004.6 |1.1.17000.2 | Technical upgrade support (only) |
|
|2004 (20H1/20H2) |4.18.1909.6 |1.1.17000.2 | Technical upgrade support (only) |
|
||||||
|1909 (19H2) |4.18.1902.5 |1.1.16700.3 | Technical upgrade support (only) |
|
|1909 (19H2) |4.18.1902.5 |1.1.16700.3 | Technical upgrade support (only) |
|
||||||
|1903 (19H1) |4.18.1902.5 |1.1.15600.4 | Technical upgrade support (only) |
|
|1903 (19H1) |4.18.1902.5 |1.1.15600.4 | Technical upgrade support (only) |
|
||||||
|1809 (RS5) |4.18.1807.18075 |1.1.15000.2 | Technical upgrade support (only) |
|
|1809 (RS5) |4.18.1807.18075 |1.1.15000.2 | Technical upgrade support (only) |
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Mobile devices and VMs may require more configuration to ensure performance is not impacted by updates.
|
Mobile devices and VMs may require more configuration to ensure performance is not impacted by updates.
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
## Microsoft Defender Antivirus: Your next-generation protection
|
## Microsoft Defender Antivirus: Your next-generation protection
|
||||||
|
|
||||||
|
@ -22,7 +22,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus is available on the following editions/versions of Windows Server:
|
Microsoft Defender Antivirus is available on the following editions/versions of Windows Server:
|
||||||
- Windows Server 2019
|
- Windows Server 2019
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
|
Microsoft Defender Offline is an antimalware scanning tool that lets you boot and run a scan from a trusted environment. The scan runs from outside the normal Windows kernel so it can target malware that attempts to bypass the Windows shell, such as viruses and rootkits that infect or overwrite the master boot record (MBR).
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security.
|
In Windows 10, version 1703 and later, the Windows Defender app is part of the Windows Security.
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
- Microsoft Defender Antivirus
|
- Microsoft Defender Antivirus
|
||||||
- Microsoft 365
|
- Microsoft 365
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ audience: ITPro
|
|||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.date: 02/17/2021
|
ms.date: 03/11/2021
|
||||||
ms.technology: mde
|
ms.technology: mde
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -25,7 +25,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Tamper protection is available for devices that are running one of the following versions of Windows:
|
Tamper protection is available for devices that are running one of the following versions of Windows:
|
||||||
|
|
||||||
@ -61,14 +61,121 @@ Tamper protection doesn't prevent you from viewing your security settings. And,
|
|||||||
|
|
||||||
| To perform this task... | See this section... |
|
| To perform this task... | See this section... |
|
||||||
|:---|:---|
|
|:---|:---|
|
||||||
| Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) |
|
| Turn tamper protection on (or off) in the Microsoft Defender Security Center <p>Manage tamper protection across your tenant | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) |
|
||||||
| Turn tamper protection on (or off) for all or part of your organization using Intune <p>Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) |
|
| Turn tamper protection on (or off) for all or part of your organization using Intune <p>Fine-tune tamper protection settings in your organization | [Manage tamper protection for your organization using Intune](#manage-tamper-protection-for-your-organization-using-intune) |
|
||||||
| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) |
|
| Turn tamper protection on (or off) for your organization with Configuration Manager | [Manage tamper protection for your organization using tenant attach with Configuration Manager, version 2006](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006) |
|
||||||
| Turn tamper protection on (or off) in the Microsoft Defender Security Center <p>Manage tamper protection across your tenant <p>(Currently in preview) | [Manage tamper protection for your organization using the Microsoft Defender Security Center](#manage-tamper-protection-for-your-organization-using-the-microsoft-defender-security-center) |
|
| Turn tamper protection on (or off) for an individual device | [Manage tamper protection on an individual device](#manage-tamper-protection-on-an-individual-device) |
|
||||||
| View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) |
|
| View details about tampering attempts on devices | [View information about tampering attempts](#view-information-about-tampering-attempts) |
|
||||||
| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) |
|
| Review your security recommendations | [Review security recommendations](#review-your-security-recommendations) |
|
||||||
| Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) |
|
| Review the list of frequently asked questions (FAQs) | [Browse the FAQs](#view-information-about-tampering-attempts) |
|
||||||
|
|
||||||
|
## Manage tamper protection for your organization using the Microsoft Defender Security Center
|
||||||
|
|
||||||
|
Tamper protection can be turned on or off for your tenant using the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind:
|
||||||
|
|
||||||
|
- Currently, the option to manage tamper protection in the Microsoft Defender Security Center is on by default for new deployments. For existing deployments, tamper protection is available on an opt-in basis, with plans to make this the default method in the near future. (To opt in, in the Microsoft Defender Security Center, choose **Settings** > **Advanced features** > **Tamper protection**.)
|
||||||
|
|
||||||
|
- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method.
|
||||||
|
|
||||||
|
- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows Server 2016, or Windows Server 2019. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006).
|
||||||
|
|
||||||
|
- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center.
|
||||||
|
|
||||||
|
### Requirements for managing tamper protection in the Microsoft Defender Security Center
|
||||||
|
|
||||||
|
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
||||||
|
|
||||||
|
- Your Windows devices must be running one of the following versions of Windows:
|
||||||
|
- Windows 10
|
||||||
|
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
|
||||||
|
- Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later
|
||||||
|
- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)
|
||||||
|
- For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).
|
||||||
|
|
||||||
|
- Your devices must be [onboarded to Microsoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md).
|
||||||
|
|
||||||
|
- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
||||||
|
|
||||||
|
- [Cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) must be turned on.
|
||||||
|
|
||||||
|
### Turn tamper protection on (or off) in the Microsoft Defender Security Center
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
||||||
|
|
||||||
|
2. Choose **Settings**.
|
||||||
|
|
||||||
|
3. Go to **General** > **Advanced features**, and then turn tamper protection on.
|
||||||
|
|
||||||
|
## Manage tamper protection for your organization using Intune
|
||||||
|
|
||||||
|
If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. Use Intune when you want to fine-tune tamper protection settings. For example, if you want to enable tamper protection on some devices, but not all, use Intune.
|
||||||
|
|
||||||
|
### Requirements for managing tamper protection in Intune
|
||||||
|
|
||||||
|
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
||||||
|
|
||||||
|
- Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.)
|
||||||
|
|
||||||
|
- Your Windows devices must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).)
|
||||||
|
|
||||||
|
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
|
||||||
|
|
||||||
|
- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
||||||
|
|
||||||
|
### Turn tamper protection on (or off) in Intune
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account.
|
||||||
|
|
||||||
|
2. Select **Devices** > **Configuration Profiles**.
|
||||||
|
|
||||||
|
3. Create a profile that includes the following settings:
|
||||||
|
- **Platform: Windows 10 and later**
|
||||||
|
- **Profile type: Endpoint protection**
|
||||||
|
- **Category: Microsoft Defender Security Center**
|
||||||
|
- **Tamper Protection: Enabled**
|
||||||
|
|
||||||
|
4. Assign the profile to one or more groups.
|
||||||
|
|
||||||
|
### Are you using Windows OS 1709, 1803, or 1809?
|
||||||
|
|
||||||
|
If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. Instead, you can use PowerShell to determine whether tamper protection is enabled.
|
||||||
|
|
||||||
|
#### Use PowerShell to determine whether tamper protection is turned on
|
||||||
|
|
||||||
|
1. Open the Windows PowerShell app.
|
||||||
|
|
||||||
|
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet.
|
||||||
|
|
||||||
|
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
||||||
|
|
||||||
|
## Manage tamper protection for your organization with Configuration Manager, version 2006
|
||||||
|
|
||||||
|
If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The procedure can be used to extend tamper protection to devices running Windows 10 and Windows Server 2019. Make sure to review the prerequisites and other information in the resources mentioned in this procedure.
|
||||||
|
|
||||||
|
1. Set up tenant attach. To get help with this, see [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions).
|
||||||
|
|
||||||
|
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and then choose **+ Create Policy**.<br/>
|
||||||
|
- In the **Platform** list, select **Windows 10 and Windows Server (ConfigMgr)**.
|
||||||
|
- In the **Profile** list, select **Windows Security experience (preview)**. <br/>
|
||||||
|
|
||||||
|
3. Deploy the policy to your device collection.
|
||||||
|
|
||||||
|
### Need help with this method?
|
||||||
|
|
||||||
|
See the following resources:
|
||||||
|
|
||||||
|
- [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings)
|
||||||
|
- [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)
|
||||||
|
|
||||||
## Manage tamper protection on an individual device
|
## Manage tamper protection on an individual device
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -85,95 +192,12 @@ Here's what you see in the Windows Security app:
|
|||||||

|

|
||||||
|
|
||||||
1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
|
1. Select **Start**, and start typing *Security*. In the search results, select **Windows Security**.
|
||||||
|
|
||||||
2. Select **Virus & threat protection** > **Virus & threat protection settings**.
|
2. Select **Virus & threat protection** > **Virus & threat protection settings**.
|
||||||
|
|
||||||
3. Set **Tamper Protection** to **On** or **Off**.
|
3. Set **Tamper Protection** to **On** or **Off**.
|
||||||
|
|
||||||
## Manage tamper protection for your organization using Intune
|
|
||||||
|
|
||||||
If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) portal. Use Intune when you want to fine-tune tamper protection settings. For example, if you want to enable tamper protection on some devices, but not all, use Intune.
|
|
||||||
|
|
||||||
### Requirements for managing tamper protection in Intune
|
|
||||||
|
|
||||||
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
|
||||||
- Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; Intune is included in Microsoft 365 E5.)
|
|
||||||
- Your Windows devices must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019) or later. (For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).)
|
|
||||||
- You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above).
|
|
||||||
- Your devices must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
|
||||||
|
|
||||||
### Turn tamper protection on (or off) in Intune
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
1. Go to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com) and sign in with your work or school account.
|
|
||||||
2. Select **Devices** > **Configuration Profiles**.
|
|
||||||
3. Create a profile that includes the following settings:
|
|
||||||
- **Platform: Windows 10 and later**
|
|
||||||
- **Profile type: Endpoint protection**
|
|
||||||
- **Category: Microsoft Defender Security Center**
|
|
||||||
- **Tamper Protection: Enabled**
|
|
||||||
4. Assign the profile to one or more groups.
|
|
||||||
|
|
||||||
### Are you using Windows OS 1709, 1803, or 1809?
|
|
||||||
|
|
||||||
If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-health/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-health/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled.
|
|
||||||
|
|
||||||
#### Use PowerShell to determine whether tamper protection is turned on
|
|
||||||
|
|
||||||
1. Open the Windows PowerShell app.
|
|
||||||
2. Use the [Get-MpComputerStatus](https://docs.microsoft.com/powershell/module/defender/get-mpcomputerstatus?view=win10-ps&preserve-view=true) PowerShell cmdlet.
|
|
||||||
3. In the list of results, look for `IsTamperProtected`. (A value of *true* means tamper protection is enabled.)
|
|
||||||
|
|
||||||
## Manage tamper protection for your organization with Configuration Manager, version 2006
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> The procedure can be used to extend tamper protection to devices running Windows 10 and Windows Server 2019. Make sure to review the prerequisites and other information in the resources mentioned in this procedure.
|
|
||||||
|
|
||||||
If you're using [version 2006 of Configuration Manager](https://docs.microsoft.com/mem/configmgr/core/plan-design/changes/whats-new-in-version-2006), you can manage tamper protection settings on Windows 10, Windows Server 2016, and Windows Server 2019 by using a method called *tenant attach*. Tenant attach enables you to sync your on-premises-only Configuration Manager devices into the Microsoft Endpoint Manager admin center, and then deliver endpoint security configuration policies to on-premises collections & devices.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
1. Set up tenant attach. See [Microsoft Endpoint Manager tenant attach: Device sync and device actions](https://docs.microsoft.com/mem/configmgr/tenant-attach/device-sync-actions).
|
|
||||||
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint security** > **Antivirus**, and choose **+ Create Policy**.<br/>
|
|
||||||
- In the **Platform** list, select **Windows 10 and Windows Server (ConfigMgr)**.
|
|
||||||
- In the **Profile** list, select **Windows Security experience (preview)**. <br/>
|
|
||||||
3. Deploy the policy to your device collection.
|
|
||||||
|
|
||||||
### Need help with this?
|
|
||||||
|
|
||||||
See the following resources:
|
|
||||||
|
|
||||||
- [Settings for the Windows Security experience profile in Microsoft Intune](https://docs.microsoft.com/mem/intune/protect/antivirus-security-experience-windows-settings)
|
|
||||||
- [Tech Community Blog: Announcing Tamper Protection for Configuration Manager Tenant Attach clients](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/announcing-tamper-protection-for-configuration-manager-tenant/ba-p/1700246#.X3QLR5Ziqq8.linkedin)
|
|
||||||
|
|
||||||
## Manage tamper protection for your organization using the Microsoft Defender Security Center
|
|
||||||
|
|
||||||
Currently in preview, tamper protection can be turned on or off in the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)). Here are a few points to keep in mind:
|
|
||||||
|
|
||||||
- When you use the Microsoft Defender Security Center to manage tamper protection, you do not have to use Intune or the tenant attach method.
|
|
||||||
- When you manage tamper protection in the Microsoft Defender Security Center, the setting is applied tenant wide, affecting all of your devices that are running Windows 10, Windows Server 2016, or Windows Server 2019. To fine-tune tamper protection (such as having tamper protection on for some devices but off for others), use either [Intune](#manage-tamper-protection-for-your-organization-using-intune) or [Configuration Manager with tenant attach](#manage-tamper-protection-for-your-organization-with-configuration-manager-version-2006).
|
|
||||||
- If you have a hybrid environment, tamper protection settings configured in Intune take precedence over settings configured in the Microsoft Defender Security Center.
|
|
||||||
- Tamper protection is generally available; however, the ability to manage tamper protection in the Microsoft Defender Security Center is currently in preview.
|
|
||||||
|
|
||||||
### Requirements for managing tamper protection in the Microsoft Defender Security Center
|
|
||||||
|
|
||||||
- You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations.
|
|
||||||
- Your Windows devices must be running one of the following versions of Windows:
|
|
||||||
- Windows 10
|
|
||||||
- [Windows Server 2019](/windows-server/get-started-19/whats-new-19)
|
|
||||||
- Windows Server, version [1803](https://docs.microsoft.com/windows/release-health/status-windows-10-1803) or later
|
|
||||||
- [Windows Server 2016](/windows-server/get-started/whats-new-in-windows-server-2016)
|
|
||||||
- For more information about releases, see [Windows 10 release information](https://docs.microsoft.com/windows/release-health/release-information).
|
|
||||||
- Your devices must be [onboarded to Microsoft Defender for Endpoint](../microsoft-defender-atp/onboarding.md).
|
|
||||||
- Your devices must be using anti-malware platform version 4.18.2010.7 (or above) and anti-malware engine version 1.1.17600.5 (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).)
|
|
||||||
- [Cloud-delivered protection must be turned on](enable-cloud-protection-microsoft-defender-antivirus.md).
|
|
||||||
|
|
||||||
### Turn tamper protection on (or off) in the Microsoft Defender Security Center
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in.
|
|
||||||
2. Choose **Settings**.
|
|
||||||
3. Go to **General** > **Advanced features**, and then turn tamper protection on.
|
|
||||||
|
|
||||||
## View information about tampering attempts
|
## View information about tampering attempts
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
You can use Group Policy to prevent users on endpoints from seeing the Microsoft Defender Antivirus interface. You can also prevent them from pausing scans.
|
You can use Group Policy to prevent users on endpoints from seeing the Microsoft Defender Antivirus interface. You can also prevent them from pausing scans.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
Microsoft Defender Antivirus is built into Windows 10, Windows Server 2019, and Windows Server 2016. Microsoft Defender Antivirus is of your next-generation protection in Microsoft Defender for Endpoint. Next-generation protection helps protect your devices from software threats like viruses, malware, and spyware across email, apps, the cloud, and the web.
|
Microsoft Defender Antivirus is built into Windows 10, Windows Server 2019, and Windows Server 2016. Microsoft Defender Antivirus is of your next-generation protection in Microsoft Defender for Endpoint. Next-generation protection helps protect your devices from software threats like viruses, malware, and spyware across email, apps, the cloud, and the web.
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ ms.technology: mde
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2146631)
|
- [Microsoft Defender for Endpoint](https://go.microsoft.com/fwlink/p/?linkid=2154037)
|
||||||
|
|
||||||
If Microsoft Defender Antivirus is configured to detect and remediate threats on your device, Microsoft Defender Antivirus quarantines suspicious files. If you are certain a quarantined file is not a threat, you can restore it.
|
If Microsoft Defender Antivirus is configured to detect and remediate threats on your device, Microsoft Defender Antivirus quarantines suspicious files. If you are certain a quarantined file is not a threat, you can restore it.
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user