From c7c7b0cc7f313a861dc3f814bacd4ff81e0b9923 Mon Sep 17 00:00:00 2001 From: Daniel Breedeveld Date: Mon, 24 Jul 2017 15:20:03 +0200 Subject: [PATCH 001/117] Update microsoft-surface-data-eraser.md Just a very small typo fixed --- devices/surface/microsoft-surface-data-eraser.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index ef8103d135..cfda08e435 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -34,7 +34,7 @@ Compatible Surface devices include: - Surface Pro 4 -- Surface Pro3 +- Surface Pro 3 - Surface 3 From 49e9344c168716e9ebec69454b34073e2a17b5ec Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 24 Aug 2017 10:36:59 -0700 Subject: [PATCH 002/117] sync --- windows/configuration/TOC.md | 4 ++ .../wcd/wcd-applicationmanagement.md | 3 ++ .../configuration/wcd/wcd-assignedaccess.md | 10 +++++ windows/configuration/wcd/wcd-calling.md | 39 +++++++++++++++++++ windows/configuration/wcd/wcd-cellcore.md | 24 ++++++++++++ windows/configuration/wcd/wcd-cellular.md | 24 +++++++++--- windows/configuration/wcd/wcd-connections.md | 10 +++-- windows/configuration/wcd/wcd-deviceinfo.md | 39 +++++++++++++++++++ windows/configuration/wcd/wcd-hotspot.md | 39 +++++++++++++++++++ .../wcd/wcd-modemconfigurations.md | 2 +- 10 files changed, 184 insertions(+), 10 deletions(-) create mode 100644 windows/configuration/wcd/wcd-calling.md create mode 100644 windows/configuration/wcd/wcd-cellcore.md create mode 100644 windows/configuration/wcd/wcd-deviceinfo.md create mode 100644 windows/configuration/wcd/wcd-hotspot.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 8ccede5240..c7e3681029 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -69,6 +69,8 @@ #### [AutomaticTime](wcd/wcd-automatictime.md) #### [Browser](wcd/wcd-browser.md) #### [CallAndMessagingEnhancement](wcd/wcd-callandmessagingenhancement.md) +#### [Calling](wcd/wcd-calling.md) +#### [CellCore](wcd/wcd-cellcore.md) #### [Cellular](wcd/wcd-cellular.md) #### [Certificates](wcd/wcd-certificates.md) #### [CleanPC](wcd/wcd-cleanpc.md) @@ -78,6 +80,7 @@ #### [DesktopBackgroundAndColors](wcd/wcd-desktopbackgroundandcolors.md) #### [DeveloperSetup](wcd/wcd-developersetup.md) #### [DeviceFormFactor](wcd/wcd-deviceformfactor.md) +#### [DeviceInfo](wcd/wcd-deviceinfo.md) #### [DeviceManagement](wcd/wcd-devicemanagement.md) #### [DMClient](wcd/wcd-dmclient.md) #### [EditionUpgrade](wcd/wcd-editionupgrade.md) @@ -85,6 +88,7 @@ #### [FirewallConfiguration](wcd/wcd-firewallconfiguration.md) #### [FirstExperience](wcd/wcd-firstexperience.md) #### [Folders](wcd/wcd-folders.md) +#### [HotSpot](wcd/wcd-hotspot.md) #### [InitialSetup](wcd/wcd-initialsetup.md) #### [InternetExplorer](wcd/wcd-internetexplorer.md) #### [Licensing](wcd/wcd-licensing.md) diff --git a/windows/configuration/wcd/wcd-applicationmanagement.md b/windows/configuration/wcd/wcd-applicationmanagement.md index f032ce168c..1fc549f830 100644 --- a/windows/configuration/wcd/wcd-applicationmanagement.md +++ b/windows/configuration/wcd/wcd-applicationmanagement.md @@ -14,6 +14,9 @@ ms.date: 08/21/2017 Use these settings to manage app installation and management. +>[!NOTE] +>ApplicationManagement settings are not available in Windows 10, version 1709. + ## Applies to | Settings | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | diff --git a/windows/configuration/wcd/wcd-assignedaccess.md b/windows/configuration/wcd/wcd-assignedaccess.md index ad5d7551fb..6c07e9ea91 100644 --- a/windows/configuration/wcd/wcd-assignedaccess.md +++ b/windows/configuration/wcd/wcd-assignedaccess.md @@ -19,6 +19,7 @@ Use this setting to configure single use (kiosk) devices. | Setting | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | | [AssignedAccessSettings](#assignedaccesssettings) | X | | | X | | +| [MultiAppAssignedAccessSettings](#multiappassignedaccesssettings) | X | | | | | ## AssignedAccessSettings @@ -30,6 +31,15 @@ Enter the account and the application you want to use for Assigned access, using ``` "Account":"domain\user", "AUMID":"Microsoft.WindowsCalculator_8wekyb3d8bbwe!App" ``` + +## MultiAppAssignedAccessSettings + +Use this setting to configure a kiosk device that runs more than one app. + +1. [Create an assigned access configuration XML file for multiple apps.](../lock-down-windows-10-to-specific-apps.md) +2. In Windows Configuration Designer, select **MultiAppAssignedAccessSettings**. +3. Browse to and select the assigned access configuration XML file. + ## Related topics - [AssignedAccess configuration service provider (CSP)](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/assignedaccess-csp) \ No newline at end of file diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md new file mode 100644 index 0000000000..8ddda73db1 --- /dev/null +++ b/windows/configuration/wcd/wcd-calling.md @@ -0,0 +1,39 @@ +--- +title: Calling (Windows 10) +description: This section describes the Calling settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +localizationpriority: medium +ms.author: jdecker +ms.date: 08/21/2017 +--- + +# Calling (Windows Configuration Designer reference) + +Use to configure settings for Calling. + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | | X | | | | + + +## Branding + + +## PartnerAppSupport + + +## PerSimSettings + + +## PhoneSettings + + +## SupplementaryServiceCodeOverrides + + +## VoicemailRegistrationTable diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md new file mode 100644 index 0000000000..8f70551a7a --- /dev/null +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -0,0 +1,24 @@ +--- +title: CellCore (Windows 10) +description: This section describes the CellCore settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +localizationpriority: medium +ms.author: jdecker +ms.date: 08/21/2017 +--- + +# CellCore (Windows Configuration Designer reference) + +Use to configure settings for CellCore. + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| | | | | | | + + + diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index 64258bbe02..c2713ed38c 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -18,10 +18,8 @@ Use to configure settings for cellular connections. | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| [AccountExperienceURL](#accountexperienceurl) | X | | | | | -| [AppID](#appid) | X | | | | | -| [NetworkBlockList](#networkblocklist) | X | | | | | -| [SIMBlockList](#simblocklist) | X | | | | | +| All settings | X | | | | | + To begin, enter a SIM integrated circuit card identifier (**SimIccid**), and click **Add**. In the **Customizations** pane, select the SimIccid that you just entered and configure the following settings for it. @@ -34,10 +32,26 @@ Enter the URL for the mobile operator's web page. Enter the AppID for the mobile operator's app in Microsoft Store. +## BrandingIcon + + +## BrandingIconPath + + + +## BrandingName + +Enter the service provider name for the mobile operator. + ## NetworkBlockList Enter a comma-separated list of mobile country code (MCC) and mobile network code (MCC) pairs (MCC:MNC). ## SIMBlockList -Enter a comma-separated list of mobile country code (MCC) and mobile network code (MCC) pairs (MCC:MNC). \ No newline at end of file +Enter a comma-separated list of mobile country code (MCC) and mobile network code (MCC) pairs (MCC:MNC). + + +## UseBrandingNameOnRoaming + +Select an option for displaying the BrandingName when the device is roaming. \ No newline at end of file diff --git a/windows/configuration/wcd/wcd-connections.md b/windows/configuration/wcd/wcd-connections.md index 1ce0db8e5b..988f19b0d5 100644 --- a/windows/configuration/wcd/wcd-connections.md +++ b/windows/configuration/wcd/wcd-connections.md @@ -18,10 +18,8 @@ Use to configure settings related to variou types of phone connections. | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| [Cellular](#cellular) | X | X | X | X | | -| [EnterpriseAPN](#enterpriseapn) | X | X | X | X | | -| [Policies](#policies) | X | X | X | X | | -| [Proxies](#proxies) | X | X | X | X | | +| All settings | X | X | X | X | | + For each setting group: 1. In **Available customizations**, select the setting group (such as **Cellular**), enter a friendly name for the connection, and then click **Add**. @@ -36,6 +34,10 @@ See [CM_CellularEntries configuration service provider (CSP)](https://msdn.micro See [Configure cellular settings for tablets and PCs](https://docs.microsoft.com/windows/configuration/provisioning-apn) and [EnterpriseAPN CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterpriseapn-csp) for settings and values. +## General + +Use **General > DataRoam** to set the default value for the **Default romaing options** option in the **Settings > cellular + SIM"" area on the device. + ## Policies See [CMPolicy CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/cmpolicy-csp) for settings and values. diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md new file mode 100644 index 0000000000..cb446c9eb9 --- /dev/null +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -0,0 +1,39 @@ +--- +title: DeviceInfo (Windows 10) +description: This section describes the DeviceInfo settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +localizationpriority: medium +ms.author: jdecker +ms.date: 08/21/2017 +--- + +# DeviceInfo (Windows Configuration Designer reference) + +Use to configure settings for DeviceInfo. + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | | X | | | | + + +## PhoneMobileOperatorDisplayName + + +## PhoneMobileOperatorName + + +## PhoneOEMSupportLink + + +## PhoneSupportLink + + +## PhoneSupportPhoneNumber + + + diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md new file mode 100644 index 0000000000..cb446c9eb9 --- /dev/null +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -0,0 +1,39 @@ +--- +title: DeviceInfo (Windows 10) +description: This section describes the DeviceInfo settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +localizationpriority: medium +ms.author: jdecker +ms.date: 08/21/2017 +--- + +# DeviceInfo (Windows Configuration Designer reference) + +Use to configure settings for DeviceInfo. + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | | X | | | | + + +## PhoneMobileOperatorDisplayName + + +## PhoneMobileOperatorName + + +## PhoneOEMSupportLink + + +## PhoneSupportLink + + +## PhoneSupportPhoneNumber + + + diff --git a/windows/configuration/wcd/wcd-modemconfigurations.md b/windows/configuration/wcd/wcd-modemconfigurations.md index dc45dff1ef..fbe3f9a675 100644 --- a/windows/configuration/wcd/wcd-modemconfigurations.md +++ b/windows/configuration/wcd/wcd-modemconfigurations.md @@ -12,7 +12,7 @@ ms.date: 08/21/2017 # ModemConfiguration (Windows Configuration Designer reference) -Documentation not available at this time. +ModemConfiguration settings are removed in Windows 10, version 1709. ## Applies to From 71ece326fe9394df3831c25d0a6a2ab33a4643c1 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 24 Aug 2017 12:47:39 -0700 Subject: [PATCH 003/117] sync --- windows/configuration/wcd/wcd-hotspot.md | 99 +++++++++++++++++++++--- 1 file changed, 87 insertions(+), 12 deletions(-) diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md index cb446c9eb9..12b6da9fd5 100644 --- a/windows/configuration/wcd/wcd-hotspot.md +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -1,6 +1,6 @@ --- -title: DeviceInfo (Windows 10) -description: This section describes the DeviceInfo settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +title: HotSpot (Windows 10) +description: This section describes the HotSpot settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library @@ -10,30 +10,105 @@ ms.author: jdecker ms.date: 08/21/2017 --- -# DeviceInfo (Windows Configuration Designer reference) +# HotSpot (Windows Configuration Designer reference) -Use to configure settings for DeviceInfo. +Use HotSpot settings to configure Internet sharing. ## Applies to | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| All settings | | X | | | | +| All settings | X | X | X | X | X | -## PhoneMobileOperatorDisplayName +## DedicatedConnections +(Optional) Set DedicatedConnections to a semicolon-separated list of connections. -## PhoneMobileOperatorName +Specifies the list of Connection Manager cellular connections that Internet sharing will use as public connections. +By default, any available connection will be used as a public connection. However, this node allows a mobile operator to specify one or more connection names to use as public connections. -## PhoneOEMSupportLink +Specified connections will be mapped, by policy, to the Internet sharing service. All attempts to enumerate Connection Manager connections for the Internet sharing service will return only the mapped connections. +The mapping policy will also include the connection specified in the TetheringNAIConnection value as well. + + If the specified connections do not exist, Internet sharing will not start because it will not have any cellular connections available to share. + + + +## Enabled + +Specify **True** to enable Internet sharing on the device or **False** to disable Internet sharing. + +If Enabled is initially set to **True**, the feature is turned off and the internet sharing screen is removed from Settings so that the user cannot access it. Configuration changes or connection sharing state changes will not be possible. + +When Enabled is set to **False**, the internet sharing screen is added to Settings, although sharing is turned off by default until the user turns it on. + + +## MaxBluetoothUsers + +(Optional) Specify the maximum number of simultaneous Bluetooth users that can be connected to a device while sharing over Bluetooth. Set MaxBluetoothUsers to an integer value between 1 and 7 inclusive. The default value is 7. + + +## MaxUsers + +(Optional) Specify the maximum number of simultaneous users that can be connected to a device while sharing. Set MaxUsers to an integer value between 1 and 8 inclusive. The default value is 5. + + +## MOAppLink + +(Optional) Enter an application link that points to a pre-installed application, provided by the mobile operator. that will help a user to subscribe to the mobile operator's Internet sharing service when Internet sharing is not provisioned or entitlement fails. + +Set MOAppLink to a valid app ID. The general format for the link is *app://MOappGUID*. For example, if your app ID is `12345678-9012-3456-7890-123456789012`, you must set the value to `app://12345678-9012-3456-7890-123456789012`. + + +## MOHelpMessage + +(Optional) Enter a reference to a localized string, provided by the mobile operator, that is displayed when Internet sharing is not enabled due to entitlement failure. The node takes a language-neutral registry value string, which has the following form: + +``` +@,- +``` + +Where `` is the resource dll that contains the string and `` is the string identifier. For more information on language-neutral string resource registry values, see [Using Registry String Redirection](https://msdn.microsoft.com/library/windows/desktop/dd374120.aspx). + +## MOHelpNumber + +(Optional) Enter a mobile operator–specified phone number that is displayed to the user when the Internet sharing service fails to start. The user interface displays a message informing the user that they can call the specified number for help. + + + +## MOInfoLink + +(Optional) Enter a mobile operator–specified HTTP link that is displayed to the user when Internet sharing is disabled or the device is not entitled. The user interface displays a message informing the user that they can visit the specified link for more information about how to enable the feature. + +## PeerlessTimeout + +(Optional) Enter the time-out period, in minutes, after which Internet sharing should automatically turn off if there are no active clients. + +Set PeerlessTimeout to any value between 1 and 120 inclusive. A value of 0 is not supported. The default value is 5 minutes. + +## PublicConnectionTimeout + +(Optional) Enter the time-out value, in minutes, after which Internet sharing is automatically turned off if a cellular connection is not available. + +Set PublicConnectionTimeout to any value between 1 and 60 inclusive. The default value is 20 minutes. A value of 0 is not supported. + + +## TetheringNAIConnection + +(Optional) Specify the CDMA TetheringNAI Connection Manager cellular connection that Internet sharing will use as a public connection. Set TetheringNAIConnection to the CDMA TetheringNAI Connection Manager cellular connection. + +If a CDMA mobile operator requires using a Tethering NAI during Internet sharing, they must configure a TetheringNAI connection and then specify the connection in this node. + +Specified connections will be mapped, by policy, to the Internet sharing service. All attempts to enumerate Connection Manager connections for the Internet sharing service will return only the mapped connections.The mapping policy will also include the connection specified in the TetheringNAIConnection value as well. + +If the specified connections do not exist, Internet sharing will not start because it will not have any cellular connections available to share. + +>[!NOTE] +>CDMA phones are limited to one active data connection at a time. This means any application or service (such as e-mail or MMS) that is bound to another connection may not work while Internet sharing is turned on. -## PhoneSupportLink - - -## PhoneSupportPhoneNumber From 3779543b21ab2772881c64e42a6ee097bcbfc3a1 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 24 Aug 2017 13:39:16 -0700 Subject: [PATCH 004/117] sync --- windows/configuration/wcd/wcd-messaging.md | 163 ++++++++++++--------- 1 file changed, 94 insertions(+), 69 deletions(-) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index a00378d147..6d293cd087 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -12,7 +12,10 @@ ms.date: 08/21/2017 # Messaging (Windows Configuration Designer reference) -Use for settings related to Messaging. +Use for settings related to Messaging and Commercial Mobile Alert System (CMAS). + +>[!NOTE] +>CMAS is now known as Wireless Emergency Alerts (WEA). ## Applies to @@ -20,22 +23,58 @@ Use for settings related to Messaging. | --- | :---: | :---: | :---: | :---: | :---: | | All settings | | X | | | | -## GlobalSettings > ShowSendingStatus +## GlobalSettings -Set **ShowSendingStatus** to **True** to display the sending status for SMS/MMS messages. +### DisplayCmasLifo -## PerSimSettings > _ICCID +Use this setting to change the order in which CMAS alert messages are displayed, from the default FIFO to LIFO. -Use to configure settings for each subscriber identification module (SIM) card. +If the phone receives at least one CMAS alert message which has not been acknowledged by the user, and another CMAS alert message arrives on the phone, partners can configure the order in which the newly received alert messages are displayed on the phone regardless of the service category of the alert. Users will not be able to change the display order once it has been set. -### AllowSelectAllContacts +If partners do not specify a value for this customization, the default first in/first out (FIFO) display order is used. -Set to **True** to show the select all contacts/unselect all menu option to allow users to easily select multiple recipients for an SMS or MMS message. This menu option provides users with an easier way to add multiple recipients and may also meet a mandatory requirement for some mobile operator networks. +Users will be able to acknowledge the messages in the reverse order they were received. -Windows 10 Mobile supports the following select multiple recipients features: +When configured as **True**, you set a last in/first out (LIFO) message order. When configured as **False**, you set a first in/first out (FIFO) message order. -- A multi-select chooser, which enables users to choose multiple contacts. -- A **select all contacts/unselect all** menu option, which enables users to select or unselect all their contacts. This option is not shown by default and must be enabled by the OEM. +### EnableCustomLineSetupDialog + + +### VoicemailIntercept + +Partners can define a filter that intercepts an incoming SMS message and triggers visual voicemail synchronization. The filtered message does not appear in the user’s conversation list. + +A visual voicemail sync is triggered by an incoming SMS message if the following conditions are met: + +- The message sender value starts with the string specified in the SyncSender setting. The length of the specified values must be greater than 3 characters but less than 75 characters. + +- The body of the message starts with the string specified in the SyncPrefix setting. The length of the specified values must be greater than 3 characters but less than 75 characters. + +- Visual voicemail is configured and enabled. For more information, see [Visual voicemail](https://msdn.microsoft.com/library/windows/hardware/dn790032.aspx). + +>[!NOTE] +>These settings are atomic, so both SyncSender and SyncPrefix must be set. +> +>The SyncSender and SyncPrefix values vary for each mobile operator, so you must work with your mobile operators to obtain the correct or required values. + +Setting | Description +--- | --- +SyncPrefix | Specify a value for SyncPrefix that is greater than 3 characters but less than 75 characters in length. For networks that support it, this value can be the keyword for the SMS notification. +SyncSender | Specify a value for SyncSender that is greater than 3 characters but less than 75 characters in length. For networks that support it, this value can be a short code of the mailbox server that sends a standard SMS notification. + + + +## PerSimSettings + +Use to configure settings for each subscriber identification module (SIM) card. Enter the Integrated Circuit Card Identifier (ICCID) for the SIM card, click **Add**, and then configure the folowing settings. + +### AllowMmsIfDataIsOff + +Setting | Description +--- | --- +AllowMmsIfDataIsOff | **True** allows MMS if data is off +AllowMmsIfDataIsOffSupported | **True** shows the toggle for allowing MMS if data is turned off +AllowMmsIfDataIsOffWhileRoaming | **True** allows MMS if data is off while roaming ### AllowSendingDeliveryReport @@ -55,30 +94,60 @@ Specify whether MMS messages are automatically downloaded. | AutomaticallyDownload | **True** sets the **Automatically download MMS** toggle to **On** | | ShowAutomaticallyDownloadMMSToggle | **True** shows the **Automatically download MMS** toggle, and **False** hides the toggle | -### DefaultContentLocationUrl -For networks that require it, you can specify the default GET path within the MMSC to use when the GET URL is missing from the WAP push MMS notification. +### EmergencyAlertOptions -Set **DefaultContentLocationUrl** to specify the default GET path within the MMSC. +Configure settings for CMAS alerts. -### ErrorCodeEnabled - -You can choose to display additional content in the conversation view when an SMS or MMS message fails to send. This content includes a specific error code in decimal format that the user can report to technical support. Common errors also include a friendly string to help the user self-diagnose and fix the problem. - -Set to **True** to display the error message with an explanation of the problem and the decimal-format error codes. When set to **False**, the full error message is not displayed. +Setting | Description +--- | --- +CmasAMBERAlertEnabled | **True** enables the device to receive AMBER alerts +CmasExtremeAlertEnabled | **True** enables the device to receive extreme alerts +CmasSevereAlertEnabled | **True** enables the device to receive severe alerts +EmOperatorEnabled | Select which Emergency Alerts Settings page is displayed from dropdown menu +SevereAlertDependentOnExtremeAlert | When set as **True**, the CMAS-Extreme alert option must be on to modify CMAS-Severe alert option -### ImsiAuthenticationToken +### General -Configure whether MMS messages include the IMSI in the GET and POST header. +Setting | Description +--- | --- +AllowSelectAllContacts | Set to **True** to show the **select all contacts/unselect all** menu option to allow users to easily select multiple recipients for an SMS or MMS message. This menu option provides users with an easier way to add multiple recipients and may also meet a mandatory requirement for some mobile operator networks. Windows 10 Mobile supports the following select multiple recipients features:

- A multi-select chooser, which enables users to choose multiple contacts.
- A **select all contacts/unselect all** menu option, which enables users to select or unselect all their contacts. This option is not shown by default and must be enabled by the OEM. +AllowSMStoSMTPAddress | +AssistedDialingMcc | +AssistedDialingMnc | +AssistedDialingPlusCodeSupportOverride | +AutoRetryDownload | +BroadcastChannels | +ConvertLongSMStoMMS | +DefaultContentLocationUrl | For networks that require it, you can specify the default GET path within the MMSC to use when the GET URL is missing from the WAP push MMS notification. Set DefaultContentLocationUrl to specify the default GET path within the MMSC. +ErrorCodeEnabled | You can choose to display additional content in the conversation view when an SMS or MMS message fails to send. This content includes a specific error code in decimal format that the user can report to technical support. Common errors also include a friendly string to help the user self-diagnose and fix the problem. Set to **True** to display the error message with an explanation of the problem and the decimal-format error codes. When set to **False**, the full error message is not displayed. +HideMediumSIPopups | +ImsiAuthenticationToken | Configure whether MMS messages include the IMSI in the GET and POST header. Set ImsiAuthenticationToken to the token used as the header for authentication. The string value should match the IMSI provided by the UICC. +LimitRecipients | +MaxRetryCount | You can specify the number of times that the phone can retry sending the failed MMS message and photo before the user receives a notification that the photo could not be sent. Specify MaxRetryCount to specify the number of times the MMS transport will attempt resending the MMS message. This value has a maximum limit of 3. +MMXLimitAttachments | +RetrySize | +SetCacheControlNoTransform | +ShowRequiredMonthlyTest | +SmscPanelDisabled | +SMStoSMTPShortCode | +TargetVideoFormat | You can specify the transcoding to use for video files sent as attachments in MMS messages. Set TargetVideoFormat to one of the following values to configure the default transcoding for video files sent as attachments in MMS messages:

- 0 or 0x0 Sets the transcoding to H.264 + AAC + MP4. This is the default set by the OS.
- 1 or 0x1 Sets the transcoding to H.264 + AAC + 3GP.
- 2 or 0x2 Sets the transcoding to H.263 + AMR.NB + 3GP.
- 3 or 0x3 Sets the transcoding to MPEG4 + AMR.NB + 3GP. +UAProf | You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. There are two ways to correlate a user agent profile with a given phone:

- You can take the user agent string of the phone that is sent with MMS requests and use it as a hash to map to the user agent profile on the MMSC. The user agent string cannot be modified.
- Alternatively, you can directly set the URI of the user agent profile on the phone.

Set UAProf to the full URI of your user agent profile file. Optionally, you can also specify the custom user agent property name for MMS that is sent in the header by setting UAProfToken to either `x-wap-profile` or `profile`. +UAProfToken | You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. +UseDefaultAddress | +UserAgentString | Set UserAgentString to the new user agent string for MMS in its entirely. By default, this string has the format WindowsPhoneMMS/MicrosoftMMSVersionNumber WindowsPhoneOS/OSVersion-buildNumber OEM-deviceName, in which the italicized text is replaced with the appropriate values for the phone. +UseUTF8ForUnspecifiedCharset | +WapPushTechnology | For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values.

- 1 or 0x1 Enables MMS messages to have some of their content truncated
- 0 or 0x0 Disables MMS messages from being truncated -Set **ImsiAuthenticationToken** to the token used as the header for authentication. The string value should match the IMSI provided by the UICC. -### MaxRetryCount +### LatAlertOptions -You can specify the number of times that the phone can retry sending the failed MMS message and photo before the user receives a notification that the photo could not be sent. -Specify MaxRetryCount to specify the number of times the MMS transport will attempt resending the MMS message. This value has a maximum limit of 3. +### MMSGroupText + + +### NIAlertOptions ### RcsOptions @@ -103,43 +172,7 @@ Set options related to MMS message notifications. You can specify whether users | RequestDeliveryReportIsSupported | **True** shows the toggle for MMS delivery confirmation, and **False** hides the toggle. | -### TargetVideoFormat - -You can specify the transcoding to use for video files sent as attachments in MMS messages. - -Set TargetVideoFormat to one of the following values to configure the default transcoding for video files sent as attachments in MMS messages: - -| Value | Description | -| --- | --- | -| 0 or 0x0 | Sets the transcoding to H.264 + AAC + MP4. This is the default set by the OS. | -| 1 or 0x1 | Sets the transcoding to H.264 + AAC + 3GP. | -| 2 or 0x2 | Sets the transcoding to H.263 + AMR.NB + 3GP. | -| 3 or 0x3 | Sets the transcoding to MPEG4 + AMR.NB + 3GP. | - - -### UAProf - -You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. - -There are two ways to correlate a user agent profile with a given phone: -- You can take the user agent string of the phone that is sent with MMS requests and use it as a hash to map to the user agent profile on the MMSC. The user agent string cannot be modified. -- Alternatively, you can directly set the URI of the user agent profile on the phone. - -Set **UAProf** to the full URI of your user agent profile file. Optionally, you can also specify the custom user agent property name for MMS that is sent in the header by setting **UAProfToken** to either `x-wap-profile` or `profile`. - - -### UAProfToken - -You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. - -Optionally, in addition to specifying **UAProf**, you can also specify the custom user agent property name for MMS that is sent in the header by setting **UAProfToken** to either `x-wap-profile` or `profile`. - - -### UserAgentString - -Set **UserAgentString** to the new user agent string for MMS in its entirely. - -By default, this string has the format WindowsPhoneMMS/MicrosoftMMSVersionNumber WindowsPhoneOS/OSVersion-buildNumber OEM-deviceName, in which the italicized text is replaced with the appropriate values for the phone. +### SMSDeliveryNotify ### w4 @@ -155,14 +188,6 @@ By default, this string has the format WindowsPhoneMMS/MicrosoftMMSVersionNumber -### WapPushTechnology - -For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values. - -| Value | Description | -| --- | --- | -| 1 or 0x1 | Enables MMS messages to have some of their content truncated. | -| 0 or 0x0 | Disables MMS messages from being truncated. | From 302769f2ba437df956a7b4ff5e38096b9f65c6a6 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 24 Aug 2017 13:55:12 -0700 Subject: [PATCH 005/117] sync --- windows/configuration/wcd/wcd-messaging.md | 4 ---- 1 file changed, 4 deletions(-) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 6d293cd087..c1fa0ad26e 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -190,7 +190,3 @@ Set options related to MMS message notifications. You can specify whether users - -## Related topics - -- [w4 APPLICATION CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/w4-application-csp) \ No newline at end of file From 9730db49c822026e44334e0fec51901d4e0f1b9f Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 25 Aug 2017 06:13:00 -0700 Subject: [PATCH 006/117] sync --- windows/configuration/wcd/wcd-assignedaccess.md | 2 +- windows/configuration/wcd/wcd-connections.md | 2 +- windows/configuration/wcd/wcd-messaging.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/configuration/wcd/wcd-assignedaccess.md b/windows/configuration/wcd/wcd-assignedaccess.md index 6c07e9ea91..00063dffc9 100644 --- a/windows/configuration/wcd/wcd-assignedaccess.md +++ b/windows/configuration/wcd/wcd-assignedaccess.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/05/2017 --- # AssignedAccess (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-connections.md b/windows/configuration/wcd/wcd-connections.md index 988f19b0d5..7162f40525 100644 --- a/windows/configuration/wcd/wcd-connections.md +++ b/windows/configuration/wcd/wcd-connections.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/05/2017 --- # Connections (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index c1fa0ad26e..2025fea22f 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/05/2017 --- # Messaging (Windows Configuration Designer reference) From 49bf7f911e5fdfb2a3daefc92857afbbf69ab0fe Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 29 Aug 2017 13:38:04 -0700 Subject: [PATCH 007/117] sync --- windows/configuration/wcd/wcd-messaging.md | 25 +++++++++++----------- 1 file changed, 12 insertions(+), 13 deletions(-) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 2025fea22f..7281b5497d 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -27,19 +27,18 @@ Use for settings related to Messaging and Commercial Mobile Alert System (CMAS). ### DisplayCmasLifo -Use this setting to change the order in which CMAS alert messages are displayed, from the default FIFO to LIFO. +Use this setting to change the order in which CMAS alert messages are displayed, from the default first in/first out (FIFO) message order to last in/first out (LIFO) message order. -If the phone receives at least one CMAS alert message which has not been acknowledged by the user, and another CMAS alert message arrives on the phone, partners can configure the order in which the newly received alert messages are displayed on the phone regardless of the service category of the alert. Users will not be able to change the display order once it has been set. +If the phone receives at least one CMAS alert message which has not been acknowledged by the user, and another CMAS alert message arrives on the phone, partners can configure the order in which the newly received alert messages are displayed on the phone regardless of the service category of the alert. Users will not be able to change the message order once it has been set. -If partners do not specify a value for this customization, the default first in/first out (FIFO) display order is used. +If partners do not specify a value for this customization, the default FIFO display order is used. Users will be able to acknowledge the messages in the reverse order they were received. -Users will be able to acknowledge the messages in the reverse order they were received. - -When configured as **True**, you set a last in/first out (LIFO) message order. When configured as **False**, you set a first in/first out (FIFO) message order. +When configured as **True**, you set a LIFO message order. When configured as **False**, you set a FIFO message order. ### EnableCustomLineSetupDialog + ### VoicemailIntercept Partners can define a filter that intercepts an incoming SMS message and triggers visual voicemail synchronization. The filtered message does not appear in the user’s conversation list. @@ -113,13 +112,13 @@ SevereAlertDependentOnExtremeAlert | When set as **True**, the CMAS-Extreme aler Setting | Description --- | --- AllowSelectAllContacts | Set to **True** to show the **select all contacts/unselect all** menu option to allow users to easily select multiple recipients for an SMS or MMS message. This menu option provides users with an easier way to add multiple recipients and may also meet a mandatory requirement for some mobile operator networks. Windows 10 Mobile supports the following select multiple recipients features:

- A multi-select chooser, which enables users to choose multiple contacts.
- A **select all contacts/unselect all** menu option, which enables users to select or unselect all their contacts. This option is not shown by default and must be enabled by the OEM. -AllowSMStoSMTPAddress | -AssistedDialingMcc | -AssistedDialingMnc | -AssistedDialingPlusCodeSupportOverride | -AutoRetryDownload | -BroadcastChannels | -ConvertLongSMStoMMS | +AllowSMStoSMTPAddress | Allow SMS to SMTP address. +AssistedDialingMcc | By setting AssistedDialingMcc and AssistedDialingMnc, international assisted dialing will be enabled for SMS if the user setting for international assisted dialing is enabled. Enter the Mobile Country Code (MCC) to use for sending SMS. +AssistedDialingMnc | By setting AssistedDialingMcc and AssistedDialingMnc, international assisted dialing will be enabled for SMS if the user setting for international assisted dialing is enabled. Enter the Mobile Network Code (MNC) to use for sending SMS. +AssistedDialingPlusCodeSupportOverride | For devices that support IMS over SMS, you can override support for the assisted dialing plus (+) code for SMS by setting AssistedDialingPlusCodeSupportOverride. If enabled, the OS will not convert the plus (+) code to the proper assisted number when the user turns on the dialing assist option. +AutoRetryDownload | You can configure the messaging app to automatically retry downloading an MMS message if the initial download attempt fails. When this customization is enabled, the download is retried 3 times at 20-, 40-, and 60-second intervals. +BroadcastChannels | You can specify one or more ports from which the device will accept cellular broadcast messages. Set the BroadcastChannels value to the port number(s) that can accept cellular broadcast messages. If you specify the same port that Windows 10 Mobile already recognizes as an Emergency Alert port (a CMAS or ETWS port number) and a cell broadcast message is received on that port, the user will only receive the message once. The message that is received will be displayed as an Emergency Alert message. +ConvertLongSMStoMMS | DefaultContentLocationUrl | For networks that require it, you can specify the default GET path within the MMSC to use when the GET URL is missing from the WAP push MMS notification. Set DefaultContentLocationUrl to specify the default GET path within the MMSC. ErrorCodeEnabled | You can choose to display additional content in the conversation view when an SMS or MMS message fails to send. This content includes a specific error code in decimal format that the user can report to technical support. Common errors also include a friendly string to help the user self-diagnose and fix the problem. Set to **True** to display the error message with an explanation of the problem and the decimal-format error codes. When set to **False**, the full error message is not displayed. HideMediumSIPopups | From 3fe58ab17b03d71b5a34ce54733c288209a8595e Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 30 Aug 2017 09:41:01 -0700 Subject: [PATCH 008/117] sync messaging --- windows/configuration/wcd/wcd-messaging.md | 40 ++++++++++++++-------- 1 file changed, 25 insertions(+), 15 deletions(-) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 7281b5497d..1e3dfca7eb 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -37,7 +37,7 @@ When configured as **True**, you set a LIFO message order. When configured as ** ### EnableCustomLineSetupDialog - +Enable this setting to allow custom line setup dialogs in the Messaging app. ### VoicemailIntercept @@ -118,36 +118,45 @@ AssistedDialingMnc | By setting AssistedDialingMcc and AssistedDialingMnc, inter AssistedDialingPlusCodeSupportOverride | For devices that support IMS over SMS, you can override support for the assisted dialing plus (+) code for SMS by setting AssistedDialingPlusCodeSupportOverride. If enabled, the OS will not convert the plus (+) code to the proper assisted number when the user turns on the dialing assist option. AutoRetryDownload | You can configure the messaging app to automatically retry downloading an MMS message if the initial download attempt fails. When this customization is enabled, the download is retried 3 times at 20-, 40-, and 60-second intervals. BroadcastChannels | You can specify one or more ports from which the device will accept cellular broadcast messages. Set the BroadcastChannels value to the port number(s) that can accept cellular broadcast messages. If you specify the same port that Windows 10 Mobile already recognizes as an Emergency Alert port (a CMAS or ETWS port number) and a cell broadcast message is received on that port, the user will only receive the message once. The message that is received will be displayed as an Emergency Alert message. -ConvertLongSMStoMMS | +ConvertLongSMStoMMS | For networks that do support MMS and do not support segmentation of SMS messages, you can specify an automatic switch from SMS to MMS for long messages. DefaultContentLocationUrl | For networks that require it, you can specify the default GET path within the MMSC to use when the GET URL is missing from the WAP push MMS notification. Set DefaultContentLocationUrl to specify the default GET path within the MMSC. ErrorCodeEnabled | You can choose to display additional content in the conversation view when an SMS or MMS message fails to send. This content includes a specific error code in decimal format that the user can report to technical support. Common errors also include a friendly string to help the user self-diagnose and fix the problem. Set to **True** to display the error message with an explanation of the problem and the decimal-format error codes. When set to **False**, the full error message is not displayed. -HideMediumSIPopups | +HideMediumSIPopups | By default, when a service indication message is received with a signal-medium or signal-high setting, the phone interrupts and shows the user prompt for these messages. However, you can hide the user prompts for signal-medium messages. ImsiAuthenticationToken | Configure whether MMS messages include the IMSI in the GET and POST header. Set ImsiAuthenticationToken to the token used as the header for authentication. The string value should match the IMSI provided by the UICC. -LimitRecipients | +LimitRecipients | Set the maximum number of recipients to which a single SMS or MMS message can be sent. Enter a number between 1 and 500 to limit the maximum number of recipients. MaxRetryCount | You can specify the number of times that the phone can retry sending the failed MMS message and photo before the user receives a notification that the photo could not be sent. Specify MaxRetryCount to specify the number of times the MMS transport will attempt resending the MMS message. This value has a maximum limit of 3. -MMXLimitAttachments | -RetrySize | -SetCacheControlNoTransform | -ShowRequiredMonthlyTest | -SmscPanelDisabled | -SMStoSMTPShortCode | +MMSLimitAttachments | You can specify the maximum number of attachments for MMS messages, from 1 to 20. The default is 5. +RetrySize | For MMS messages that have photo attachments and that fail to send, you can choose to automatically resize the photo and attempt to resend the message. Specify the maximum size to use to resize the photo in KB. Minimum is 0xA (10 KB). +SetCacheControlNoTransform | When set, proxies and transcoders are instructed not to change the HTTP header and the content should not be modified. A value of 1 or 0x1 adds support for the HTTP header Cache-Control No-Transform directive. When the SetCacheControlNoTransform``Value is set to 0 or 0x0 or when the setting is not set, the default HTTP header Cache-Control No-Cache directive is used. +ShowRequiredMonthlyTest | **True** enables devices to receive CMAS Required Monthly Test (RMT) messages and have these show up on the device. **False** disables devices from receiving CMAS RMT messages. +SmscPanelDisabled | **True** disables the short message service center (SMSC) panel. +SMStoSMTPShortCode | Use to configure SMS messages to be sent to email addresses and phone numbers. `0` disables sending SMS messages to SMTP addresses. `1` enables sending SMS messages to SMTP addresses. TargetVideoFormat | You can specify the transcoding to use for video files sent as attachments in MMS messages. Set TargetVideoFormat to one of the following values to configure the default transcoding for video files sent as attachments in MMS messages:

- 0 or 0x0 Sets the transcoding to H.264 + AAC + MP4. This is the default set by the OS.
- 1 or 0x1 Sets the transcoding to H.264 + AAC + 3GP.
- 2 or 0x2 Sets the transcoding to H.263 + AMR.NB + 3GP.
- 3 or 0x3 Sets the transcoding to MPEG4 + AMR.NB + 3GP. UAProf | You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. There are two ways to correlate a user agent profile with a given phone:

- You can take the user agent string of the phone that is sent with MMS requests and use it as a hash to map to the user agent profile on the MMSC. The user agent string cannot be modified.
- Alternatively, you can directly set the URI of the user agent profile on the phone.

Set UAProf to the full URI of your user agent profile file. Optionally, you can also specify the custom user agent property name for MMS that is sent in the header by setting UAProfToken to either `x-wap-profile` or `profile`. UAProfToken | You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. -UseDefaultAddress | +UseDefaultAddress | By default, the MMS transport sends an acknowledgement to the provisioned MMS application server (MMSC). However, on some networks, the correct server to use is sent as a URL in the MMS message. In that case, a registry key must be set, or else the acknowledgement will not be received and the server will continue to send duplicate messages. **True** enables some networks to correctly acknowledge MMS messages. **False** disables the feature. UserAgentString | Set UserAgentString to the new user agent string for MMS in its entirely. By default, this string has the format WindowsPhoneMMS/MicrosoftMMSVersionNumber WindowsPhoneOS/OSVersion-buildNumber OEM-deviceName, in which the italicized text is replaced with the appropriate values for the phone. -UseUTF8ForUnspecifiedCharset | -WapPushTechnology | For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values.

- 1 or 0x1 Enables MMS messages to have some of their content truncated
- 0 or 0x0 Disables MMS messages from being truncated +UseUTF8ForUnspecifiedCharset | Some incoming MMS messages may not specify a character encoding. To properly decode MMS messages that do not specify a character encoding, you can set UTF-8 to decode the message. +WapPushTechnology | For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values. `1` or `0x1` enables MMS messages to have some of their content truncated. `0` or `0x0` disables MMS messages from being truncated ### LatAlertOptions +Enable `LatLocalAlertEnabled` to enable support for LAT-Alert Local Alerts for devices sold in Chile. For more information, see [Emergency notifications](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/emergency-notifications). ### MMSGroupText +Set options for group messages sent to multiple people. + +Setting | Description +--- | --- +MMSGroupText | **True** enables group messages to multiple people sent as MMS. +ShowMMSGroupTextUI | **True** shows the toggle for group text in messaging settings. +ShowMmsGroupTextWarning | **True** shows the warning that alerts users of possible additional charges before sending a group text as MMS. ### NIAlertOptions +Enable `NI2AlertEnabled` to enable support for the Netherlands Announcements for devices sold in the Netherlands. For more information, see [Emergency notifications](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/emergency-notifications). ### RcsOptions @@ -179,7 +188,7 @@ Set options related to MMS message notifications. You can specify whether users | Setting | Description | | --- | --- | | ADDR | Specify the absolute MMSC URL. The possible values to configure the ADDR parameter are:

- A Uniform Resource Identifier (URI)
- An IPv4 address represented in decimal format with dots as delimiters
- A fully qualified Internet domain name | -| APPID | Set to `w4` | +| APPID | Set to `w4`. | | MS | (optional) Specify the maximum size of MMS, in KB. If the value is not a number, or is less than or equal to 10, it will be ignored and outgoing MMS will not be resized. | | NAME | (optional) Enter user–readable application identity. This parameter is also used to define part of the registry path for the APPLICATION parameters. The possible values to configure the **NAME** parameter are:

- Character string containing the name
- no value specified

If no value is specified, the registry location will default to . If **NAME** is greater than 40 characters, it will be truncated to 40 characters. | | TONAPID | Specify the network access point identification name (NAPID) defined in the provisioning file. This parameter takes a string value. It is only possible to refer to network access points defined within the same provisioning file (except if the INTERNET attribute is set in the NAPDEF characteristic). For more information about the NAPDEF characteristic, see [NAPDEF configuration service provider](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/napdef-csp). | @@ -188,4 +197,5 @@ Set options related to MMS message notifications. You can specify whether users - +## Related topics + - [Customizations for SMS and MMS](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/customizations-for-sms-and-mms) From aacf873a2fe3db52a25500bcfbce08f0dcf7ac25 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 30 Aug 2017 14:00:22 -0700 Subject: [PATCH 009/117] sync --- windows/configuration/wcd/wcd-calling.md | 107 +++++++++++++++++++++++ 1 file changed, 107 insertions(+) diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index 8ddda73db1..2f8eb2ad26 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -23,17 +23,124 @@ Use to configure settings for Calling. ## Branding +See [Branding for phone calls](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/branding-for-phone-calls). ## PartnerAppSupport +See [Dialer codes to launch diagnostic applications](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/dialer-codes-to-launch-diagnostic-applications). ## PerSimSettings +Use to configure settings for each subscriber identification module (SIM) card. Enter the Integrated Circuit Card Identifier (ICCID) for the SIM card, click Add, and then configure the folowing settings. + +### Critical + +Setting | Description +--- | --- +MOSimFallbackVoicemailNumber | Partners who do not have the voicemail numbers on the device SIM can configure the voicemail number for their devices. If the voicemail number is not on the SIM and the registry key is not set, the default voicemail will not be set and the user will need to set the number. Set MOSimFallbackVoicemailNumber to the voicemail number that you want to use for the phone. +SimOverrideVoicemailNumber | Mobile operators can override the voicemail number on the UICC with a different voicemail number that is configured in the registry. Set SimOverrideVoicemailNumber to a string that contains the digits of the voicemail number to use instead of the voicemail number on the UICC. + + +### General + +Setting | Description +--- | --- +AllowVideoConferencing | Set as **True** to enable the ability to conference video calls. +DefaultCallerIdSetting | Configure the default setting for caller ID. Select between `No one`, `Only contacts`, `Every one`, and `Network default`. If set to `Network default`, set `ShowCallerIdNetworkDefaultSetting` to **True**. +DefaultEnableVideoCalling | Set as **True** to enable LTE video calling as the default setting. +IgnoreMWINotifications | Set as **True** to configure the voicemail system so the phone ignores message waiting indicator (MWI) notifications. +IgnoreUssdExclusions | Set as **True** to ignore Unstructured Supplementary Service Data (USSD) exclusions. +ResetCallForwarding | When set to **True**, user is provided with an option to retry call forwarding settings query. +ShowCallerIdNetworkDefaultSetting | Indicates whether the network default setting can be allowed for outgoing caller ID. +ShowVideoCallingSwitch | Use to specify whether to show the video capability sharing switch on the mobile device's Settings screen. +SupressVideoCallingChargesDialog | Configure the phone settings CPL to supress the video calling charges dialog. +UssdExclusionList | List used to exclude predefined USSD entries, allowing the number to be sent as standard DTMF tones instead. Set UssdExclusionList to the list of desired exclusions, separated by semicolons. For example, setting the value to 66;330 will override 66 and 330. Leading zeros are specified by using F. For example, to override code 079, set the value to F79. If you set UssdExclusionList, you must set IgnoreUssdExclusions as well. Otherwise, the list will be ignored. See [List of USSD codes](#list-of-ussd-codes) for values. +WiFiCallingOperatorName | Enter the operator name to be shown when the phone is using WiFi calling. If you don't set a value for WiFiCallingOperatorName, the device will always display **SIMServiceProviderName Wi-Fi**, where *SIMServiceProviderName* is a string that corresponds to the SPN for the SIM on the device. If the service provider name in the SIM is not set, only **Wi-Fi** will be displayed. + + ## PhoneSettings +Setting | Description +--- | --- +AssistedDialSetting | Turn off the international assist feature that helps users with the country codes needed for dialing international phone numbers. +CallIDMatch | Sets the number of digits that the OS will try to match against contacts for Caller ID. For any country/region that doesn't exist in the default mapping table, mobile operators can use this legacy CallIDMatch setting to specify the minimum number of digits to use for matching caller ID. +ContinuousDTMFEnabled | Enable DTMF tone duration for as long as the user presses a dialpad key. +DisableVoicemailPhoneNumberDisplay | Disable the display of the voicemail phone number below the Voicemail label in call progress dialog. +HideCallForwarding | Partners can hide the user option to turn on call forwarding. By default, users can decide whether to turn on call forwarding. Partners can hide this user option so that call forwarding is permanently disabled. +ShowLongTones | Partners can make a user option visible that makes it possible to toggle between short and long DTMF tones, instead of the default continuous tones. By default, the phone supports Dual-Tone Multi-frequency (DTMF) with continuous tones. Partners can make a user option visible that makes it possible to toggle between short and long tones instead. +UseOKForUssdDialogs | OEMs can change the button label in USSD dialogs from **Close** (the default) to **OK**. +VoLTEAudioQualityString | Partners can add a string to the call progress screen to indicate if the active call is a high quality voice over LTE (VoLTE). Set the value of VoLTEAudioQualityString to the string that you want to display in the call progress screen to indicate that the call is a VoLTE call. This string is combined with the PLMN so if the string is "VoLTE", the resulting string is "PLMN_String VoLTE". For example, the string displayed in the call progress screen can be "Litware VoLTE" if the PLMN_String is "Litware". The value you specify for VoLTEAudioQualityString must exceed 10 characters. + ## SupplementaryServiceCodeOverrides +See [Dialer codes for supplementary services](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/dialer-codes-for-supplementary-services). ## VoicemailRegistrationTable + +Setting | Description +--- | --- +Entries | +ProviderRegistration | + + +## List of USSD codes + + +Codes | Description | DWORD Value +--- | --- | +04 | CHANGEPIN | 000000F4 +042 | CHANGEPIN2 | 00000F42 +05 | UNBLOCKPIN | 000000F5 +052 | UNBLOCKPIN2 | 00000F52 +03 | SSCHANGEPASSWORD | 000000F3 +75 | EMLPPBASE | 00000075 +750 | EMLPPLEVEL0 | 00000750 +751 | EMLPPLEVEL1 | 00000751 +752 | EMLPPLEVEL2 | 00000752 +753 | EMLPPLEVEL3 | 00000753 +754 | EMLPPLEVEL4 | 00000754 +66 | CALLDEFLECT | 00000066 +30 | CALLIDCLIP | 00000030 +31 | CALLIDCLIR | 00000031 +76 | CALLIDCOLP | 00000076 +77 | CALLIDCOLR | 00000077 +21 | FWDUNCONDITIONAL | 00000021 +67 | FWDBUSY | 00000067 +61 | FWDNOREPLY | 00000061 +62 | FWDNOTREACHABLE | 00000062 +002 | FWDALL | 00000FF2 +004 | FWDALLCONDITIONAL | 00000FF4 +43 | CALLWAITING | 00000043 +360 | UUSALL | 00000360 +361 | UUSSERVICE1 | 00000361 +362 | UUSSERVICE2 | 00000362 +363 | UUSSERVICE3 | 00000363 +33 | BARROUT | 00000033 +331 | BARROUTINTL | 00000331 +332 | BARROUTINTLEXTOHOME | 00000332 +35 | BARRIN | 00000035 +351 | BARRINROAM | 00000351 +330 | BARRALL | 00000330 +333 | BARRALLOUT | 00000333 +353 | BARRALLIN | 00000353 +354 | BARRINCOMINGINTERMEDIATE | 00000354 +96 | CALLTRANSFER | 00000096 +37 | CALLCOMPLETEBUSY | 00000037 +070 | PNP0 | 00000F70 +071 | PNP1 | 00000F71 +072 | PNP2 | 00000F72 +073 | PNP3 | 00000F73 +074 | PNP4 | 00000F74 +075 | PNP5 | 00000F75 +076 | PNP6 | 00000F76 +077 | PNP7 | 00000F77 +078 | PNP8 | 00000F78 +079 | PNP9 | 00000F79 +300 | CALLCNAP | 00000300 +591 | MSP1 | 00000591 +592 | MSP2 | 00000592 +593 | MSP3 | 00000593 +594 | MSP4 | 00000594 + From e97d18050f64a333ff0e1d5cd9a96167ac458cdc Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 5 Sep 2017 09:30:14 -0700 Subject: [PATCH 010/117] fix table --- windows/configuration/wcd/wcd-calling.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index 2f8eb2ad26..e070c612ac 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -89,7 +89,7 @@ ProviderRegistration | Codes | Description | DWORD Value ---- | --- | +--- | --- | --- 04 | CHANGEPIN | 000000F4 042 | CHANGEPIN2 | 00000F42 05 | UNBLOCKPIN | 000000F5 From ba96da259e3075e0ea0a042917b6133b597c81e0 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 5 Sep 2017 13:28:51 -0700 Subject: [PATCH 011/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 121 +++++++++++++++++++++- 1 file changed, 117 insertions(+), 4 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 8f70551a7a..c51ffc9ba8 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -12,13 +12,126 @@ ms.date: 08/21/2017 # CellCore (Windows Configuration Designer reference) -Use to configure settings for CellCore. +Use to configure settings for celluar data. ## Applies to -| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | -| --- | :---: | :---: | :---: | :---: | :---: | -| | | | | | | + Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core + --- | :---: | :---: | :---: | :---: | :---: + PerDevice: [CellConfigurations](#cellconfigurations) | | X | | | + PerDevice: [CellData](#celldata) CellularFailover | X | X | X | X | X + PerDevice: [CellData](#celldata) MaxNumberOfPDPContexts | | X | | | + PerDevice: [CellData](#celldata) ModemProfiles | | X | | | + PerDevice: [CellData](#celldata) PersistAtImaging | | X | | | + PerDevice: [CellUX](#cellux) (all settings) | | X | | | + PerDevice: [CGDual](#cgdual) (all settings) | | X | | | + PerDevice: [eSim](#esim) | X | X | X | X | X + PerDevice: [External](#external) (all settings) | | X | | | + PerDevice: [General](#general) (all settings) | | X | | | + PerDevice: [RCS](#rcs) (all settings) | | X | | | + PerDevice: [SMS](#sms) (all settings) | X | X | X | X | X + PerDevice: [UIX](#uix) (all settings) | | X | | | + PerDevice: [UTK](#utk) (all settings) | | X | | | + [PerlMSI](#perlmsi) | X | X | X | X | X +## PerDevice +### CellConfigurations + +NO CLUE WHAT THEY'RE CONFIGURING HERE + +1. In **CellConfiguration** > **PropertyGroups**, enter (?). +2. Select the **PropertyGroups** you just created in the **Available customizations** pane and then enter a **PropertyName** (?). +3. Select the **PropertyName** you just created in the **Available customizations** pane, and then select one of the following data types for the property: + - Binary + - Boolean + - Integer + - String +4. The data type that you selected is added in **Available customizations**. Select it to enter a value for the property. + +### CellData + +Setting | Description +--- | --- +CellularFailover | Allow or disallow cellular data failover when in limited Wi-Fi connectivity. By default, if the phone is connected to a Wi-Fi network and the data connection to a site is unsuccessful due to limited Wi-Fi connectivity, the phone will complete the connection to the site using available cellular data networks (when possible) to provide an optimal user experience. When the customization is enabled, a user option to use or not use cellular data for limited Wi-Fi connectivity becomes visible in the **Settings** > **cellular+SIM** screen. This option is automatically set to **don’t use cellular data** when the customization is enabled. +MaxNumberOfPDPContexts | Set a maximum value (1 through 4, inclusive, or 0x1 through 0x4 hexadecimal) for the number of simultaneous packet data protocol (PDP) contexts for 3GPP connections. By default, the OS enforces a maximum of four (4) simultaneous packet data protocol (PDP) contexts for 3GPP connections, and one (1) PDP context for 3GPP2 connections. You can set a different maximum value if required by their mobile operator. The same maximums apply for both roaming and non-roaming scenarios. This maximum does not include packet contexts used internally by the modem. +ModemProfiles > LTEAttachGuids | Set the value for LTEAttachGuid to the OemConnectionId GUID used for the LTE attach profile in the modem. The value is a GUID in the string format *XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX*. +PersistAtImaging > DisableAoAc | Enable or disable Always-on/Always-connected (AoAc) on the WWAN adapter. + + +### CellUX + +Setting | Description +--- | --- +APNAuthTypeDefault | Select between **Pap** and **Chap** for default APN authentication type. +APNIPTypeIfHidden | Select between **IPV4**, **IPV6**, **IPV4V6**, and **IPV4V6XLAT** for default APN IP type. +Critical > ShowVoLTEToggle | Select **Yes** to show the VoLTE toggle in the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to hide the toggle. +Disable2GByDefault | Select **Yes** to disable 2G by default. Select **No** to enable 2G. +Disabled2GNoticeDescription | Enter text to customize the notification for disabled 2G. +GenericWifiCallingErrorMessage | Enter text to customize the generic error message when a Wi-Fi calling error occurs. +Hide3GPP2ModeSelection | Select **Yes** to hide the **CDMA** option in the network **Mode** selection drop-down menu. Select **No** to show the **CDMA** option. +Hide3GPP2Selection | For 3GPP2 or CDMA phones, select **Yes** to hide the **Network Type** drop-down menu in the **SIM** settings screen. Select **No** to show **Network Type**. +Hide3GPPNetworks | For 3GPP or GSM phones, select **Yes** to hide the **Network Type** drop-down menu in the **SIM settings** screen. Select **No** to show **Network Type**. +HideAPN | Select **Yes** to hide the **add internet APN** button in the **SIM settings** screen. Select **No** to show **add internet APN**. +HideAPNAuthType | Select **Yes** to hide the APN authentication selector. Select **No** to show the APN authentication selector. +HideAPNIPType | Select **Yes** to hide the **IP type** list in the **internet APN** settings screen. Select **No** to show **IP type**. +HideDisabled2GNotice | Select **Yes** to hide the notification for disabled 2G. Select **No** to show the notification for disabled 2G. +HideHighestSpeed | Select **Yes** to hide the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show **Highest connection speed**. +HideHighestSpeed2G | Select **Yes** to hide the 2G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 2G option. +HideHighestSpeed3GOnly | Select **Yes** to hide the 3G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 3G option. +HideHighestSpeed4G | Select **Yes** to hide the 4G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G option. +HideHighestSpeed4G3GOnly | Select **Yes** to hide the 4G or 3G Only option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G or 3G Only option. +HideHighestSpeed4GOnly | Select **Yes** to hide the 4G Only option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G Only option. +HideLTEAttachAPN | Select **Yes** to hide the **LTE attach APN** button on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **LTE attach APN** button. +HideMMSAPN | Select **Yes** to hide the **add mms apn** button on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **add mms apn** button. +HideMMSAPNAuthType | Select **Yes** to hide the APN authentication type selector on the MMS APN page. Select **No** to show APN authentication selector. +HideMMSAPNIPType | Select **Yes** to hide the APN IP type selector on the MMS APN page. Select **No** to show the APN IP type selector. +HideModeSelection | Select **Yes** to hide the **Network Mode selection** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **Network Mode selection**. +HidePersoUnlock | Select **Yes** to hide the Perso unlock UI. Select **No** to show the Perso unlock UI. +HighestSpeed2G | You can customize the listed names of the connection speeds with their own character codes. To modify "2G" to another character code, change the value of HighestSpeed2G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3G | You can customize the listed names of the connection speeds with their own character codes. To modify "3G" to another character code, change the value of HighestSpeed3G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "3G Only" to another character code, change the value of HighestSpeed3GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3GPreferred | You can customize the listed names of the connection speeds with their own character codes. To modify "3G Preferred" to another character code, change the value of HighestSpeed3GPreferred. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4G | You can customize the listed names of the connection speeds with their own character codes. To modify "4G" to another character code, change the value of HighestSpeed4G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4G3GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "4G or 3G Only" to another character code, change the value of HighestSpeed4G3GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "4G Only" to another character code, change the value of HighestSpeed4GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeedTitle | You can customize the **Highest connection speed** drop-down label in the **Settings** > **Cellular+SIM** > **SIM** settings page. To change the Highest connection speed drop-down label, set HighestSpeedTitle to another string. For example, you can set this to "Preferred connection speed". +IsATTSpecific | Control the roaming text for AT&T devices. AT&T requires the phone to show a particular roaming text to meet their legal and marketing guidelines. By default, if the user chooses **roam** under **Data roaming options** in the **Settings** > **Cellular+SIM** screen, they will see the following text: *Depending on your service agreement, you might pay more when using data roaming.* If you set IsATTSpecific to **Yes**, the following roaming text will be displayed instead: *International data roaming charges apply for data usage outside the United States, Puerto Rico, and United States Virgin Islands. Don’t allow roaming to avoid international data roaming charges.* +LTEAttachGUID | Set the value for LTEAttachGuid to the OemConnectionId GUID used for the LTE attach profile in the modem. The value is a GUID in the string format *XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX*. +MMSAPNAuthTypeDefault | Select between **Pap** and **Chap** for default MMS APN authentication type. +MMSAPNIPTypeIfHidden | Select between **IPV4**, **IPV6**, **IPV4V6**, and **IPV4V6XLAT** for default MMS APN IP type. +ShowExtendedRejectCodes | When a reject code is sent by the network, partners can specify that extended error messages should be displayed instead of the standard simple error messages. This customization is only intended for use when required by the mobile operator’s network. The short versions of the extended reject message are shown in the following screens:

- Phone tile in Start

- Call History screen

- Dialer

- Call Progress screen

- Incoming Call screen

- As the status string under Settings > cellular+SIM


The long version of the extended reject message is shown under the Active Network label in Settings > cellular+SIM. Select **Yes** to show the extended error message. Select **No** to hide the extended error message. See [Error messages for reject codes](#errorreject) to see the versions of the message. +ShowHighestSpeed3GPreferred | Select **Yes** to show the **3G Preferred** option in the **Highest connection speed** drop-down menu. Select **No** to hide **3G Preferred**. +ShowManualAvoidance | Select **Yes** to show the **Switch to next network manually** button in SIMSettings when Mode Selection is CDMA on a C+G dual SIM phone. Select **No** to hide the **Switch to next network manually** button +ShowPreferredPLMNPage | +ShowSpecificWifiCallingError | +ShowViewAPN | +ShowWifiCallingEmergencyCallWarning | +ShowWifiCallingError | +SuppressDePersoUI | + + +### CGDual + +### eSim + +### External + +### General + +### RCS + +### SMS + +## PerlMSI + + + +### CellData + + +### CellUX + + +### General + + +### RCS + + +### SMS + + +### UTK + + +### VoLTE DataRoam** to set the default value for the **Default roaming options** option in the **Settings > cellular + SIM"" area on the device. Select between **DoNotRoam**, **DomesticRoaming**, or **InternationalRoaming**. ## Policies From 03ea6a5117de8b16566981a3d19d0b55d6257ed9 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 09:14:26 -0700 Subject: [PATCH 018/117] hotspot note --- windows/configuration/wcd/wcd-hotspot.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md index 12b6da9fd5..143b69429f 100644 --- a/windows/configuration/wcd/wcd-hotspot.md +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -18,8 +18,10 @@ Use HotSpot settings to configure Internet sharing. | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| All settings | X | X | X | X | X | +| All settings | | X | | | | +>[!NOTE] +>Although the HotSpot settings are available in advanced editing for multiple editions, the settings are only supported on devices running Windows 10 Mobile. ## DedicatedConnections From 0d124dc731f923256ba9938296e9675934f799f2 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 10:35:37 -0700 Subject: [PATCH 019/117] sync --- windows/configuration/TOC.md | 1 + windows/configuration/wcd/wcd-power.md | 140 +++++++++++++++++++++++++ 2 files changed, 141 insertions(+) create mode 100644 windows/configuration/wcd/wcd-power.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index c7e3681029..5738a86d30 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -103,6 +103,7 @@ #### [OtherAssets](wcd/wcd-otherassets.md) #### [Personalization](wcd/wcd-personalization.md) #### [Policies](wcd/wcd-policies.md) +#### [Power](wcd/wcd-power.md) #### [ProvisioningCommands](wcd/wcd-provisioningcommands.md) #### [SharedPC](wcd/wcd-sharedpc.md) #### [Shell](wcd/wcd-shell.md) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md new file mode 100644 index 0000000000..240eee67d8 --- /dev/null +++ b/windows/configuration/wcd/wcd-power.md @@ -0,0 +1,140 @@ +--- +title: Power (Windows 10) +description: This section describes the Power settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +localizationpriority: medium +ms.author: jdecker +ms.date: 08/21/2017 +--- + +# Power (Windows Configuration Designer reference) + +Use to configure settings for Power. + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| All settings | X | X | X | X | X | + + +## Controls + +Setting | Description +--- | --- +AllowSystemRequiredPowerRequests | +BootLowLatencyDuration | +DefaultOverlayAcPowerScheme | +DefaultOverlayDcPowerScheme | +DefaultOverlayPowerScheme | +DimTimeoutIsManuallySpecified | +EnergyEstimationEnabled | +EnforceConsoleLockScreenTimeout | +EnforceDisconnectedStandby | +HiberFiletype | +IgnoreCsComplianceCheck | +LidNotificationsAreReliable | +SmartUserPresenceConfidence | + +## EnergyEstimationEngine + +Setting | Description +--- | --- +CPU | +EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficientyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. +Display | +DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. +DisplayBacklightPowerGradient | +DisplayBacklightPowerQDenominator | +DisplayBacklightPowerQNumerator | +DisplayPanelPowerAreaFactor | +DisplayPanelPowerDpiFactor | +DisplayPanelPowerFloor | +DisplayPanelPowerVsyncDelta | +EnergyEstimationTelemetry | +BatteryDrainMaxE3UploadRank | +BatteryDrainMinE3UploadBI | +BatteryDrainMinRate | +LongtermTimerInMinutes | +UploadAcRecords | +MobileBroadband | +MBBClass | +StandbyActivationEnergy | +DripsPowerFloorMilliWatts | +NonDripsPenaltyMilliWatts | +Storage | +StorageType | +Wifi | +WifiClass | + + +## Policy + + +### Definitions: Processor + +1. For both **HeteroDecreaseThreshold** and **HeteroIncreaseThreshold**, enter an Id in the **List** field, and click **Add**. +2. In the **Available Customizations** pane, select the Id that you added, and configure the value as follows. + +**HeteroDecreaseThreshold** specifies a threshold to cross below, which is required to park the Nth efficiency class 1 core. There is a separate value for each core index. The threshold is relative to efficiency class 0 performance. The provisioning interface can specify up to 4 different thresholds. If the system has 5 or more class 1 cores, the 4th value is used for all remaining cores of the same class. + +HeteroDecreaseThreshold is a four-byte unsigned integer where each byte represents a threshold in percentage. The lowest byte is the first threshold. For example, to set four thresholds—A, B, C, and D—the value of the parameter will be A + B*256 + C*65536 + D*16777216. + +Minimum value: `0 + 0*256 + 0*65536 + 0*16777216` +Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` + +**HeteroIncreaseThreshold** specifies the threshold value to cross above, which is required to unpark the Nth efficiency class 1 core. There is a separate value for each core index. The threshold is relative to efficiency class 0 performance. The provisioning interface can specify up to 4 different thresholds. If the system has 5 or more class 1 cores, the 4th value is used for all remaining cores of the same class. + +HeteroIncreaseThreshold is a four-byte unsigned integer where each byte represents a threshold in percentage. The lowest byte is the first threshold. For example, to set four thresholds—A, B, C, and D—the value of the parameter will be A + B*256 + C*65536 + D*16777216. + +Minimum value: `0 + 0*256 + 0*65536 + 0*16777216` +Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` + +### Settings + +1. For each setting, select between **Balanced**, **HgihPerformance**, and **PowerSaver** for the **SchemePersonality**, and then click **Add**. +2. In the **Available Customizations** pane, select the **SchemePersonality** that you added, and configure the value as follows. + + +Settings for AdaptivePowerBehavior | Description +--- | --- +StandbyBudgetGracePeriod | +AcValue | +DcValue | +StandbyBudgetPercent | + +Settings for Battery | Description +--- | --- + +Settings for Button | Description +--- | --- + +Settings for Disk | Description +--- | --- + +Settings for Display | Description +--- | --- + +Settings for EnergySaver | Description +--- | --- + +Settings for IdleResiliency | Description +--- | --- + +Settings for Misc | Description +--- | --- + +Settings for Multimedia | Description +--- | --- + +Settings for PCIExpress | Description +--- | --- + +Settings for Processor | Description +--- | --- + +Settings for Sleep | Description +--- | --- \ No newline at end of file From 2cbc46465da554deda25c79e3c663451826dbe24 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 11:54:54 -0700 Subject: [PATCH 020/117] sync --- windows/configuration/wcd/wcd-power.md | 73 ++++++++++++++++++++++++-- 1 file changed, 70 insertions(+), 3 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index 240eee67d8..c8a6ef77c7 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -95,8 +95,12 @@ Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` ### Settings -1. For each setting, select between **Balanced**, **HgihPerformance**, and **PowerSaver** for the **SchemePersonality**, and then click **Add**. +1. For each setting, select a power scheme for **SchemePersonality**, and then click **Add**. 2. In the **Available Customizations** pane, select the **SchemePersonality** that you added, and configure the value as follows. +3. Repeate for each power scheme that you want to configure. + +>[!NOTE] +>Each setting can be configured for **AcValue** (plugged in) and **DcValue** (on battery). Settings for AdaptivePowerBehavior | Description @@ -133,8 +137,71 @@ Settings for Multimedia | Description Settings for PCIExpress | Description --- | --- -Settings for Processor | Description +Settings for Processor
Some parameters have suffix "1" to indicate efficiency class
[Learn more about processor power management options](https://msdn.microsoft.com/library/windows/hardware/mt422910.aspx) | Description --- | --- +CPConcurrency | +CPDecreasePolicy | +CPDecreaseTime | +CPDistribution | +DPHeadroom | +CPIncreasePolicy | +CPIncreaseTime | +CpLatencyHintUnpark | +CpLatencyHintUnpark1 | +CPMaxCores | +CPMinCores | +CPOverUtilizationThreshold | +CPPerfState | +CPPerfState1 | +DutyCycling | +HeteroClass0FloorPerf | +HeteroClass1InitialPerf | +HeteroDecreaseThreshold | +HeteroDecreaseTime | +HeteroIncreaseThreshold | +HeteroIncreaseTime | +HeteroPolicy | +IdleDemoteThreshold | +IdleDisable | +IdlePromoteThreshold | +IdleScaling | +IdleStateMax | +IdleTimeCheck | +MaxFrequency | +MaxPerformance | +MinPerformance | +PerfAllowThrottling | +PerfAutonomousMode | +PerfAutonomousWindows | +PerfBoostMode | +PerfBoostPolicy | +PerfDecreasePolicy | +PerfDecreaseThreshold | +PerfDecreaseThreshold1 | +PerfDecreaseTime | +PerfDistributeUtility | +PerfEnergyPereference | +PerfEnergyPreference | +PerfHistory | +PerfIncreasePolicy | +PerfIncreaseThreshold | +PerfIncreaseTime | +PerfLatencyHint | +PerfTimeCheck | +SchedulingPolicy | +ShortSchedulingPolicy | +SystemCoolingPolicy | + + Settings for Sleep | Description ---- | --- \ No newline at end of file +--- | --- +AllowRemoteOpenSleep | Configure the network file system to prevent the computer from automatically entering sleep when remote network files are open. **Disabled** prevents automatic sleep when remote network files are open. However, if the open files are stored in Offline Files and are backed by the Offline File cache, automatic sleep is allowed. **Enabled** prevents automatic sleep when remote network files are open. However, if the open files are stored in Offline Files or the open files have not been updated since they were originally opened, automatic sleep is allowed. +AllowRtcWake | whether the system uses the system-wide wake-on-timer capability. The system can automatically use wake-on-timer on capable hardware to perform scheduled tasks. For example, the system might wake automatically to install updates. **Important** wakes on internal system timers only. +AllowStandby | Specify whether to allow standby. +AllowSystemRequired | Configure the power manager to accept or ignore application system required requests. These requests prevent the system from automatically entering sleep after a period of user inactivity. +AwayMode | Specify whether the system uses away mode. If this setting is disabled, away mode is not used even if programs request it. +HibernateTimeout | Specify the duration of time after sleep that the system automatically wakes and enters hibernation, in seconds. This settings enables hibernate option on Modern Standby systems. Set the value to 0 to disable the feature. +HybridSleep | Specify whether the system can enter hybrid sleep. +StandbyTimeout | Specify the duration of inactivity before the system automatically enters sleep, in seconds. +UnattendTimeout | Specify the duration of inactivity before the system automatically enters sleep after waking from sleep in an unattended state, in seconds. For example, if the system wakes from sleep because of a timed event or a wake on LAN (WoL) event, the sleep unattended idle timeout value will be used instead of the sleep idle timeout value. From dfa0412bab9333cbdfac6faba314d84d6a819980 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 12:15:33 -0700 Subject: [PATCH 021/117] sync --- windows/configuration/wcd/wcd-power.md | 42 ++++++++++++++++++++++++-- 1 file changed, 40 insertions(+), 2 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index c8a6ef77c7..73a9ac5379 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -36,7 +36,7 @@ EnforceConsoleLockScreenTimeout | EnforceDisconnectedStandby | HiberFiletype | IgnoreCsComplianceCheck | -LidNotificationsAreReliable | +LidNotificationsAreReliable | Use to notify the OS whether the platform guarantees that lid notifications are sent whenever the lid is opened or closed. When configured as **True**, the platform guarantees that lid notifications will be sent every time the device lid is opened or closed. The OS suppresses Windows Hello when the device lid is closed to ensure further input is not processed and to save battery life. OEMs must reliably report lid open and lid close events to opt-in to this setting. If there are scenarios where a lid open event is not reliably reported to the OS, Windows Hello may not work for the user. SmartUserPresenceConfidence | ## EnergyEstimationEngine @@ -44,7 +44,7 @@ SmartUserPresenceConfidence | Setting | Description --- | --- CPU | -EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficientyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. +EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. Display | DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. DisplayBacklightPowerGradient | @@ -112,30 +112,68 @@ StandbyBudgetPercent | Settings for Battery | Description --- | --- +CriticalAction | +CriticalBatteryLevel | +LowAction | +LowBatteryLevel | +LowBatteryWarning | +ReserveBatteryLevel | Settings for Button | Description --- | --- +ForcedShutdown | +LidAction | +LidOpenWake | +PowerButtonAction | +SleepButtonAction | +UIPowerButtonAction | Settings for Disk | Description --- | --- +BurstIgnoreDuration | +IdleTimeout | +MaxDiskPower | Settings for Display | Description --- | --- +AdapativeIncrease | +AdaptiveTimeout | +AllowAdaptiveBrightness | +AllowDisplayRequired | +AnoyanceTimout | +ConsoleLockTimeout | +DimLevel | +DimTimeout | +IdleTimeout | +NormalLevel | Settings for EnergySaver | Description --- | --- +BatteryThreshold | +Brightness | +Policy | Select between **User** and **Aggressive**. Settings for IdleResiliency | Description --- | --- +AllowDeepSleep | +ExecutionRequiredTimeout | +IdleResiliencyPeriod | +IOCoalescingTimeout | Settings for Misc | Description --- | --- +AllowWifiInStandby | +ConnectivityInStandby | +DeviceIdlePolicy | +LockConsoleOnWake | Settings for Multimedia | Description --- | --- +VideoPlayBackQuality | Configure for power-saving or performance. Settings for PCIExpress | Description --- | --- +ASPM | Configure Active State Power Management (ASPM) for moderate power savings or maximum power savings. Settings for Processor
Some parameters have suffix "1" to indicate efficiency class
[Learn more about processor power management options](https://msdn.microsoft.com/library/windows/hardware/mt422910.aspx) | Description --- | --- From 5e32af3b842e77bbc33db9f0b44a12db20f83408 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 12:47:56 -0700 Subject: [PATCH 022/117] sync --- windows/configuration/wcd/wcd-power.md | 65 +++++++++++++------------- 1 file changed, 33 insertions(+), 32 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index 73a9ac5379..fc351e5621 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -105,52 +105,53 @@ Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` Settings for AdaptivePowerBehavior | Description --- | --- -StandbyBudgetGracePeriod | -AcValue | -DcValue | -StandbyBudgetPercent | +StandbyBudgetGracePeriod | Define the minimum time, in seconds, after the system enters standby before the system makes the check if standby power budget is consumed. +StandbyBudgetPercent | Define the battery drain percentage that the user is allowed in a standby session. +StandbyReserveGracePeriod | Define the minimum time, in seconds, after the screen turns off before the system checks to make sure there is enough battery available to maintain the specified screen on time. +StandbyReserveTime | Define the screen on time, in seconds, that will be available to the user after standby exists and the screen turns on. +StandbyResetPercent | Specify the percentage of battery when the system will reset the standby budget. Settings for Battery | Description --- | --- -CriticalAction | -CriticalBatteryLevel | -LowAction | -LowBatteryLevel | -LowBatteryWarning | -ReserveBatteryLevel | +CriticalAction | Select the action to take when critical battery level is reached. +CriticalBatteryLevel | Specify the percentage of capacity when the critical battery action is taken. +LowAction | Specify the action to take when the low batter level is reached. +LowBatteryLevel | Specify the percentage of capacity when the low battery action is taken and the low battery warning, if enabled, appears. +LowBatteryWarning | Specify whether the OS displays a UI warning at the batter meter when the battery capacity crosses the low battery threshold. +ReserveBatteryLevel | Specify the percentage of capacity when the reserve battery warning is shown to the user. Settings for Button | Description --- | --- -ForcedShutdown | -LidAction | -LidOpenWake | -PowerButtonAction | -SleepButtonAction | -UIPowerButtonAction | +ForcedShutdown | Specify the type of system shutdown that occurs when the system power button is pressed if the power button action is set to **Shut down**. When configured as **On**, a forced system shutdown will occur. When configured as **Off**, a normal system shutdown will occur. +LidAction | Specify the action to take when the system lid is closed. +LidOpenWake | Specify the action to take when the system lid is opened. +PowerButtonAction | Specify the action to take when the system power button is pressed. +SleepButtonAction | Specify the action to take when the sleep power button is pressed. +UIPowerButtonAction | Specify the action to take when the UI power button is pressed. Settings for Disk | Description --- | --- -BurstIgnoreDuration | -IdleTimeout | -MaxDiskPower | +BurstIgnoreDuration | Specify the period of inactivity, in seconds, to ignore when attempting to aggressively power down the disk. +IdleTimeout | Specify the period of inactivity, in seconds, before the disk is automatically powered down. +MaxDiskPower | Settings for Display | Description --- | --- -AdapativeIncrease | -AdaptiveTimeout | +AdapativeIncrease | This setting denotes the user annoyance detection threshold. It specifies the duration, in seconds, between automatic display brightness level reduction and user input to consider the automatic display brightness level reduction as an annoyance to the user. This setting applies only to portable computers that support Windows control of the brightness level of an integrated display device. In most situations, you should not change the default value of this setting. +AdaptiveTimeout | Specify whether the OS automatically scales the display idle time-out based on user activity. If the user provides input to the system shortly after the display idle timeout is reached, Windows automatically extends the display idle time-out to deliver a better user experience. AllowAdaptiveBrightness | -AllowDisplayRequired | +AllowDisplayRequired | Specify whether Windows allows applications to temporarily prevent the display from automatically reducing brightness or turning off to save power. AnoyanceTimout | ConsoleLockTimeout | -DimLevel | -DimTimeout | -IdleTimeout | -NormalLevel | +DimLevel | Specify the reduced display brightness level, in percentage, after the dim idle timeout has been reached. This setting applies only to portable computers that support Windows control of the brightness level of an integrated display device. +DimTimeout | Specify the period of inactivity, in seconds, before the display is dimmed. +IdleTimeout | Specify the period of inactivity, in seconds, before the display is automatically turned off. +NormalLevel | Specify the default display brightness level, in percentage. Settings for EnergySaver | Description --- | --- -BatteryThreshold | -Brightness | +BatteryThreshold | Specify the battery charge level, as a percentage, at which Energy Saver is turned on. +Brightness | Specify the percentage value to scale brightness to when Energy Saver is turned on. Policy | Select between **User** and **Aggressive**. Settings for IdleResiliency | Description @@ -162,10 +163,10 @@ IOCoalescingTimeout | Settings for Misc | Description --- | --- -AllowWifiInStandby | -ConnectivityInStandby | -DeviceIdlePolicy | -LockConsoleOnWake | +AllowWifiInStandby | Specify whether to allow Wi-Fi networking during standby. +ConnectivityInStandby | Specify whether to allow connectivity during standby. +DeviceIdlePolicy | Configure for power-saving or performance. +LockConsoleOnWake | Specify whether to lock the console. Settings for Multimedia | Description --- | --- From c764c1180b459ab2e00efd3d1ad8b7b707ace9a6 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 13:17:45 -0700 Subject: [PATCH 023/117] space table --- windows/configuration/wcd/wcd-power.md | 28 +++++++++++++------------- 1 file changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index fc351e5621..3da8f537b1 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -25,7 +25,7 @@ Use to configure settings for Power. Setting | Description --- | --- -AllowSystemRequiredPowerRequests | +AllowSystemRequiredPowerRequests | BootLowLatencyDuration | DefaultOverlayAcPowerScheme | DefaultOverlayDcPowerScheme | @@ -102,7 +102,7 @@ Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` >[!NOTE] >Each setting can be configured for **AcValue** (plugged in) and **DcValue** (on battery). - +

Settings for AdaptivePowerBehavior | Description --- | --- StandbyBudgetGracePeriod | Define the minimum time, in seconds, after the system enters standby before the system makes the check if standby power budget is consumed. @@ -110,7 +110,7 @@ StandbyBudgetPercent | Define the battery drain percentage that the user is allo StandbyReserveGracePeriod | Define the minimum time, in seconds, after the screen turns off before the system checks to make sure there is enough battery available to maintain the specified screen on time. StandbyReserveTime | Define the screen on time, in seconds, that will be available to the user after standby exists and the screen turns on. StandbyResetPercent | Specify the percentage of battery when the system will reset the standby budget. - +

Settings for Battery | Description --- | --- CriticalAction | Select the action to take when critical battery level is reached. @@ -119,7 +119,7 @@ LowAction | Specify the action to take when the low batter level is reached. LowBatteryLevel | Specify the percentage of capacity when the low battery action is taken and the low battery warning, if enabled, appears. LowBatteryWarning | Specify whether the OS displays a UI warning at the batter meter when the battery capacity crosses the low battery threshold. ReserveBatteryLevel | Specify the percentage of capacity when the reserve battery warning is shown to the user. - +

Settings for Button | Description --- | --- ForcedShutdown | Specify the type of system shutdown that occurs when the system power button is pressed if the power button action is set to **Shut down**. When configured as **On**, a forced system shutdown will occur. When configured as **Off**, a normal system shutdown will occur. @@ -128,13 +128,13 @@ LidOpenWake | Specify the action to take when the system lid is opened. PowerButtonAction | Specify the action to take when the system power button is pressed. SleepButtonAction | Specify the action to take when the sleep power button is pressed. UIPowerButtonAction | Specify the action to take when the UI power button is pressed. - +

Settings for Disk | Description --- | --- BurstIgnoreDuration | Specify the period of inactivity, in seconds, to ignore when attempting to aggressively power down the disk. IdleTimeout | Specify the period of inactivity, in seconds, before the disk is automatically powered down. MaxDiskPower | - +

Settings for Display | Description --- | --- AdapativeIncrease | This setting denotes the user annoyance detection threshold. It specifies the duration, in seconds, between automatic display brightness level reduction and user input to consider the automatic display brightness level reduction as an annoyance to the user. This setting applies only to portable computers that support Windows control of the brightness level of an integrated display device. In most situations, you should not change the default value of this setting. @@ -147,36 +147,36 @@ DimLevel | Specify the reduced display brightness level, in percentage, after th DimTimeout | Specify the period of inactivity, in seconds, before the display is dimmed. IdleTimeout | Specify the period of inactivity, in seconds, before the display is automatically turned off. NormalLevel | Specify the default display brightness level, in percentage. - +

Settings for EnergySaver | Description --- | --- BatteryThreshold | Specify the battery charge level, as a percentage, at which Energy Saver is turned on. Brightness | Specify the percentage value to scale brightness to when Energy Saver is turned on. Policy | Select between **User** and **Aggressive**. - +

Settings for IdleResiliency | Description --- | --- AllowDeepSleep | ExecutionRequiredTimeout | IdleResiliencyPeriod | IOCoalescingTimeout | - +

Settings for Misc | Description --- | --- AllowWifiInStandby | Specify whether to allow Wi-Fi networking during standby. ConnectivityInStandby | Specify whether to allow connectivity during standby. DeviceIdlePolicy | Configure for power-saving or performance. LockConsoleOnWake | Specify whether to lock the console. - +

Settings for Multimedia | Description --- | --- VideoPlayBackQuality | Configure for power-saving or performance. - +

Settings for PCIExpress | Description --- | --- ASPM | Configure Active State Power Management (ASPM) for moderate power savings or maximum power savings. - -Settings for Processor
Some parameters have suffix "1" to indicate efficiency class
[Learn more about processor power management options](https://msdn.microsoft.com/library/windows/hardware/mt422910.aspx) | Description +

+Settings for Processor
(Some parameters have suffix "1" to indicate efficiency class)
[Learn more about processor power management options](https://msdn.microsoft.com/library/windows/hardware/mt422910.aspx) | Description --- | --- CPConcurrency | CPDecreasePolicy | @@ -230,7 +230,7 @@ PerfTimeCheck | SchedulingPolicy | ShortSchedulingPolicy | SystemCoolingPolicy | - +

Settings for Sleep | Description From 0597b25ddf3f5b2dcff59944c4b6725254f866a9 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 8 Sep 2017 13:58:33 -0700 Subject: [PATCH 024/117] sync --- windows/configuration/wcd/wcd-power.md | 37 ++++++++++---------------- 1 file changed, 14 insertions(+), 23 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index 3da8f537b1..09a9d4c70b 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -25,49 +25,42 @@ Use to configure settings for Power. Setting | Description --- | --- -AllowSystemRequiredPowerRequests | -BootLowLatencyDuration | -DefaultOverlayAcPowerScheme | -DefaultOverlayDcPowerScheme | -DefaultOverlayPowerScheme | -DimTimeoutIsManuallySpecified | -EnergyEstimationEnabled | -EnforceConsoleLockScreenTimeout | -EnforceDisconnectedStandby | -HiberFiletype | -IgnoreCsComplianceCheck | +AllowSystemRequiredPowerRequests | Specify whether System Required power requests are allowed on systems capable of connected standby. +BootLowLatencyDuration | +DefaultOverlayAcPowerScheme | Specify the default overlay power scheme to use when device is plugged in. +DefaultOverlayDcPowerScheme | Specify the default overlay power shceme to use when the device is on battery. +DefaultOverlayPowerScheme | Specify the default overlay power scheme to use. This setting is deprecated. +DimTimeoutIsManuallySpecified | Set to **True** to control the period before the screen dims using the DimTimeout setting. Set to **False** to allow Windows to automatically select the period based on the screen off timeout. +EnergyEstimationEnabled | +EnforceConsoleLockScreenTimeout | Specify whether the console lock screen timeout should be enforced independently of the user display timeout. +EnforceDisconnectedStandby | Specify whether to force the network to disconnect during standby. +HiberFiletype | Specify the type of HiberFile to be used by the system. Set to **Reduced** to allow fast startup, but not hibernate. Set to **Full** to allow both fast startup and hibernate. +IgnoreCsComplianceCheck | Specify whether to ignore connected standby compliance chcks. LidNotificationsAreReliable | Use to notify the OS whether the platform guarantees that lid notifications are sent whenever the lid is opened or closed. When configured as **True**, the platform guarantees that lid notifications will be sent every time the device lid is opened or closed. The OS suppresses Windows Hello when the device lid is closed to ensure further input is not processed and to save battery life. OEMs must reliably report lid open and lid close events to opt-in to this setting. If there are scenarios where a lid open event is not reliably reported to the OS, Windows Hello may not work for the user. -SmartUserPresenceConfidence | +SmartUserPresenceConfidence | Specify the confidence, in percentage, in predicted user-away intervals. ## EnergyEstimationEngine Setting | Description --- | --- -CPU | -EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. -Display | +CPU > EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. -DisplayBacklightPowerGradient | +DisplayBacklightPowerGradient | DisplayBacklightPowerQDenominator | DisplayBacklightPowerQNumerator | DisplayPanelPowerAreaFactor | DisplayPanelPowerDpiFactor | DisplayPanelPowerFloor | DisplayPanelPowerVsyncDelta | -EnergyEstimationTelemetry | BatteryDrainMaxE3UploadRank | BatteryDrainMinE3UploadBI | BatteryDrainMinRate | LongtermTimerInMinutes | UploadAcRecords | -MobileBroadband | MBBClass | -StandbyActivationEnergy | DripsPowerFloorMilliWatts | NonDripsPenaltyMilliWatts | -Storage | StorageType | -Wifi | WifiClass | @@ -186,12 +179,10 @@ DPHeadroom | CPIncreasePolicy | CPIncreaseTime | CpLatencyHintUnpark | -CpLatencyHintUnpark1 | CPMaxCores | CPMinCores | CPOverUtilizationThreshold | CPPerfState | -CPPerfState1 | DutyCycling | HeteroClass0FloorPerf | HeteroClass1InitialPerf | From c056607abb712b77918d5cc94f5564a53a557238 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 12 Sep 2017 07:23:11 -0700 Subject: [PATCH 025/117] sync --- .../wcd/wcd-applicationmanagement.md | 2 +- .../configuration/wcd/wcd-assignedaccess.md | 5 +- .../wcd/wcd-callandmessagingenhancement.md | 2 +- windows/configuration/wcd/wcd-calling.md | 7 +- windows/configuration/wcd/wcd-cellcore.md | 2 +- windows/configuration/wcd/wcd-cellular.md | 2 +- windows/configuration/wcd/wcd-connections.md | 2 +- windows/configuration/wcd/wcd-deviceinfo.md | 2 +- windows/configuration/wcd/wcd-hotspot.md | 2 +- windows/configuration/wcd/wcd-messaging.md | 123 +++++++++++++++++- .../wcd/wcd-modemconfigurations.md | 2 +- windows/configuration/wcd/wcd-policies.md | 2 +- windows/configuration/wcd/wcd-power.md | 2 +- .../wcd/wcd-universalappinstall.md | 2 +- 14 files changed, 139 insertions(+), 18 deletions(-) diff --git a/windows/configuration/wcd/wcd-applicationmanagement.md b/windows/configuration/wcd/wcd-applicationmanagement.md index b8abe8924d..3a1b160d46 100644 --- a/windows/configuration/wcd/wcd-applicationmanagement.md +++ b/windows/configuration/wcd/wcd-applicationmanagement.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # ApplicationManagement (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-assignedaccess.md b/windows/configuration/wcd/wcd-assignedaccess.md index 125027dcdd..7c9afdb3e2 100644 --- a/windows/configuration/wcd/wcd-assignedaccess.md +++ b/windows/configuration/wcd/wcd-assignedaccess.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/05/2017 +ms.date: 10/17/2017 --- # AssignedAccess (Windows Configuration Designer reference) @@ -34,6 +34,9 @@ Enter the account and the application you want to use for Assigned access, using ## MultiAppAssignedAccessSettings +>[!NOTE] +>MultiAppAssignedAccessSettings is supported on Windows 10, version 1709 only. + Use this setting to configure a kiosk device that runs more than one app. 1. [Create an assigned access configuration XML file for multiple apps.](../lock-down-windows-10-to-specific-apps.md) diff --git a/windows/configuration/wcd/wcd-callandmessagingenhancement.md b/windows/configuration/wcd/wcd-callandmessagingenhancement.md index f3905fe8bc..bc823d4afc 100644 --- a/windows/configuration/wcd/wcd-callandmessagingenhancement.md +++ b/windows/configuration/wcd/wcd-callandmessagingenhancement.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # CallAndMessagingEnhancement (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index e070c612ac..ab28bacce6 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # Calling (Windows Configuration Designer reference) @@ -79,10 +79,7 @@ See [Dialer codes for supplementary services](https://docs.microsoft.com/windows ## VoicemailRegistrationTable -Setting | Description ---- | --- -Entries | -ProviderRegistration | +Configure these settings to customize visual voicemail in the Windows 10 Mobile UI. For settings and values, see [Visual voicemail](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/visual-voicemail). ## List of USSD codes diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index f52b1e2294..b670bd855f 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # CellCore (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index 7cf3811250..f99fdda1cf 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # Cellular (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-connections.md b/windows/configuration/wcd/wcd-connections.md index 18480df964..5f8ecb6bf3 100644 --- a/windows/configuration/wcd/wcd-connections.md +++ b/windows/configuration/wcd/wcd-connections.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/05/2017 +ms.date: 10/17/2017 --- # Connections (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index cb446c9eb9..3377a21224 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # DeviceInfo (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md index 143b69429f..631af23d3f 100644 --- a/windows/configuration/wcd/wcd-hotspot.md +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 08/21 10/17/2017 --- # HotSpot (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 11e48392c7..6b986c88b7 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/05/2017 +ms.date: 10/17/2017 --- # Messaging (Windows Configuration Designer reference) @@ -39,6 +39,13 @@ When configured as **True**, you set a LIFO message order. When configured as ** Enable this setting to allow custom line setup dialogs in the Messaging app. +### ShowSendingStatus + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +Set **ShowSendingStatus** to **True** to display the sending status for SMS/MMS messages. + ### VoicemailIntercept Partners can define a filter that intercepts an incoming SMS message and triggers visual voicemail synchronization. The filtered message does not appear in the user’s conversation list. @@ -75,6 +82,18 @@ AllowMmsIfDataIsOff | **True** allows MMS if data is off AllowMmsIfDataIsOffSupported | **True** shows the toggle for allowing MMS if data is turned off AllowMmsIfDataIsOffWhileRoaming | **True** allows MMS if data is off while roaming +### AllowSelectAllContacts + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +Set to **True** to show the select all contacts/unselect all menu option to allow users to easily select multiple recipients for an SMS or MMS message. This menu option provides users with an easier way to add multiple recipients and may also meet a mandatory requirement for some mobile operator networks. + +Windows 10 Mobile supports the following select multiple recipients features: + +- A multi-select chooser, which enables users to choose multiple contacts. +- A **select all contacts/unselect all** menu option, which enables users to select or unselect all their contacts. This option is not shown by default and must be enabled by the OEM. + ### AllowSendingDeliveryReport Specify whether the phone automatically sends a receipt acknowledgment for MMS messages. Partners can specify whether the phone automatically sends a receipt acknowledgment for MMS messages when they arrive, and they can determine whether users can control the receipt acknowledgments by using the **Send MMS acknowledgment** toggle in **Messaging > settings**. By default, this user setting is visible and turned on. @@ -94,6 +113,24 @@ Specify whether MMS messages are automatically downloaded. | ShowAutomaticallyDownloadMMSToggle | **True** shows the **Automatically download MMS** toggle, and **False** hides the toggle | +### DefaultContentLocationUrl + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +For networks that require it, you can specify the default GET path within the MMSC to use when the GET URL is missing from the WAP push MMS notification. + +Set **DefaultContentLocationUrl** to specify the default GET path within the MMSC. + +### ErrorCodeEnabled + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +You can choose to display additional content in the conversation view when an SMS or MMS message fails to send. This content includes a specific error code in decimal format that the user can report to technical support. Common errors also include a friendly string to help the user self-diagnose and fix the problem. + +Set to **True** to display the error message with an explanation of the problem and the decimal-format error codes. When set to **False**, the full error message is not displayed. + ### EmergencyAlertOptions Configure settings for CMAS alerts. @@ -139,11 +176,29 @@ UserAgentString | Set UserAgentString to the new user agent string for MMS in it UseUTF8ForUnspecifiedCharset | Some incoming MMS messages may not specify a character encoding. To properly decode MMS messages that do not specify a character encoding, you can set UTF-8 to decode the message. WapPushTechnology | For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values. `1` or `0x1` enables MMS messages to have some of their content truncated. `0` or `0x0` disables MMS messages from being truncated +## ImsiAuthenticationToken + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +Configure whether MMS messages include the IMSI in the GET and POST header. + +Set **ImsiAuthenticationToken** to the token used as the header for authentication. The string value should match the IMSI provided by the UICC. + ### LatAlertOptions Enable `LatLocalAlertEnabled` to enable support for LAT-Alert Local Alerts for devices sold in Chile. For more information, see [Emergency notifications](https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/emergency-notifications). +### MaxRetryCount + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +You can specify the number of times that the phone can retry sending the failed MMS message and photo before the user receives a notification that the photo could not be sent. + +Specify MaxRetryCount to specify the number of times the MMS transport will attempt resending the MMS message. This value has a maximum limit of 3. + ### MMSGroupText Set options for group messages sent to multiple people. @@ -182,6 +237,61 @@ Set options related to MMS message notifications. You can specify whether users ### SMSDeliveryNotify +Setting | Description +--- | --- +DeliveryNotifySupported | Set to **True** to enable SMS delivery confirmation. +SMSDeliveryNotify | Set to **True** to toggle SMS delivery confirmation. + +### TargetVideoFormat + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +You can specify the transcoding to use for video files sent as attachments in MMS messages. + +Set TargetVideoFormat to one of the following values to configure the default transcoding for video files sent as attachments in MMS messages: + +| Value | Description | +| --- | --- | +| 0 or 0x0 | Sets the transcoding to H.264 + AAC + MP4. This is the default set by the OS. | +| 1 or 0x1 | Sets the transcoding to H.264 + AAC + 3GP. | +| 2 or 0x2 | Sets the transcoding to H.263 + AMR.NB + 3GP. | +| 3 or 0x3 | Sets the transcoding to MPEG4 + AMR.NB + 3GP. | + + +### UAProf + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. + +There are two ways to correlate a user agent profile with a given phone: +- You can take the user agent string of the phone that is sent with MMS requests and use it as a hash to map to the user agent profile on the MMSC. The user agent string cannot be modified. +- Alternatively, you can directly set the URI of the user agent profile on the phone. + +Set **UAProf** to the full URI of your user agent profile file. Optionally, you can also specify the custom user agent property name for MMS that is sent in the header by setting **UAProfToken** to either `x-wap-profile` or `profile`. + + +### UAProfToken + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +You can specify a user agent profile to use on the phone for MMS messages. The user agent profile XML file details a phone’s hardware specifications and media capabilities so that an MMS application server (MMSC) can return supported optimized media content to the phone. The user agent profile XML file is generally stored on the MMSC. + +Optionally, in addition to specifying **UAProf**, you can also specify the custom user agent property name for MMS that is sent in the header by setting **UAProfToken** to either `x-wap-profile` or `profile`. + + +### UserAgentString + +>[!NOTE] +>This setting is removed in Windows 10, version 1709. + +Set **UserAgentString** to the new user agent string for MMS in its entirely. + +By default, this string has the format WindowsPhoneMMS/MicrosoftMMSVersionNumber WindowsPhoneOS/OSVersion-buildNumber OEM-deviceName, in which the italicized text is replaced with the appropriate values for the phone. + ### w4 @@ -194,6 +304,17 @@ Set options related to MMS message notifications. You can specify whether users | TONAPID | Specify the network access point identification name (NAPID) defined in the provisioning file. This parameter takes a string value. It is only possible to refer to network access points defined within the same provisioning file (except if the INTERNET attribute is set in the NAPDEF characteristic). For more information about the NAPDEF characteristic, see [NAPDEF configuration service provider](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/napdef-csp). | | TOPROXY | Specify one logical proxy with a matching PROXY-ID. It is only possible to refer to proxies defined within the same provisioning file. Only one proxy can be listed. The TO-PROXY value must be set to the value of the PROXY ID in PXLOGICAL that defines the MMS specific-proxy. | +### WapPushTechnology + +>[!NOTE] +>These settings are removed in Windows 10, version 1709. + +For networks that require non-standard handling of single-segment incoming MMS WAP Push notifications, you can specify that MMS messages may have some of their content truncated and that they may require special handling to reconstruct truncated field values. + +| Value | Description | +| --- | --- | +| 1 or 0x1 | Enables MMS messages to have some of their content truncated. | +| 0 or 0x0 | Disables MMS messages from being truncated. | diff --git a/windows/configuration/wcd/wcd-modemconfigurations.md b/windows/configuration/wcd/wcd-modemconfigurations.md index 0f263e8ca0..eb663dfd65 100644 --- a/windows/configuration/wcd/wcd-modemconfigurations.md +++ b/windows/configuration/wcd/wcd-modemconfigurations.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # ModemConfiguration (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index f672b70b05..00f49192d9 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # Policies (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index 09a9d4c70b..b28315f7e7 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # Power (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-universalappinstall.md b/windows/configuration/wcd/wcd-universalappinstall.md index 50f88c2fdc..f9c836b97c 100644 --- a/windows/configuration/wcd/wcd-universalappinstall.md +++ b/windows/configuration/wcd/wcd-universalappinstall.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # UniversalAppInstall (reference) From a1e2d20e6362be82aeb282e45321bafbe7d916ff Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Tue, 12 Sep 2017 13:03:09 -0700 Subject: [PATCH 026/117] sync --- windows/configuration/TOC.md | 3 ++- windows/configuration/wcd/wcd-calling.md | 2 +- windows/configuration/wcd/wcd-cellcore.md | 2 +- windows/configuration/wcd/wcd-deviceinfo.md | 2 +- windows/configuration/wcd/wcd-hotspot.md | 2 +- windows/configuration/wcd/wcd-power.md | 2 +- windows/configuration/wcd/wcd-textinput.md | 22 +++++++++++++++++++++ 7 files changed, 29 insertions(+), 6 deletions(-) create mode 100644 windows/configuration/wcd/wcd-textinput.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 5738a86d30..b347cdd3ba 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -113,7 +113,8 @@ #### [StartupBackgroundTasks](wcd/wcd-startupbackgroundtasks.md) #### [SurfaceHubManagement](wcd/wcd-surfacehubmanagement.md) #### [TabletMode](wcd/wcd-tabletmode.md) -#### [TakeATest](wcd/wcd-takeatest.md) +#### [TakeATest](wcd/wcd-takeatest.md) +#### [TextInput](wcd/wcd-textinput.md) #### [Theme](wcd/wcd-theme.md) #### [UnifiedWriteFilter](wcd/wcd-unifiedwritefilter.md) #### [UniversalAppInstall](wcd/wcd-universalappinstall.md) diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index ab28bacce6..5fff0cc934 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: medium +ms.localizationpriority: medium ms.author: jdecker ms.date: 10/17/2017 --- diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index b670bd855f..9a7b74172d 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: medium +ms.localizationpriority: medium ms.author: jdecker ms.date: 10/17/2017 --- diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index 3377a21224..a6089989fd 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: medium +ms.localizationpriority: medium ms.author: jdecker ms.date: 10/17/2017 --- diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md index 631af23d3f..27a67975b8 100644 --- a/windows/configuration/wcd/wcd-hotspot.md +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: medium +ms.localizationpriority: medium ms.author: jdecker ms.date: 08/21 10/17/2017 --- diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index b28315f7e7..621ab15b33 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library author: jdeckerMS -localizationpriority: medium +ms.localizationpriority: medium ms.author: jdecker ms.date: 10/17/2017 --- diff --git a/windows/configuration/wcd/wcd-textinput.md b/windows/configuration/wcd/wcd-textinput.md new file mode 100644 index 0000000000..943032fa75 --- /dev/null +++ b/windows/configuration/wcd/wcd-textinput.md @@ -0,0 +1,22 @@ +--- +title: TextInput (Windows 10) +description: This section describes the TextInput settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +author: jdeckerMS +ms.localizationpriority: medium +ms.author: jdecker +ms.date: 08/21 10/17/2017 +--- + +# TextInput (Windows Configuration Designer reference) + +Use TextInput settings to configure ... + +## Applies to + +| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | :---: | :---: | :---: | :---: | :---: | +| | | | | | | + From 3e039e4accbafdf6f358652682d8304582b5d6d2 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 13 Sep 2017 09:00:55 -0700 Subject: [PATCH 027/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 9a7b74172d..67e689e35d 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -130,7 +130,7 @@ Select from the following: ### eSim - +>eSim > FwUpdate? > AllowedAppIdList? > any text ??? ### External @@ -175,14 +175,14 @@ DisableLTESupportWhenRoaming | Set to **Yes** to disable LTE support when roamin DisableSystemTypeSupport | DTMFOffTime | Sets the length of time, in milliseconds (between 64 and 1000 inclusive), of the pause between DTMF digits. For example, a value of 120 specifies 0.12 seconds. DTMFOnTime | Sets the length of time, in milliseconds (between 64 and 1000 inclusive), to generate the DTMF tone when a key is pressed. For example, a value of 120 specifies 0.12 seconds. -ExcludedSystemTypesByDefault | -ExcludedSystemTypesPerOperator | -LTEEnabled | -LTEForced | -ManualNetworkSelectionTimeout | -NetworkSuffix | -NitzFiltering | -OperatorListForExcludedSystemTypes | +ExcludedSystemTypesByDefault | Set the default value for **Highest connection speed** in the **Settings** > **Cellular & SIM** > **SIM** screen by specifying the bitmask for any combination of radio technology to be excluded from the default value. The connection speed that has not been excluded will show up as the highest connection speed. On dual SIM phones that only support up to 3G connection speeds, the **Highest connection speed** option is replaced by a 3G on/off toggle based on the per-device setting. Enter the binary setting to exclude 4G (`10000`) or 3G (`01000`). +ExcludedSystemTypesPerOperator | Exclude specified system types from SIM cards that match the MCC:MNC pairs listed in **OperatorListForExcludedSystemTypes**. This setting is used only for China. Set the value to match the system type to be excluded. For more information about the RIL system types, see [RILSYSTEMTYPE](https://msdn.microsoft.com/library/windows/hardware/dn931143.aspx). For example, a value of 0x8 specifies RIL_SYSTEMTYPE_UMTS (3G) while 0x10 specifies RIL_SYSTEMTYPE_LTE (4G). To exclude more than one system type, perform a bitwise OR operation on the radio technologies you want to exclude. For example, a bitwise OR operation on RIL_SYSTEMTYPE_LTE (4G) and RIL_SYSTEMTYPE_UMTS (3G) results in the value 11000 (binary) or 0x18 (hexadecimal). In this case, the ExcludedSystemTypesPerOperator value must be set to 0x18 to limit the matching MCC:MNC pairs to 2G. +LTEEnabled | Select **Yes** to enable LTE, and **No** to disable LTE. +LTEForced | Select **Yes** to force LTE. +ManualNetworkSelectionTimeout | Set the default network selection timeout value, in a range of 1-600 seconds. By default, the OS allows the phone to attempt registration on the manually selected network for 60 seconds (or 1 minute) before it switches back to automatic mode. This value is the amount of time that the OS will wait for the modem to register on the manually selected network. If the time lapses and the modem was not able to register on the network that was manually selected by the user, the OS will either switch back to the automatic network selection mode if Permanent automatic mode is enabled, and the user has manually selected a network or the modem was turned on, or display a dialog that notifies the user that the phone was unable to connect to the manually selected network after the phone was turned on or after airplane mode was turned off. +NetworkSuffix | To meet branding requirements for some mobile operators, you can add a suffix to the network name that is displayed on the phone. For example, you can change from ABC to ABC 3G when under 3G coverage. This feature can be applied for any radio access technology (RAT). For TD-SCDMA RAT, a 3G suffix is always appended by default, but partners can also customize this the same way as with any other RAT. In the setting name, set SYSTEMTYPE to the network type that you want to append the network name to and click **Add**:

- system type 4: 2G (GSM)
- system type 8: 3G (UMTS)
- system type 16: LTE
- system type 32: 3G (TS-SCDMA)

Select the system type that you added, and enter the network name and suffix that you want displayed. +NitzFiltering | For mobile networks that can receive Network Identity and Time Zone (NITZ) information from multiple sources, partners can set the phone to ignore the time received from an LTE network. Time received from a CDMA network is not affected. Set the value of NitzFiltering to `0x10`. +OperatorListForExcludedSystemTypes | OperatorPreferredForFasterRadio | PreferredDataProviderList | Slot2DisableAppsList | From 0df491bff0f7ecb9d9012f21b9ff917350890a0c Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 13 Sep 2017 12:54:35 -0700 Subject: [PATCH 028/117] add cellular important note # Conflicts: # windows/configuration/change-history-for-configure-windows-10.md --- .../wcd/wcd-callandmessagingenhancement.md | 2 ++ windows/configuration/wcd/wcd-calling.md | 3 +++ windows/configuration/wcd/wcd-cellcore.md | 11 +++++++---- windows/configuration/wcd/wcd-cellular.md | 3 +++ windows/configuration/wcd/wcd-deviceinfo.md | 3 +++ windows/configuration/wcd/wcd-messaging.md | 3 +++ 6 files changed, 21 insertions(+), 4 deletions(-) diff --git a/windows/configuration/wcd/wcd-callandmessagingenhancement.md b/windows/configuration/wcd/wcd-callandmessagingenhancement.md index bc823d4afc..51d23e5e59 100644 --- a/windows/configuration/wcd/wcd-callandmessagingenhancement.md +++ b/windows/configuration/wcd/wcd-callandmessagingenhancement.md @@ -13,6 +13,8 @@ ms.date: 10/17/2017 # CallAndMessagingEnhancement (Windows Configuration Designer reference) Use to configure call origin and blocking apps. +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index 5fff0cc934..e736deb637 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -14,6 +14,9 @@ ms.date: 10/17/2017 Use to configure settings for Calling. +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. + ## Applies to | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 67e689e35d..118db68ab7 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -14,29 +14,32 @@ ms.date: 10/17/2017 Use to configure settings for cellular data. +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. + ## Applies to Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core --- | :---: | :---: | :---: | :---: | :---: PerDevice: [CellConfigurations](#cellconfigurations) | | X | | | - PerDevice: [CellData](#celldata) CellularFailover | X | X | X | X | X + PerDevice: [CellData](#celldata) CellularFailover | X | X | | | PerDevice: [CellData](#celldata) MaxNumberOfPDPContexts | | X | | | PerDevice: [CellData](#celldata) ModemProfiles | | X | | | PerDevice: [CellData](#celldata) PersistAtImaging | | X | | | PerDevice: [CellUX](#cellux) | | X | | | PerDevice: [CGDual](#cgdual) | | X | | | - PerDevice: [eSim](#esim) | X | X | X | X | X + PerDevice: [eSim](#esim) | X | X | | | PerDevice: [External](#external) | | X | | | PerDevice: [General](#general) | | X | | | PerDevice: [RCS](#rcs) | | X | | | - PerDevice: [SMS](#sms) | X | X | X | X | X + PerDevice: [SMS](#sms) | X | X | | | PerDevice: [UIX](#uix) | | X | | | PerDevice: [UTK](#utk) | | X | | | PerlMSI: [CellData](#celldata2) | | X | | | PerIMSI: [CellUX](#cellux2) | | X | | | PerIMSI: [General](#general2) | | X | | | PerIMSI: [RCS](#rcs2) | | X | | | - PerIMSI: [SMS](#sms2) | X | X | X | X | X + PerIMSI: [SMS](#sms2) | X | X | | | PerIMSI: [UTK](#utk2) | | X | | | PerIMSI: [VoLTE](#volte) | | X | | | diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index f99fdda1cf..e6977a3572 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -14,6 +14,9 @@ ms.date: 10/17/2017 Use to configure settings for cellular connections. +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. + ## Applies to | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index a6089989fd..d7848a5b29 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -14,6 +14,9 @@ ms.date: 10/17/2017 Use to configure settings for DeviceInfo. +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. + ## Applies to | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 6b986c88b7..51ad330441 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -14,6 +14,9 @@ ms.date: 10/17/2017 Use for settings related to Messaging and Commercial Mobile Alert System (CMAS). +>[!IMPORTANT] +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. + >[!NOTE] >CMAS is now known as Wireless Emergency Alerts (WEA). From 85fe3052aa50c4c09145c32b957956793441ffc1 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 14 Sep 2017 06:50:27 -0700 Subject: [PATCH 029/117] sync --- windows/configuration/wcd/wcd-textinput.md | 250 ++++++++++++++++++++- 1 file changed, 249 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-textinput.md b/windows/configuration/wcd/wcd-textinput.md index 943032fa75..41d86bf521 100644 --- a/windows/configuration/wcd/wcd-textinput.md +++ b/windows/configuration/wcd/wcd-textinput.md @@ -18,5 +18,253 @@ Use TextInput settings to configure ... | Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | :---: | :---: | :---: | :---: | :---: | -| | | | | | | +| Intelligence > DisablePredictions | | X | | | | +| PreEnabledKeyboard | | X | | | | +## Intelligence + +Set **DisablePredictions** to the locale or alternative input language that must have the text intelligence features disabled. For example, to disable text correction and suggestions for English (UK), set the value of **DisablePredictions** to `en-gb`. + +## PreEnabledKeyboard + +In addition to the automatically-enabled default keyboard, OEMs may choose to pre-enable more keyboards for a particular market. + +During phone bring-up, OEMs must set the boot locale, or default locale, for the phone. During first boot, Windows Phone reads the locale setting and automatically enables a default keyboard based on the locale to keyboard mapping table in Set languages and locales. + +The mapping works for almost all regions and additional customizations are not needed unless specified in the pre-enabled keyboard column in Set languages and locales. If an OEM chooses to pre-enable more keyboards for a particular market, they can do so by specifying the setting. Pre-enabled keyboards will automatically be enabled during boot. Microsoft recommends that partners limit the number of pre-enabled keyboards to those languages that correspond to the languages spoken within the market. + + +PreEnabledKeyboard must be entered once for each keyboard you want to pre-enable. As shown below, the format to specify a particular keyboard must be: Locale code.Locale value. See the following table for more information on the locale codes and values that you can use. The setting Value must be set to 1 to enable the keyboard. + +The following table shows the values that you can use for the Locale code.Locale value part of the setting name. + +>[!NOTE] +>The keyboards for some locales require additional language model files: am-ET, bn-IN, gu-IN, hi-IN, ja-JP, kn-IN, ko-KR, ml-IN, mr-IN, my-MM, or-IN, pa-IN, si-LK, ta-IN, te-IN, zh-TW, zh-CN, and zh-HK. + + +Name | Locale code | Keyboard layout value +--- | --- | --- +Afrikaans (South Africa) | af-ZA | 1 +Albanian | sq-AL | 1 +Amharic | am-ET | 1 +Arabic | ar-SA | 1 +Armenian | hy-AM | 1 +Assamese - INSCRIPT | as-IN | 1 +Azerbaijani (Cyrillic) | az-Cyrl-AZ | 1 +Azerbaijani (Latin) | az-Latn-AZ | 1 +Bangla (Bangladesh) - 49 key | bn-BD | 1 +Bangla (India) - INSCRIPT |bn-IN|1 +Bangla (India) - Phonetic|bn-IN|2 +Bashkir|ba-RU|1 +Basque|eu-ES|1 +Belarusian|be-BY|1 +Bosnian (Cyrillic)|bs-Cyrl-BA|1 +Bosnian (Latin)|bs-Latn-BA|1 +Bulgarian|bg-BG|1 +Catalan|ca-ES|1 +Central Kurdish|ku-Arab-IQ|1 +Cherokee|chr-Cher-US|1 +Chinese Simplified QWERTY|zh-CN|1 +Chinese Simplified - 12-key|zh-CN|2 +Chinese Simplified - Handwriting|zh-CN|3 +Chinese Simplified - Stroke|zh-CN|4 +Chinese Traditional (Hong Kong SAR) - Cangjie|zh-HK|1 +Chinese Traditional (Hong Kong SAR) - Quick|zh-HK|2 +Chinese Traditional (Hong Kong SAR) - Stroke|zh-HK|3 +Chinese Traditional (Taiwan) - BoPoMoFo|zh-TW|1 +Chinese Traditional (Taiwan) - Handwriting|zh-TW|2 +Croatian|hr-HR|1 +Czech|cs-CZ|1 +Danish|da-DK|1 +Divehi|dv-MV|1 +Dutch (Belgium)|nl-BE|1 +Dutch (Netherlands)|nl-NL|1 +Dzongkha|dz-BT|1 +English (Australia)|en-AU|1 +English (Canada)|en-CA|1 +English (India)|en-IN|1 +English (Ireland)|en-IE|1 +English (United Kingdom)|en-GB|1 +English (United States)|en-US|1 +Estonian|et-EE|1 +Faroese|fo-FO|1 +Filipino|fil-PH|1 +Finnish|fi-FI|1 +French (Belgium)|fr-BE|1 +French (Canada)|fr-CA|1 +French (France)|fr-FR|1 +French (Switzerland)|fr-CH|1 +Galician|gl-ES|1 +Georgian|ka-GE|1 +German (Germany)|de-DE|1 +German (Switzerland)|de-CH|1 +Greek|el-GR|1 +Greenlandic|kl-GL|1 +Guarani|gn-PY|1 +Gujarati - INSCRIPT|gu-IN|1 +Gujarati - Phonetic|gu-IN|2 +Hausa|ha-Latn-NG|1 +Hebrew|he-IL|1 +Hindi - 37-key|hi-IN|1 +Hindi - INSCRIPT|hi-IN|3 +Hindi - Phonetic|hi-IN|2 +Hinglish|hi-Latn|1 +Hungarian|hu-HU|1 +Icelandic|is-IS|1 +Igbo|ig-NG|1 +Indonesian|id-ID|1 +Inuktitut - Latin|iu-Latn-CA|1 +Irish|ga-IE|1 +Italian|it-IT|1 +Japanese - 12-key|ja-JP|1 +Japanese - QWERTY|ja-JP|2 +Kannada - INSCRIPT|kn-IN|1 +Kannada - Phonetic|kn-IN|2 +Kazakh|kk-KZ|1 +Khmer|km-KH|1 +Kinyarwanda|rw-RW|1 +Kiswahili|sw-KE|1 +Konkani|kok-IN|1 +Korean - 12-key Chunjiin|ko-KR|2 +Korean - 12-key Naratgeul|ko-KR|3 +Korean - 12-key Sky|ko-KR|4 +Korean - QWERTY|ko-KR|1 +Kyrgyz|ky-KG|1 +Lao|lo-LA|1 +Latvian|lv-LV|1 +Lithuanian|lt-LT|1 +Luxembourgish|lb-LU|1 +Macedonian|mk-MK|1 +Malay (Brunei Darussalam)|ms-BN|1 +Malay (Malaysia)|ms-MY|1 +Malayalam - INSCRIPT|ml-IN|1 +Malayalam - Phonetic|ml-IN|2 +Maltese|mt-MT|1 +Maori|mi-NZ|1 +Marathi - INSCRIPT|mr-IN|1 +Marathi - Phonetic|mr-IN|2 +Mongolian - Cyrillic|mn-MN|1 +Mongolian - Traditional Mongolian|mn-Mong-CN|1 +Myanmar|my-MM|1 +Nepali|ne-NP|1 +Norwegian - Bokmal|nb-NO|1 +Norwegian - Nynorsk|ny-NO|1 +Odia - INSCRIPT|or-IN|1 +Odia - Phonetic|or-IN|2 +Pashto|ps-AF|1 +Persian|fa-IR|1 +Polish|pl-PL|1 +Portuguese (Brazil)|pt-BR|1 +Portuguese (Portugal)|pt-PT|1 +Punjabi - INSCRIPT|pa-IN|1 +Punjabi - Phonetic|pa-IN|2 +Romanian|ro-RO|1 +Romansh|rm-CH|1 +Russian|ru-RU|1 +Sakha|sah-RU|1 +Sami, Northern (Norway)|se-NO|1 +Sami, Northern (Sweden)|se-NO|1 +Scottish Gaelic|gd-GB|1 +Serbian - Cyrillic|sr-Cyrl-RS|1 +Serbian - Latin|sr-Latn-RS|1 +Sesotho sa Leboa|nso-ZA|1 +Setswana|tn-ZA|1 +Sinhala|si-LK|1 +Slovak|sk-SK|1 +Slovenian +sl-SI +1 +Sorbian, Upper +hsb-DE +1 +Spanish (Mexico) +es-MX +1 +Spanish (Spain) +es-ES +1 +Swedish +sv-SE +1 +Syriac +syr-SY +1 +Tajik +tg-Cyrl-TJ +1 +Tamazight (Central Atlas) - Tifinagh +tzm-Tfng-MA +1 +Tamazight (Central Atlas) - Latin +tzm-Latn-DZ +1 +Tamil - INSCRIPT +ta-IN +1 +Tamil - Phonetic +ta-IN +2 +Tatar +tt-RU +1 +Telugu - INSCRIPT +te-IN +1 +Telugu - Phonetic +te-IN +2 +Thai +th-TH +1 +Tibetan +bo-CN +1 +Turkish +tr-TR +1 +Turkmen +tk-TM +1 +Ukrainian +uk-UA +1 +Urdu +ur-PK +1 +Uyghur +ug-CN +1 +Uzbek - Cyrillic +uz-Cyrl-UZ +1 +Uzbek - Latin +uz-Latn-UZ +1 +Valencian +ca-ES-valencia +1 +Vietnamese - QWERTY +vi-VN +1 +Vietnamese - TELEX +vi-VN +2 +Vietnamese - VNI +vi-VN +3 +Welsh +cy-GB +1 +Wolof +#N/A +1 +Xhosa +xh-ZA +1 +Yoruba +yo-NG +1 +Zulu +zu-ZA +1 + From 037a19e4024cc669a776c69597de5ca7384176bf Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 14 Sep 2017 07:42:06 -0700 Subject: [PATCH 030/117] sync --- windows/configuration/wcd/wcd-textinput.md | 128 +++++------------- .../wcd/wcd-universalappinstall.md | 14 ++ 2 files changed, 46 insertions(+), 96 deletions(-) diff --git a/windows/configuration/wcd/wcd-textinput.md b/windows/configuration/wcd/wcd-textinput.md index 41d86bf521..f4c6e73ca5 100644 --- a/windows/configuration/wcd/wcd-textinput.md +++ b/windows/configuration/wcd/wcd-textinput.md @@ -171,100 +171,36 @@ Sesotho sa Leboa|nso-ZA|1 Setswana|tn-ZA|1 Sinhala|si-LK|1 Slovak|sk-SK|1 -Slovenian -sl-SI -1 -Sorbian, Upper -hsb-DE -1 -Spanish (Mexico) -es-MX -1 -Spanish (Spain) -es-ES -1 -Swedish -sv-SE -1 -Syriac -syr-SY -1 -Tajik -tg-Cyrl-TJ -1 -Tamazight (Central Atlas) - Tifinagh -tzm-Tfng-MA -1 -Tamazight (Central Atlas) - Latin -tzm-Latn-DZ -1 -Tamil - INSCRIPT -ta-IN -1 -Tamil - Phonetic -ta-IN -2 -Tatar -tt-RU -1 -Telugu - INSCRIPT -te-IN -1 -Telugu - Phonetic -te-IN -2 -Thai -th-TH -1 -Tibetan -bo-CN -1 -Turkish -tr-TR -1 -Turkmen -tk-TM -1 -Ukrainian -uk-UA -1 -Urdu -ur-PK -1 -Uyghur -ug-CN -1 -Uzbek - Cyrillic -uz-Cyrl-UZ -1 -Uzbek - Latin -uz-Latn-UZ -1 -Valencian -ca-ES-valencia -1 -Vietnamese - QWERTY -vi-VN -1 -Vietnamese - TELEX -vi-VN -2 -Vietnamese - VNI -vi-VN -3 -Welsh -cy-GB -1 -Wolof -#N/A -1 -Xhosa -xh-ZA -1 -Yoruba -yo-NG -1 -Zulu -zu-ZA -1 +Slovenian|sl-SI|1 +Sorbian, Upper|hsb-DE|1 +Spanish (Mexico)|es-MX|1 +Spanish (Spain)|es-ES|1 +Swedish|sv-SE|1 +Syriac|syr-SY|1 +Tajik|tg-Cyrl-TJ|1 +Tamazight (Central Atlas) - Tifinagh|tzm-Tfng-MA|1 +Tamazight (Central Atlas) - Latin|tzm-Latn-DZ|1 +Tamil - INSCRIPT|ta-IN|1 +Tamil - Phonetic|ta-IN|2 +Tatar|tt-RU|1 +Telugu - INSCRIPT|te-IN|1 +Telugu - Phonetic|te-IN|2 +Thai|th-TH|1 +Tibetan|bo-CN|1 +Turkish|tr-TR|1 +Turkmen|tk-TM|1 +Ukrainian|uk-UA|1 +Urdu|ur-PK|1 +Uyghur|ug-CN|1 +Uzbek - Cyrillic|uz-Cyrl-UZ|1 +Uzbek - Latin|uz-Latn-UZ|1 +Valencian|ca-ES-valencia|1 +Vietnamese - QWERTY|vi-VN|1 +Vietnamese - TELEX|vi-VN|2 +Vietnamese - VNI|vi-VN|3 +Welsh|cy-GB|1 +Wolof|N/A|1 +Xhosa|xh-ZA|1 +Yoruba|yo-NG|1 +Zulu|zu-ZA|1 diff --git a/windows/configuration/wcd/wcd-universalappinstall.md b/windows/configuration/wcd/wcd-universalappinstall.md index f9c836b97c..de34f1f30f 100644 --- a/windows/configuration/wcd/wcd-universalappinstall.md +++ b/windows/configuration/wcd/wcd-universalappinstall.md @@ -24,6 +24,7 @@ Use UniversalAppInstall settings to install Windows apps from the Microsoft Stor | --- | :---: | :---: | :---: | :---: | :---: | | [DeviceContextApp](#devicecontextapp) | X | | X | | | | [DeviceContextAppLicense](#devicecontextapplicense) | X | | X | | | +| [StoreInstall](#storeinstall) | X | X | X | X | X | | [UserContextApp](#usercontextapp) | X | X | X | X | X | | [UserContextAppLicense](#usercontextapplicense) | X | X | X | X | X | @@ -55,6 +56,19 @@ Use to specify the license file for the provisioned app. 2. Select the LicenseProductId in the Available Customizations pane, and then browse to and select the app license file. +## StoreInstall + +Use to install an app from the Microsoft Store for Business. + +1. Enter a package family name, and then click **Add**. +2. Configure the following required settings for the app package. + +Setting | Description +--- | --- +Flags | Select `0` to +ProductID | +SkuID | + ## UserContextApp Use to add a new user context app. From 616afd9551c8f5e14f4e724bc77111f599ab95fb Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 14 Sep 2017 08:48:35 -0700 Subject: [PATCH 031/117] add links in parent topic --- windows/configuration/wcd/wcd-assignedaccess.md | 2 +- .../configuration/wcd/wcd-callandmessagingenhancement.md | 1 + windows/configuration/wcd/wcd-connections.md | 2 +- windows/configuration/wcd/wcd-deviceinfo.md | 2 +- windows/configuration/wcd/wcd-hotspot.md | 2 +- windows/configuration/wcd/wcd-messaging.md | 2 +- windows/configuration/wcd/wcd-textinput.md | 2 +- windows/configuration/wcd/wcd-universalappuninstall.md | 2 +- windows/configuration/wcd/wcd.md | 8 +++++++- 9 files changed, 15 insertions(+), 8 deletions(-) diff --git a/windows/configuration/wcd/wcd-assignedaccess.md b/windows/configuration/wcd/wcd-assignedaccess.md index 7c9afdb3e2..9c310df802 100644 --- a/windows/configuration/wcd/wcd-assignedaccess.md +++ b/windows/configuration/wcd/wcd-assignedaccess.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/17/2017 +ms.date: 10/17/2017 --- # AssignedAccess (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-callandmessagingenhancement.md b/windows/configuration/wcd/wcd-callandmessagingenhancement.md index 51d23e5e59..8bef045fdb 100644 --- a/windows/configuration/wcd/wcd-callandmessagingenhancement.md +++ b/windows/configuration/wcd/wcd-callandmessagingenhancement.md @@ -13,6 +13,7 @@ ms.date: 10/17/2017 # CallAndMessagingEnhancement (Windows Configuration Designer reference) Use to configure call origin and blocking apps. + >[!IMPORTANT] >These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. diff --git a/windows/configuration/wcd/wcd-connections.md b/windows/configuration/wcd/wcd-connections.md index 5f8ecb6bf3..43142b1363 100644 --- a/windows/configuration/wcd/wcd-connections.md +++ b/windows/configuration/wcd/wcd-connections.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/17/2017 +ms.date: 10/17/2017 --- # Connections (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index d7848a5b29..689c1b3e09 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/17/2017 +ms.date: 10/17/2017 --- # DeviceInfo (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-hotspot.md b/windows/configuration/wcd/wcd-hotspot.md index 27a67975b8..cea5973633 100644 --- a/windows/configuration/wcd/wcd-hotspot.md +++ b/windows/configuration/wcd/wcd-hotspot.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21 10/17/2017 +ms.date: 10/17/2017 --- # HotSpot (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 51ad330441..6d482dbb17 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 10/17/2017 +ms.date: 10/17/2017 --- # Messaging (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-textinput.md b/windows/configuration/wcd/wcd-textinput.md index f4c6e73ca5..865944b8e9 100644 --- a/windows/configuration/wcd/wcd-textinput.md +++ b/windows/configuration/wcd/wcd-textinput.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21 10/17/2017 +ms.date: 10/17/2017 --- # TextInput (Windows Configuration Designer reference) diff --git a/windows/configuration/wcd/wcd-universalappuninstall.md b/windows/configuration/wcd/wcd-universalappuninstall.md index 70cd723052..3c2049687f 100644 --- a/windows/configuration/wcd/wcd-universalappuninstall.md +++ b/windows/configuration/wcd/wcd-universalappuninstall.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # UniversalAppUninstall (reference) diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index 080f9e469f..d0ab5d9dd1 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -7,7 +7,7 @@ ms.sitesec: library author: jdeckerMS ms.localizationpriority: medium ms.author: jdecker -ms.date: 08/21/2017 +ms.date: 10/17/2017 --- # Windows Configuration Designer provisioning settings (reference) @@ -25,6 +25,8 @@ This section describes the settings that you can configure in [provisioning pack | [AutomaticTime](wcd-automatictime.md) | | X | | | | | [Browser](wcd-browser.md) | X | X | X | X | | | [CallAndMessagingEnhancement](wcd-callandmessagingenhancement.md) | | X | | | | +| [Calling](wcd-calling.md) | | X | | | | +| [CellCore](wcd-cellcore.md) | X | X | | | | | [Cellular](wcd-cellular.md) | X | | | | | | [Certificates](wcd-certificates.md) | X | X | X | X | X | | [CleanPC](wcd-cleanpc.md) | X | | | | | @@ -34,6 +36,7 @@ This section describes the settings that you can configure in [provisioning pack | [DesktopBackgroundAndColors](wcd-desktopbackgroundandcolors.md) | X | | | | | | [DeveloperSetup](wcd-developersetup.md) | | | | X | | | [DeviceFormFactor](wcd-deviceformfactor.md) | X | X | X | X | | +| [DeviceInfo](wcd-deviceinfo.md) | | X | | | | | [DeviceManagement](wcd-devicemanagement.md) | X | X | X | X | | | [DMClient](wcd-dmclient.md) | X | X | X | X | X | | [EditionUpgrade](wcd-editionupgrade.md) | X | X | X | X | | @@ -41,6 +44,7 @@ This section describes the settings that you can configure in [provisioning pack | [FirewallConfiguration](wcd-firewallconfiguration.md) | | | | | X | | [FirstExperience](wcd-firstexperience.md) | | | | X | | | [Folders](wcd-folders.md) |X | X | X | X | | +| [HotSpot](wcd-hotspot.md) | X | X | X | X | X | | [InitialSetup](wcd-initialsetup.md) | | X | | | | | [InternetExplorer](wcd-internetexplorer.md) | | X | | | | | [Licensing](wcd-licensing.md) | X | | | | | @@ -55,6 +59,7 @@ This section describes the settings that you can configure in [provisioning pack | [OtherAssets](wcd-otherassets.md) | | X | | | | | [Personalization](wcd-personalization.md) | X | | | | | | [Policies](wcd-policies.md) | X | X | X | X | X | +| [Power](wcd-power.md) | X | X | X | X | X | | [ProvisioningCommands](wcd-provisioningcommands.md) | X | | | | | | [SharedPC](wcd-sharedpc.md) | X | | | | | | [Shell](wcd-shell.md) | | X | | | | @@ -65,6 +70,7 @@ This section describes the settings that you can configure in [provisioning pack | [SurfaceHubManagement](wcd-surfacehubmanagement.md) | | | X | | | | [TabletMode](wcd-tabletmode.md) |X | X | X | X | | | [TakeATest](wcd-takeatest.md) | X | | | | | +| [TextInput](wcd-textinput.md) | | X | | | | | [Theme](wcd-theme.md) | | X | | | | | [UnifiedWriteFilter](wcd-unifiedwritefilter.md) | X | | | | | | [UniversalAppInstall](wcd-universalappinstall.md) | X | X | X | X | X | From a249c3b89caaa035284f17d7232aa29610ea4132 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 14 Sep 2017 13:01:44 -0700 Subject: [PATCH 032/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 469 +++++++++++++++++++++- 1 file changed, 455 insertions(+), 14 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 118db68ab7..85a6ed838b 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -48,10 +48,10 @@ Use to configure settings for cellular data. ### CellConfigurations -NO CLUE WHAT THEY'RE CONFIGURING HERE -1. In **CellConfiguration** > **PropertyGroups**, enter (?). -2. Select the **PropertyGroups** you just created in the **Available customizations** pane and then enter a **PropertyName** (?). + +1. In **CellConfiguration** > **PropertyGroups**, enter a name for the property group. +2. Select the **PropertyGroups** you just created in the **Available customizations** pane and then enter a **PropertyName**. 3. Select the **PropertyName** you just created in the **Available customizations** pane, and then select one of the following data types for the property: - Binary - Boolean @@ -133,7 +133,7 @@ Select from the following: ### eSim ->eSim > FwUpdate? > AllowedAppIdList? > any text ??? +Configure **FwUpdate** > **AllowedAppIdList** to whitelist apps that are allowed to update the firmware. Obtain the app IDs from the card vendor. ### External @@ -169,7 +169,7 @@ SRVCCAutoToggleWmRil | Configure whether to link SRVCC to VOLTE on/off. Setting | Description --- | --- atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | -AvoidStaingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. +AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. @@ -185,43 +185,484 @@ LTEForced | Select **Yes** to force LTE. ManualNetworkSelectionTimeout | Set the default network selection timeout value, in a range of 1-600 seconds. By default, the OS allows the phone to attempt registration on the manually selected network for 60 seconds (or 1 minute) before it switches back to automatic mode. This value is the amount of time that the OS will wait for the modem to register on the manually selected network. If the time lapses and the modem was not able to register on the network that was manually selected by the user, the OS will either switch back to the automatic network selection mode if Permanent automatic mode is enabled, and the user has manually selected a network or the modem was turned on, or display a dialog that notifies the user that the phone was unable to connect to the manually selected network after the phone was turned on or after airplane mode was turned off. NetworkSuffix | To meet branding requirements for some mobile operators, you can add a suffix to the network name that is displayed on the phone. For example, you can change from ABC to ABC 3G when under 3G coverage. This feature can be applied for any radio access technology (RAT). For TD-SCDMA RAT, a 3G suffix is always appended by default, but partners can also customize this the same way as with any other RAT. In the setting name, set SYSTEMTYPE to the network type that you want to append the network name to and click **Add**:

- system type 4: 2G (GSM)
- system type 8: 3G (UMTS)
- system type 16: LTE
- system type 32: 3G (TS-SCDMA)

Select the system type that you added, and enter the network name and suffix that you want displayed. NitzFiltering | For mobile networks that can receive Network Identity and Time Zone (NITZ) information from multiple sources, partners can set the phone to ignore the time received from an LTE network. Time received from a CDMA network is not affected. Set the value of NitzFiltering to `0x10`. -OperatorListForExcludedSystemTypes | -OperatorPreferredForFasterRadio | -PreferredDataProviderList | -Slot2DisableAppsList | -Slot2ExcludedSystemTypes | -SuggestDataRoamingARD | -SuggestGlobalModeARD | -SuggestGlobalModeTimeout | +OperatorListForExcludedSystemTypes | Enter a comma-separated list of MCC and MNC (MCC:MNC) for which system types should be restricted. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can specify the MCC and MNC of other specific operators that the main mobile operator wishes to limit. If the UICC's MCC and MNC matches any of the pairs that OEMs can specify for the operator, a specified RIL system type will be removed from the UICC regardless of its app types, slot position, or executor mapping. This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. Set the value of the OperatorListForExcludedSystemTypes setting a comma separated list of MCC:MNC pairs for which the system types should be restricted. For example, the value can be set to 310:026,310:030 to restrict operators with an MCC:MNC of 310:026 and 310:030. +OperatorPreferredForFasterRadio | Set Issuer Identification Number (IIN) or partial ICCID of preferred operator for the faster radio. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can map a partial ICCID or an Industry Identification Number (IIN) to the faster radio regardless of which SIM card is chosen for data connectivity. This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To map a partial ICCID or an IIN to the faster radio regardless of which SIM card is chosen for data connectivity, set the value of OperatorPreferredForFasterRadio to match the IIN or the ICCID, up to 7 digits, of the preferred operator. +PreferredDataProviderList | OEMs can set a list of MCC/MNC pairs for the purchase order (PO) carrier or primary operator. For mobile operators that require it, OEMs can set a list of MCC/MNC pairs for the purchase order (PO) carrier or primary operator so that it can be set as the default data line for phones that have a dual SIM. When the PO SIM is inserted into the phone, the OS picks the PO SIM as the data line and shows a notification to the user that the SIM has been selected for Internet data. If two PO SIMs are inserted, the OS will choose the first PO SIM that was detected as the default data line and the mobile operator action required dialogue (ARD) is shown. If two non-PO SIMs are inserted, the user is prompted to choose the SIM to use as the default data line. Note OEMs should not set this customization unless required by the mobile operator. To enumerate the MCC/MNC value pairs to use for data connections, set the value for **PreferredDataProviderList**. The value must be a comma-separated list of preferred MCC:MNC values. For example, the value can be 301:026,310:030 and so on. +Slot2DisableAppsList | Disable specified apps from slot 2 on a C+G dual SIM phone. To disable a list of specified apps from Slot 2, set Slot2DisableAppsList to a comma-separated list of values representing the apps. For example, `4,6`. +Slot2ExcludedSystemTypes | Exclude specified system types from SIM cards inserted in Slot 2. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can restrict the second slot in a dual-SIM phone regardless of what apps or executor mapping the second slot is associated with. Note This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To allow an operator to simply restrict the second slot in a dual SIM phone regardless of what apps or executor mapping the second slot is associated with, set the value of Slot2ExcludedSystemTypes to the system types to be excluded from the SIM cards inserted in Slot 2. +For example, a value of 0x8 specifies RIL_SYSTEMTYPE_UMTS (3G) while 0x10 specifies RIL_SYSTEMTYPE_LTE (4G). To exclude more than one system type, perform a bitwise OR operation on the radio technologies you want to exclude. For example, a bitwise OR operation on RIL_SYSTEMTYPE_LTE (4G) and RIL_SYSTEMTYPE_UMTS (3G) results in the value 11000 (binary) or 0x18 (hexadecimal). In this case, any SIM inserted in Slot 2 will be limited to 2G. For more information about the RIL system types, see [RILSYSTEMTYPE](https://msdn.microsoft.com/library/windows/hardware/dn931143.aspx). +SuggestDataRoamingARD | Use to show the data roaming suggestion dialog when roaming and the data roaming setting is set to no roaming. +SuggestGlobalModeARD | Define whether Global Mode is suggested on a C+G dual SIM phone. +SuggestGlobalModeTimeout | To specify the number of seconds to wait for network registration before suggesting global mode, set SuggestGlobalModeTimeout to a value between 1 and 600, inclusive. For example, to set the timeout to 60 seconds, set the value to 60 (decimal) or 0x3C (hexadecimal). ### RCS +Setting | Description +--- | --- +SystemEnabled | Select **Yes** to specify that the system is RCS-enabled. +UserEnabled | Select **Yes** to show the user setting if RCS is enabled on the device. + ### SMS +Setting | Description +--- | --- +AckExpirySeconds | Set the value, in seconds, for how long to wait for a client ACK before trying to deliver. +DefaultMCC | Set the default mobile country code (MCC). +Encodings > GSM7BitEncodingPage | Enter the code page value for the 7-bit GSM default alphabet encoding. Values:

- Code page value: 55000 (Setting value: 0xD6D8)(Code page: default alphabet)
- Code page value: 55001 (Setting value: 0xD6D9)(Code page: GSM with single shift for Spanish)- Code page value: 55002 (Setting value: 0xD6DA)(Code page: GSM with single shift for Portuguese)- Code page value: 55003 (Setting value: 0xD6DB)(Code page: GSM with single shift for Turkish)- Code page value: 55004 (Setting value: 0xD6DC)(Code page: SMS Greek Reduction) +Encodings > GSM8BitEncodingPage | Enter the code page value for GSM 8-bit encoding (OEM set). OEM-created code page IDs should be in the range 55050–55099. For more information, see [Add encoding extension tables for SMS]https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/add-encoding-extension-tables-for-sms). +Encodings > OctetEncodingPage | Set the octet (binary) encoding. +Encodings > SendUDHNLSS | Set the 7 bit GSM shift table encoding. +Encodings > UseASCII | Set the 7 bit ASCII encoding. Used only for CDMA carriers that use 7-bit ASCII encoding instead of GSM 7-bit encoding. +Encodings > UseKeyboardLangague | Set whether to use the keyboard language (Portuguese, Spanish, or Turkish) based encoding (set shift table based on keyboard language). +IncompleteMsgDeliverySeconds | Set the value, in seconds, for long to wait for all parts of multisegment Sprint messages for concatenation. +MessageExpirySeconds | Partners can set the expiration time before the phone deletes the received parts of a long SMS message. For example, if the phone is waiting for a three-part SMS message and the first part has been received, the first part will be deleted when the time expires and the other part of the message has not arrived. If the second part of the message arrives before the time expires, the first and second parts of the message will be deleted if the last part does not arrive after the time expires. The expiration time is reset whenever the next part of the long message is received. Set MessageExpirySeconds to the number seconds that the phone should wait before deleting the received parts of a long SMS messages. This value should be in hexadecimal and must be prefixed with 0x. The default value is 0x15180, which is equivalent to 1 day or 86,400 seconds. +SmsFragmentLimit | Partners can specify a maximum length for SMS messages. This requires setting both the maximum number of SMS fragments per SMS message, from 1 to 255, and the maximum size in bytes of each SMS fragment, from 16 to 140 bytes. Use SmsFragmentLimit to set the maximum number of bytes in the user data body of an SMS message. You must set the value between 16 (0x10) and 140 (0x8C). You must also use SmsPageLimit to set the maximum number of segments in a concatenated SMS message. +SmsPageLimit | Partners can specify a maximum length for SMS messages. This requires setting both the maximum number of SMS fragments per SMS message, from 1 to 255, and the maximum size in bytes of each SMS fragment, from 16 to 140 bytes. Use SmsPageLimit to set the maximum number of segments in a concatenated SMS message. You must set the value to 255 (0xFF) or smaller. You must also use SmsFragmentLimit to set the maximum number of bytes in the body of the SMS message. +SprintFragmentInfoInBody | Partners can enable the messaging client to allow users to enter more than 160 characters per message. Messages longer than 160 characters are sent as multiple SMS messages that contain a tag at the beginning of the message in the form "(1/2)", where the first number represents the segment or part number and the second number represents the total number of segments or parts. Multiple messages are limited to 6 total segments. When enabled, the user cannot enter more characters after the 6 total segments limit is reached. Any message received with tags at the beginning is recombined with its corresponding segments and shown as one composite message. +Type3GPP > ErrorHandling > ErrorType | Enter a name for ERRORCODE3GPP, and click **Add**. Configure the error type that you added as **Transient Failure** or **Permanent Failure**. +Type3GPP > ErrorHandling > FriendlyErrorClass | Enter a name for ERRORCODE3GPP, and click **Add**. Configure the error class that you added as **generic error**, **invalid recepient address**, or **network connectivity trouble**. +Type3GPP > IMS > SmsUse16BitReferenceNumbers | Configure whether to use 8-bit or 16-bit message ID (reference number) in the UDH. +Type3GPP2 > ErrorHandling > FriendlyErrorClass | Enter a name for ERRORCODE3GPP2, and click **Add**. Configure the error class that you added as **generic error**, **invalid recepient address**, or **network connectivity trouble**. +Type3GPP2 > ErrorHandling > UseReservedAsPermanent | Set the 3GPP2 permanent error type. + +### UIX + +Setting | Description +--- | --- +SIM1ToUIM1 | Used to show UIM1 as an alternate string instead of SIM1 for the first SIM on C+G dual SIM phones. +SIMToSIMUIM | Partners can change the string "SIM" to "SIM/UIM" to accommodate scenarios such as Dual Mode cards of SIM cards on the phone. This can provide a better user experience for users in some markets. Enabling this customization changes all "SIM" strings to "SIM/UIM". + + + +### UTK + +Setting | Description +--- | --- +UIDefaultDuration | Specifies the default time, in milliseconds, that the DISPLAY TEXT, GET INKEY, PLAY TONE, or SELECT ITEM dialog should be displayed. The default value is 60000 milliseconds (60 seconds). The valid value range is 1-120000. +UIGetInputDuration | Specifies the default time, in milliseconds, that the GET INPUT dialog should be displayed. The default value is 120000 milliseconds (120 seconds). The valid value range is 1-120000. + + + + ## PerlMSI - + +Enter an IMSI, click **Add**, and then select the IMSI that you added to configure the following settings. ### CellData +Setting | Description +--- | --- +MaxNumberOfPDPContexts | OEMs can set a maximum value for the number of simultaneous packet data protocol (PDP) contexts for 3GPP connections. By default, the OS enforces a maximum of four (4) simultaneous packet data protocol (PDP) contexts for 3GPP connections, and one (1) PDP context for 3GPP2 connections. OEMs can set a different maximum value if required by their mobile operator. The same maximums apply for both roaming and non-roaming scenarios. This maximum does not include packet contexts used internally by the modem. + + ### CellUX +Setting | Description +--- | --- +APNIPTypeIfHidden | Used to set the default IP type shown in the **IP type** listbox on the **internet APN** settings screen. +Critical > ShowVoLTERoaming | Use to show the IMS roaming control in the cellular settings page +Critical > ShowVoLTEToggle | Show or hide VoLTE toggle. +Critical > SwitchIMS | Switch IMS on or off with a toggle. OEMs can configure the default settings and toggle for IMS services to meet mobile operator requirements. Users can later manually change the default values for these settings if they choose to do so. +Critical > SwitchSMSOverIMS | Switch SMS over IMS on or off when VoLTE is toggled. +Critical > SwitchVideoOverIMS | Use to switch video over IMS when VoLTE is switched. +Critical > SwitchVoiceOverIMS | Switch voice over IMS when VoLTE is toggled. +Critical > SwitchXCAP | Use to switch the XML Configuration Access Protocol (XCAP) when VoLTE is enabled. +Critical > VoLTERoamingOffDescription | Use to customize the description string that appears under IMS roaming control when IMS roaming is turned off. The string must not be longer than 127 characters. +Critical > VoLTERoamingOnDescription | Use to customize the description string that appears under IMS roaming control when IMS roaming is turned on. The string must not be longer than 127 characters. +Critical > VoLTERoamingSettingDisableDuringCall | Use to specify whether to grey out VoLTE roaming settings during an active VoLTE call. +Critical > VoLTERoamingTitle | Use to customize the description string for the IMS roaming control. The string must not be longer than 127 characters. +Critical > VoLTESectionTitle | Use to customize the section title for the IMS settings. he string must not be longer than 127 characters. +Critical > VoLTESettingDisableDuringCall | Use to specify whether to grey out VoLTE-related settings during an active VoLTE call. +Critical > VoLTEToggleDescription | Use to customize the VoLTE toggle description. To customize the VoLTE toggle description, set VoLTEToggleDescription to the name of the resource-only .dll file, specifying the string offset. For example: @DisplayStrings.dll,-101. +Critical > VoLTEToggleSettingDisableDuringCall | Use to specify whether to grey out the VoLTE toggle during an active VoLTE call. +Critical > VoLTEToggleTitle | Use to customize the VoLTE toggle label. To customize the VoLTE toggle label, set VoLTEToggleTitle to the name of the resource-only .dll file, specifying the string offset. For example: @DisplayStrings.dll,-102. +Critical > WFCSettingDisableDuringCall | Use to specify whether to grey out the Wi-Fi calling settings during an active VoLTE call. +Disable2GByDefault | Select **Yes** to disable 2G by default. Select **No** to enable 2G. +Disabled2GNoticeDescription | Enter text to customize the notification for disabled 2G. +GenericWifiCallingErrorMessage | Enter text to customize the generic error message when a Wi-Fi calling error occurs. +Hide3GPP2ModeSelection | Select **Yes** to hide the **CDMA** option in the network **Mode** selection drop-down menu. Select **No** to show the **CDMA** option. +Hide3GPP2Selection | For 3GPP2 or CDMA phones, select **Yes** to hide the **Network Type** drop-down menu in the **SIM** settings screen. Select **No** to show **Network Type**. +Hide3GPPNetworks | For 3GPP or GSM phones, select **Yes** to hide the **Network Type** drop-down menu in the **SIM settings** screen. Select **No** to show **Network Type**. +HideAPN | Select **Yes** to hide the **add internet APN** button in the **SIM settings** screen. Select **No** to show **add internet APN**. +HideAPNIPType | Select **Yes** to hide the **IP type** list in the **internet APN** settings screen. Select **No** to show **IP type**. +HideDisabled2GNotice | Select **Yes** to hide the notification for disabled 2G. Select **No** to show the notification for disabled 2G. +HideHighestSpeed | Select **Yes** to hide the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show **Highest connection speed**. +HideHighestSpeed2G | Select **Yes** to hide the 2G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 2G option. +HideHighestSpeed3GOnly | Select **Yes** to hide the 3G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 3G option. +HideHighestSpeed4G | Select **Yes** to hide the 4G option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G option. +HideHighestSpeed4G3GOnly | Select **Yes** to hide the 4G or 3G Only option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G or 3G Only option. +HideHighestSpeed4GOnly | Select **Yes** to hide the 4G Only option on the **Highest connection speed** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the 4G Only option. +HideLTEAttachAPN | Select **Yes** to hide the **LTE attach APN** button on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **LTE attach APN** button. +HideMMSAPN | Select **Yes** to hide the **add mms apn** button on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **add mms apn** button. +HideMMSAPNIPType | Select **Yes** to hide the APN IP type selector on the MMS APN page. Select **No** to show the APN IP type selector. +HideModeSelection | Select **Yes** to hide the **Network Mode selection** drop-down menu on the **Settings** > **Cellular+SIM** > **SIM** settings page. Select **No** to show the **Network Mode selection**. +HidePersoUnlock | Select **Yes** to hide the Perso unlock UI. Select **No** to show the Perso unlock UI. +HighestSpeed2G | You can customize the listed names of the connection speeds with their own character codes. To modify "2G" to another character code, change the value of HighestSpeed2G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3G | You can customize the listed names of the connection speeds with their own character codes. To modify "3G" to another character code, change the value of HighestSpeed3G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "3G Only" to another character code, change the value of HighestSpeed3GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed3GPreferred | You can customize the listed names of the connection speeds with their own character codes. To modify "3G Preferred" to another character code, change the value of HighestSpeed3GPreferred. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4G | You can customize the listed names of the connection speeds with their own character codes. To modify "4G" to another character code, change the value of HighestSpeed4G. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4G3GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "4G or 3G Only" to another character code, change the value of HighestSpeed4G3GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeed4GOnly | You can customize the listed names of the connection speeds with their own character codes. To modify "4G Only" to another character code, change the value of HighestSpeed4GOnly. Although there is no limit to the number of characters you can use, if the character code is too long, it will be truncated in the UI. +HighestSpeedTitle | You can customize the **Highest connection speed** drop-down label in the **Settings** > **Cellular+SIM** > **SIM** settings page. To change the Highest connection speed drop-down label, set HighestSpeedTitle to another string. For example, you can set this to "Preferred connection speed". +IsATTSpecific | Control the roaming text for AT&T devices. AT&T requires the phone to show a particular roaming text to meet their legal and marketing guidelines. By default, if the user chooses **roam** under **Data roaming options** in the **Settings** > **Cellular+SIM** screen, they will see the following text: *Depending on your service agreement, you might pay more when using data roaming.* If you set IsATTSpecific to **Yes**, the following roaming text will be displayed instead: *International data roaming charges apply for data usage outside the United States, Puerto Rico, and United States Virgin Islands. Don’t allow roaming to avoid international data roaming charges.* +LTEAttachGUID | Set the value for LTEAttachGuid to the OemConnectionId GUID used for the LTE attach profile in the modem. The value is a GUID in the string format *XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX*. +MMSAPNIPTypeIfHidden | Select between **IPV4**, **IPV6**, **IPV4V6**, and **IPV4V6XLAT** for default MMS APN IP type. +ShowExtendedRejectCodes | When a reject code is sent by the network, partners can specify that extended error messages should be displayed instead of the standard simple error messages. This customization is only intended for use when required by the mobile operator’s network. The short versions of the extended reject message are shown in the following screens:

- Phone tile in Start

- Call History screen

- Dialer

- Call Progress screen

- Incoming Call screen

- As the status string under Settings > cellular+SIM


The long version of the extended reject message is shown under the Active Network label in **Settings** > **cellular+SIM**. Select **Yes** to show the extended error message. Select **No** to hide the extended error message. See [Error messages for reject codes](#errorreject) to see the versions of the message. +ShowHighestSpeed3GPreferred | Select **Yes** to show the **3G Preferred** option in the **Highest connection speed** drop-down menu. Select **No** to hide **3G Preferred**. +ShowManualAvoidance | Select **Yes** to show the **Switch to next network manually** button in SIM settings when Mode Selection is CDMA on a C+G dual SIM phone. Select **No** to hide the **Switch to next network manually** button +ShowPreferredPLMNPage | Select **Yes** to show the preferred public land mobile network (PLMN) page in SIM settings. +ShowSpecificWifiCallingError | Select **Yes** to show a specific error message based on operator requirements. +ShowViewAPN | Select **Yes** to show the **View Internet APN** button in **Settings** > **cellular+SIM**. +ShowWifiCallingEmergencyCallWarning | Select **Yes** to show Wi-Fi emergency call warning. +ShowWifiCallingError | Select **Yes** to show Wi-Fi calling error message. + + + + ### General +Setting | Description +--- | --- +atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | +AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. +CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. +CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. +CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. +Critical > MultivariantProvisionedSPN | +Critical > SimNameWithoutMSISDNENabled | +DisableLTESupportWhenRoaming | Set to **Yes** to disable LTE support when roaming. +ExcludedSystemTypesByDefault | Set the default value for **Highest connection speed** in the **Settings** > **Cellular & SIM** > **SIM** screen by specifying the bitmask for any combination of radio technology to be excluded from the default value. The connection speed that has not been excluded will show up as the highest connection speed. On dual SIM phones that only support up to 3G connection speeds, the **Highest connection speed** option is replaced by a 3G on/off toggle based on the per-device setting. Enter the binary setting to exclude 4G (`10000`) or 3G (`01000`). +LTEEnabled | Select **Yes** to enable LTE, and **No** to disable LTE. +LTEForced | Select **Yes** to force LTE. +NetworkSuffix | To meet branding requirements for some mobile operators, you can add a suffix to the network name that is displayed on the phone. For example, you can change from ABC to ABC 3G when under 3G coverage. This feature can be applied for any radio access technology (RAT). For TD-SCDMA RAT, a 3G suffix is always appended by default, but partners can also customize this the same way as with any other RAT. In the setting name, set SYSTEMTYPE to the network type that you want to append the network name to and click **Add**:

- system type 4: 2G (GSM)
- system type 8: 3G (UMTS)
- system type 16: LTE
- system type 32: 3G (TS-SCDMA)

Select the system type that you added, and enter the network name and suffix that you want displayed. +NitzFiltering | For mobile networks that can receive Network Identity and Time Zone (NITZ) information from multiple sources, partners can set the phone to ignore the time received from an LTE network. Time received from a CDMA network is not affected. Set the value of NitzFiltering to `0x10`. +OperatorListForExcludedSystemTypes | Enter a comma-separated list of MCC and MNC (MCC:MNC) for which system types should be restricted. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can specify the MCC and MNC of other specific operators that the main mobile operator wishes to limit. If the UICC's MCC and MNC matches any of the pairs that OEMs can specify for the operator, a specified RIL system type will be removed from the UICC regardless of its app types, slot position, or executor mapping. This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. Set the value of the OperatorListForExcludedSystemTypes setting a comma separated list of MCC:MNC pairs for which the system types should be restricted. For example, the value can be set to 310:026,310:030 to restrict operators with an MCC:MNC of 310:026 and 310:030. +OperatorPreferredForFasterRadio | Set Issuer Identification Number (IIN) or partial ICCID of preferred operator for the faster radio. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can map a partial ICCID or an Industry Identification Number (IIN) to the faster radio regardless of which SIM card is chosen for data connectivity. This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To map a partial ICCID or an IIN to the faster radio regardless of which SIM card is chosen for data connectivity, set the value of OperatorPreferredForFasterRadio to match the IIN or the ICCID, up to 7 digits, of the preferred operator. +SuggestDataRoamingARD | Use to show the data roaming suggestion dialog when roaming and the data roaming setting is set to no roaming. + + + + + + ### RCS +Setting | Description +--- | --- +AvailabilityCacheExpiration | +CapabilityCacheExpiration | +CapabilityPollInterval | +ChatCleanupInterval | +ChatCleanupTimeout | +ChatOneToOne | +ChatSameCallIdOnRetry | +ClientAddressChangeGracePeriod | +ClientClearDnsCacheOnAddressChange | +ClientClearServiceRouteOnAddressChange | +ClientConfigCnameDerivation | +ClientDNS | +ClientFeatureTagFt | +ClientFeatureTagFtThumb | +ClientFtHttp | +ClientMobileTechDiscoveryDelay | +ClientOverrideOmaPcscfAddress | +ClientPANI | +ClientPcscfDiscoveryOnFailure | +ClientPLANI | +ClientReconnectTimeout | +ClientrediscoverOnTechChange | +ClientRediscoveryProxyOnReprovisioning | +ClientRegInfo | +ClientReregisterOn403 | +ClientResetCallIdOnFeatureTagChange | +ClientVendor | +ClientVerifyTransportEndpoint | +ClientVersion | +DNSNetworkLock | +DNSPreferIpv4 | +DNSretryDelay | +DNSTimeout | +EcurSetWarningHeader | +HTTPNetworkLock | +HTTPUseProxy | +IsCapabilityDiscoveryEnabled | +IsComposingIdleTimeout | +IsComposingRefresh | +IsComposingRemoteIdleTimeout | +IsPresenceGzipEnabled | +MaxNumberOfEntriesInRequest | +MediaDialog100rel | +MediaDialog100relMT | +MediaDialogDTMF | +MediaDialogNoReferSub | +MediaDialogPlayEarlyRtp | +MediaDialogSTRP | +MediaDialogSRTP3ge2ae | +MMtelConferenceFactoryUri | +MSRPAllowPassive | +MSRPChatAnonymizeCPIM | +MSRPChatReport | +MSRPChunkSize | +MSRPConnectionInfoTakesPrecedence | +MSRPCPIMIgnoreLeadingLineBreaks | +MsrpFileInitialEmpty | +MSRPFileTransferReports | +MSRPFileTransferSlow | +MSRPFileTransferTimeout | +MSRPGroupChatEventHeader | +MSRPHashAttribute | +MSRPInsertFailureReportYes | +MSRPMediaDialogRingingStatusCode | +MSRPMediaDialogStartMedia | +MSRPNetworkLock | +MSRPPortRange | +MSRPPreferActive | +MSRPReferInDialogAlways | +MSRPRelayEnable | +MSRPRelayTLS | +MSRPRelayURI | +MSRPRemoteUseReferredBy | +MSRPSendOnlyIsDeferred | +MSRPUseReferToForOneContact | +MSRPWorkaroundCheckPort | +OneTimePasswordTemplate | +OptionsHasPolling | +OptionsSameCallIdOnRetry | +PresenceNotifyDuration | +ProvisioningType | +ProvisioningUrl | +PublishErrorRecoveryTimer | +RCSAutoConfigTestMode | +RCSChat180AutoAccept | +RCSChat180Sent | +RCSChatAnonymizeCPIM | +RCSChatBlackbirdFeatureTag | +RCSChatCPIMSeparateHeaders | +RCSChatDeferredNotificationsInMSRP | +RCSChatHangupStandfw | +RCSChatMDNWaitForConnection | +RCSChatInactivityTimeout | +RCSChatNoAutomaticImdn | +RCSChatNotifyAll | +RCSChatNotifyDisplay | +RCSChatNotifyDisplayed | +RCSChatNotifyProcessing | +RCSChatQueueOffline | +RCSChatSendDeliveredToBlockedUsers | +RCSDeferredFunctionPai | +RCSeAutoconfig | +RCSeAutoconfig2nd | +RCSeAutoConfigClientEnrichment | +RCSeAutoConfigDeviceId | +RCSeAutoConfigDeviceType | +RCSeAutoConfigDNSTimeout | +RCSeAutoConfigEscapePlus | +RCSeAutoConfigEveryBoot | +RCSeAutoConfigExpiryTimer | +RCSeAutoConfigForceProxyHttp | +RCSeAutoConfigInvalidRetryTime | +RCSeAutoConfigMsisdnTimeout | +RCSeAutoConfigOnce | +RCSeAutoConfigOnlyOTP | +RCSeAutoConfigOrange | +RCSeAutoConfigOtpTimeout | +RCSeAutoConfigRCS51 | +RCSeAutoConfigRcsProfile | +RCSeAutoConfigRetryCount | +RCSeAutoConfigRetrySameVersion | +RCSeAutoConfigSmsIn3G | +RCSeAutoConfigSmsPortInPs | +RCSeAutoConfigSmsProvisioning | +RCSeAutoConfigTelefonica | +RCSeAutoConfigTryForce3G | +RCSeAutoConfigURL | +RCSeAutoConfigURLPrefix | +RCSeAutoConfigVodafone | +RCSeAutoConfigWifiProvisioning | +RCSeAutoConfigWifiProvisioningRequireMSISDN | +RCSECapsAddOmaSipIm | +RCSeMinTimeBetweenQueries | +RCSFileTransfer | +RCSFileTransferCheckPartialHash | +RCSFileTransferCheckPartialSize | +RCSFileTransferMsrpGc | +RCSFileTransferThumbnail | +RCSFTHTTPCleanup | +RCSFTHTTPCleanupTimeout | +RCSFtHttpExpires | +RcsFtHttpRetryCount | +RcsFtHttpRetryFromStart | +RCSFtHttpTimeoutMs | +RCSFtHttpUploadResume | +RCSFTNetworkLock | +RCSFTResume | +RCSFTSeparateQueueFromIS | +RCSFTSTandFW | +RCSFTStartProgressAfter | +RCSFTThumbsRFC5547 | +RCSGeoPush | +RCSGroupChatBlackbird | +RCSGroupChatDepartReason | +RCSGroupChatDisplayed | +RCSGroupChatDontRestartOn480 | +RCSGroupChatDontsRestartOn503 | +RCSGroupChatDontRestartOnFail | +RCSGroupChatIgnoreDeletedNotify | +RCSGroupChatIMDN | +RCSGroupChatMarkMissingAsDeparted | +RCSGroupChatMinDelayReinvite | +RCSGroupChatNeverAcceptAfterDepart | +RCSGroupChatNotifyMissingDepartedIfDisconnected | +RCSGroupChatNotifyWorkaround | +RCSGroupChatNotifyWorkaroundDelay | +RCSGroupChatReestablishAttempts | +RCSGroupChatReferToFactoryUri | +RCSGroupChatReformatImdnTo | +RCSGroupChatRejectInviteRightAfterDepart | +RCSGroupChatRejoinDelay | +RCSGroupChatRemoveHeaderParameters | +RCSGroupChatSaveContact | +RCSIMDN | +RCSIMDNSetAcceptConect | +RCSMinDiskSpace | +RCSOptions200okAddAllow | +RCSOptions200okAllow | +RCSOptionsRequestDisposition | +RCSOptionsRequireChat | +RCSSessionReplaces | +RcsSmsPort | +RCSStandfwExactMatch | +RCSVideoShareOutgoingTimeout | +RCSVSOutsideCall | +ReferToRFC5368 | +RegisterAddAllow | +RegisterClearNonceOnNewCallId | +RegistercompressTags | +RegisterExpires | +RegisterSameCallIdDelay | +RegisterUseQValue | +Registration3gpp | +RegistrationNeverResetCallId | +RegistrationRefreshTimeout | +RegistrationRFC3608 | +RTPSocketBufferSize | +RTPSocketBufferSizeRecv | +RTPSockeetBufferSizeSend | +Server | +SessionExpires | +SessionExpiresEnable | +SessionExpiresEnableMSRP | +SessionExpiresMSRP | +SessionExpiresRefresher | +SessionExpiresRefresherMSRP | +SessionMinSE | +SIPDialogSendReason | +SIPKeepAlive | +SIPKeepAliveForceTimeout | +SIPTransportT1 | +SIPTransportT2 | +SIPTransportTimerA | +SIPTransportTimerB | +SIPTransportTimerD | +SIPTransportTimerE | +SIPTransportUDPCOnnect | +SockeetconfigureSocketMaskBind | +SocketconfiguresocketMaskConnect | +SocketHTTPActivationGUID | +SocketHTTPDataAttributionCosted | +SocketHTTPDataAttributionFriendlyName | +SocketHTTPDataAttributionGUID | +SocketMSRPActivationGUID | +SocketMSRPDataAttributionCosted | +SocketMSRPDataAttributionFriendlyName | +SocketMSRPDataAttributionGUID | +SocketRPTActivationGUID | +SocketRTPDataAttributionCosted | +SocketRTPDataAttributionFriendlyName | +SocketRTPDataAttributionGUID | +SocketSignalingActivationGUID | +SocketSignalingDataAttributionCosted | +SocketSignalingDataAttributionFriendlyName | +SocketSingalingDataAttributionGUID | +SocketXCAPActivationGUID | +SocketXCAPDataAttributionCosted | +SocketXCAPDataAttributionFriendlyName | +SocketXCAPDataAttributionGUID | +SSLSocketVerifyCertificate | +SSLSocketVerifyCertificatFTHTTP | +SSLSocketVerifyCertificateMSRP | +SSLSocketVerifyCertificateSIP | +StackAddRouteToRegister | +StackAddSrtpHeadersAll | +StackBindAny | +StackDetectUsingConnectedEndpoint | +StackPAI | +StackPPI | +StackPPIRegister | +StackRPort | +StackSetProxyAuthentication | +StackSetProxyAuthorization | +StackSipInstance | +StackSipInstanceUUIDAuto | +StackSipInstanceUUIDDeviceBased | +StackSipInstanceUUIDRandom | +TimerReregister | +UserAgent | +UseSingleRegistration | +VoLTEProvisioningStatus | +XDMSIdentityHeader | +XDMSQuoteIdentity | +XDMSStripPlusFromXui | +XDMSStripPlusInHeader | + + + ### SMS +Setting | Description +--- | --- +AckExpirySeconds | Set the value, in seconds, for how long to wait for a client ACK before trying to deliver. +DefaultMCC | Set the default mobile country code (MCC). +Encodings > GSM7BitEncodingPage | Enter the code page value for the 7-bit GSM default alphabet encoding. Values:

- Code page value: 55000 (Setting value: 0xD6D8)(Code page: default alphabet)
- Code page value: 55001 (Setting value: 0xD6D9)(Code page: GSM with single shift for Spanish)- Code page value: 55002 (Setting value: 0xD6DA)(Code page: GSM with single shift for Portuguese)- Code page value: 55003 (Setting value: 0xD6DB)(Code page: GSM with single shift for Turkish)- Code page value: 55004 (Setting value: 0xD6DC)(Code page: SMS Greek Reduction) +Encodings > GSM8BitEncodingPage | Enter the code page value for GSM 8-bit encoding (OEM set). OEM-created code page IDs should be in the range 55050–55099. For more information, see [Add encoding extension tables for SMS]https://docs.microsoft.com/windows-hardware/customize/mobile/mcsf/add-encoding-extension-tables-for-sms). +Encodings > OctetEncodingPage | Set the octet (binary) encoding. +Encodings > SendUDHNLSS | Set the 7 bit GSM shift table encoding. +Encodings > UseASCII | Set the 7 bit ASCII encoding. Used only for CDMA carriers that use 7-bit ASCII encoding instead of GSM 7-bit encoding. +Encodings > UseKeyboardLangague | Set whether to use the keyboard language (Portuguese, Spanish, or Turkish) based encoding (set shift table based on keyboard language). +IncompleteMsgDeliverySeconds | Set the value, in seconds, for long to wait for all parts of multisegment Sprint messages for concatenation. +MessageExpirySeconds | Partners can set the expiration time before the phone deletes the received parts of a long SMS message. For example, if the phone is waiting for a three-part SMS message and the first part has been received, the first part will be deleted when the time expires and the other part of the message has not arrived. If the second part of the message arrives before the time expires, the first and second parts of the message will be deleted if the last part does not arrive after the time expires. The expiration time is reset whenever the next part of the long message is received. Set MessageExpirySeconds to the number seconds that the phone should wait before deleting the received parts of a long SMS messages. This value should be in hexadecimal and must be prefixed with 0x. The default value is 0x15180, which is equivalent to 1 day or 86,400 seconds. +SmsFragmentLimit | Partners can specify a maximum length for SMS messages. This requires setting both the maximum number of SMS fragments per SMS message, from 1 to 255, and the maximum size in bytes of each SMS fragment, from 16 to 140 bytes. Use SmsFragmentLimit to set the maximum number of bytes in the user data body of an SMS message. You must set the value between 16 (0x10) and 140 (0x8C). You must also use SmsPageLimit to set the maximum number of segments in a concatenated SMS message. +SmsPageLimit | Partners can specify a maximum length for SMS messages. This requires setting both the maximum number of SMS fragments per SMS message, from 1 to 255, and the maximum size in bytes of each SMS fragment, from 16 to 140 bytes. Use SmsPageLimit to set the maximum number of segments in a concatenated SMS message. You must set the value to 255 (0xFF) or smaller. You must also use SmsFragmentLimit to set the maximum number of bytes in the body of the SMS message. +SprintFragmentInfoInBody | Partners can enable the messaging client to allow users to enter more than 160 characters per message. Messages longer than 160 characters are sent as multiple SMS messages that contain a tag at the beginning of the message in the form "(1/2)", where the first number represents the segment or part number and the second number represents the total number of segments or parts. Multiple messages are limited to 6 total segments. When enabled, the user cannot enter more characters after the 6 total segments limit is reached. Any message received with tags at the beginning is recombined with its corresponding segments and shown as one composite message. +Type3GPP > ErrorHandling > ErrorType | Enter a name for ERRORCODE3GPP, and click **Add**. Configure the error type that you added as **Transient Failure** or **Permanent Failure**. +Type3GPP > ErrorHandling > FriendlyErrorClass | Enter a name for ERRORCODE3GPP, and click **Add**. Configure the error class that you added as **generic error**, **invalid recepient address**, or **network connectivity trouble**. +Type3GPP > IMS > SmsUse16BitReferenceNumbers | Configure whether to use 8-bit or 16-bit message ID (reference number) in the UDH. +Type3GPP2 > ErrorHandling > FriendlyErrorClass | Enter a name for ERRORCODE3GPP2, and click **Add**. Configure the error class that you added as **generic error**, **invalid recepient address**, or **network connectivity trouble**. +Type3GPP2 > ErrorHandling > UseReservedAsPermanent | Set the 3GPP2 permanent error type. + + ### UTK +Setting | Description +--- | --- +UIDefaultDuration | Specifies the default time, in milliseconds, that the DISPLAY TEXT, GET INKEY, PLAY TONE, or SELECT ITEM dialog should be displayed. The default value is 60000 milliseconds (60 seconds). The valid value range is 1-120000. +UIGetInputDuration | Specifies the default time, in milliseconds, that the GET INPUT dialog should be displayed. The default value is 120000 milliseconds (120 seconds). The valid value range is 1-120000. + ### VoLTE +Setting | Description +--- | --- +IMSOMADMServices | Allows configuration of OMA DM Services Mask. The value is mapped directly to RIL_IMS_NW_ENABLED_FLAGS on the modem side. To configure the OMA DM services mask, set the IMSOMADMServices setting to one of the following values:

- None, Flag: 0, Bitmask: 00000
- OMA DM, Flag: 1, Bitmask: 00001
- Voice, Flag: 2, Bitmask: 00010
- Video, Flag: 4, Bitmask: 00100
- EAB presence, Flag: 8, Bitmask: 01000
- Enable all services, Flag: 15, Bitmask: 10000 +IMSServices | Identifies which IMS services are enabled (if any). The value is any combination of flags 1 (IMS), 2 (SMS over IMS), 4 (Voice over IMS) and 8 (Video Over IMS). Set the value for the IMSServices setting to any combination of the following flags or bitmasks:

- IMS, Flag: 1, Bitmask: 0001
- SMS over IMS, Flag: 2, Bitmask: 0010
- Voice over IMS, Flag: 4, Bitmask: 0100
Video over IMS, Flag: 8, Bitmask: 1000 + ### RCS -Setting | Description ---- | --- -AvailabilityCacheExpiration | -CapabilityCacheExpiration | -CapabilityPollInterval | -ChatCleanupInterval | -ChatCleanupTimeout | -ChatOneToOne | -ChatSameCallIdOnRetry | -ClientAddressChangeGracePeriod | -ClientClearDnsCacheOnAddressChange | -ClientClearServiceRouteOnAddressChange | -ClientConfigCnameDerivation | -ClientDNS | -ClientFeatureTagFt | -ClientFeatureTagFtThumb | -ClientFtHttp | -ClientMobileTechDiscoveryDelay | -ClientOverrideOmaPcscfAddress | -ClientPANI | -ClientPcscfDiscoveryOnFailure | -ClientPLANI | -ClientReconnectTimeout | -ClientrediscoverOnTechChange | -ClientRediscoveryProxyOnReprovisioning | -ClientRegInfo | -ClientReregisterOn403 | -ClientResetCallIdOnFeatureTagChange | -ClientVendor | -ClientVerifyTransportEndpoint | -ClientVersion | -DNSNetworkLock | -DNSPreferIpv4 | -DNSretryDelay | -DNSTimeout | -EcurSetWarningHeader | -HTTPNetworkLock | -HTTPUseProxy | -IsCapabilityDiscoveryEnabled | -IsComposingIdleTimeout | -IsComposingRefresh | -IsComposingRemoteIdleTimeout | -IsPresenceGzipEnabled | -MaxNumberOfEntriesInRequest | -MediaDialog100rel | -MediaDialog100relMT | -MediaDialogDTMF | -MediaDialogNoReferSub | -MediaDialogPlayEarlyRtp | -MediaDialogSTRP | -MediaDialogSRTP3ge2ae | -MMtelConferenceFactoryUri | -MSRPAllowPassive | -MSRPChatAnonymizeCPIM | -MSRPChatReport | -MSRPChunkSize | -MSRPConnectionInfoTakesPrecedence | -MSRPCPIMIgnoreLeadingLineBreaks | -MsrpFileInitialEmpty | -MSRPFileTransferReports | -MSRPFileTransferSlow | -MSRPFileTransferTimeout | -MSRPGroupChatEventHeader | -MSRPHashAttribute | -MSRPInsertFailureReportYes | -MSRPMediaDialogRingingStatusCode | -MSRPMediaDialogStartMedia | -MSRPNetworkLock | -MSRPPortRange | -MSRPPreferActive | -MSRPReferInDialogAlways | -MSRPRelayEnable | -MSRPRelayTLS | -MSRPRelayURI | -MSRPRemoteUseReferredBy | -MSRPSendOnlyIsDeferred | -MSRPUseReferToForOneContact | -MSRPWorkaroundCheckPort | -OneTimePasswordTemplate | -OptionsHasPolling | -OptionsSameCallIdOnRetry | -PresenceNotifyDuration | -ProvisioningType | -ProvisioningUrl | -PublishErrorRecoveryTimer | -RCSAutoConfigTestMode | -RCSChat180AutoAccept | -RCSChat180Sent | -RCSChatAnonymizeCPIM | -RCSChatBlackbirdFeatureTag | -RCSChatCPIMSeparateHeaders | -RCSChatDeferredNotificationsInMSRP | -RCSChatHangupStandfw | -RCSChatMDNWaitForConnection | -RCSChatInactivityTimeout | -RCSChatNoAutomaticImdn | -RCSChatNotifyAll | -RCSChatNotifyDisplay | -RCSChatNotifyDisplayed | -RCSChatNotifyProcessing | -RCSChatQueueOffline | -RCSChatSendDeliveredToBlockedUsers | -RCSDeferredFunctionPai | -RCSeAutoconfig | -RCSeAutoconfig2nd | -RCSeAutoConfigClientEnrichment | -RCSeAutoConfigDeviceId | -RCSeAutoConfigDeviceType | -RCSeAutoConfigDNSTimeout | -RCSeAutoConfigEscapePlus | -RCSeAutoConfigEveryBoot | -RCSeAutoConfigExpiryTimer | -RCSeAutoConfigForceProxyHttp | -RCSeAutoConfigInvalidRetryTime | -RCSeAutoConfigMsisdnTimeout | -RCSeAutoConfigOnce | -RCSeAutoConfigOnlyOTP | -RCSeAutoConfigOrange | -RCSeAutoConfigOtpTimeout | -RCSeAutoConfigRCS51 | -RCSeAutoConfigRcsProfile | -RCSeAutoConfigRetryCount | -RCSeAutoConfigRetrySameVersion | -RCSeAutoConfigSmsIn3G | -RCSeAutoConfigSmsPortInPs | -RCSeAutoConfigSmsProvisioning | -RCSeAutoConfigTelefonica | -RCSeAutoConfigTryForce3G | -RCSeAutoConfigURL | -RCSeAutoConfigURLPrefix | -RCSeAutoConfigVodafone | -RCSeAutoConfigWifiProvisioning | -RCSeAutoConfigWifiProvisioningRequireMSISDN | -RCSECapsAddOmaSipIm | -RCSeMinTimeBetweenQueries | -RCSFileTransfer | -RCSFileTransferCheckPartialHash | -RCSFileTransferCheckPartialSize | -RCSFileTransferMsrpGc | -RCSFileTransferThumbnail | -RCSFTHTTPCleanup | -RCSFTHTTPCleanupTimeout | -RCSFtHttpExpires | -RcsFtHttpRetryCount | -RcsFtHttpRetryFromStart | -RCSFtHttpTimeoutMs | -RCSFtHttpUploadResume | -RCSFTNetworkLock | -RCSFTResume | -RCSFTSeparateQueueFromIS | -RCSFTSTandFW | -RCSFTStartProgressAfter | -RCSFTThumbsRFC5547 | -RCSGeoPush | -RCSGroupChatBlackbird | -RCSGroupChatDepartReason | -RCSGroupChatDisplayed | -RCSGroupChatDontRestartOn480 | -RCSGroupChatDontsRestartOn503 | -RCSGroupChatDontRestartOnFail | -RCSGroupChatIgnoreDeletedNotify | -RCSGroupChatIMDN | -RCSGroupChatMarkMissingAsDeparted | -RCSGroupChatMinDelayReinvite | -RCSGroupChatNeverAcceptAfterDepart | -RCSGroupChatNotifyMissingDepartedIfDisconnected | -RCSGroupChatNotifyWorkaround | -RCSGroupChatNotifyWorkaroundDelay | -RCSGroupChatReestablishAttempts | -RCSGroupChatReferToFactoryUri | -RCSGroupChatReformatImdnTo | -RCSGroupChatRejectInviteRightAfterDepart | -RCSGroupChatRejoinDelay | -RCSGroupChatRemoveHeaderParameters | -RCSGroupChatSaveContact | -RCSIMDN | -RCSIMDNSetAcceptConect | -RCSMinDiskSpace | -RCSOptions200okAddAllow | -RCSOptions200okAllow | -RCSOptionsRequestDisposition | -RCSOptionsRequireChat | -RCSSessionReplaces | -RcsSmsPort | -RCSStandfwExactMatch | -RCSVideoShareOutgoingTimeout | -RCSVSOutsideCall | -ReferToRFC5368 | -RegisterAddAllow | -RegisterClearNonceOnNewCallId | -RegistercompressTags | -RegisterExpires | -RegisterSameCallIdDelay | -RegisterUseQValue | -Registration3gpp | -RegistrationNeverResetCallId | -RegistrationRefreshTimeout | -RegistrationRFC3608 | -RTPSocketBufferSize | -RTPSocketBufferSizeRecv | -RTPSockeetBufferSizeSend | -Server | -SessionExpires | -SessionExpiresEnable | -SessionExpiresEnableMSRP | -SessionExpiresMSRP | -SessionExpiresRefresher | -SessionExpiresRefresherMSRP | -SessionMinSE | -SIPDialogSendReason | -SIPKeepAlive | -SIPKeepAliveForceTimeout | -SIPTransportT1 | -SIPTransportT2 | -SIPTransportTimerA | -SIPTransportTimerB | -SIPTransportTimerD | -SIPTransportTimerE | -SIPTransportUDPCOnnect | -SockeetconfigureSocketMaskBind | -SocketconfiguresocketMaskConnect | -SocketHTTPActivationGUID | -SocketHTTPDataAttributionCosted | -SocketHTTPDataAttributionFriendlyName | -SocketHTTPDataAttributionGUID | -SocketMSRPActivationGUID | -SocketMSRPDataAttributionCosted | -SocketMSRPDataAttributionFriendlyName | -SocketMSRPDataAttributionGUID | -SocketRPTActivationGUID | -SocketRTPDataAttributionCosted | -SocketRTPDataAttributionFriendlyName | -SocketRTPDataAttributionGUID | -SocketSignalingActivationGUID | -SocketSignalingDataAttributionCosted | -SocketSignalingDataAttributionFriendlyName | -SocketSingalingDataAttributionGUID | -SocketXCAPActivationGUID | -SocketXCAPDataAttributionCosted | -SocketXCAPDataAttributionFriendlyName | -SocketXCAPDataAttributionGUID | -SSLSocketVerifyCertificate | -SSLSocketVerifyCertificatFTHTTP | -SSLSocketVerifyCertificateMSRP | -SSLSocketVerifyCertificateSIP | -StackAddRouteToRegister | -StackAddSrtpHeadersAll | -StackBindAny | -StackDetectUsingConnectedEndpoint | -StackPAI | -StackPPI | -StackPPIRegister | -StackRPort | -StackSetProxyAuthentication | -StackSetProxyAuthorization | -StackSipInstance | -StackSipInstanceUUIDAuto | -StackSipInstanceUUIDDeviceBased | -StackSipInstanceUUIDRandom | -TimerReregister | -UserAgent | -UseSingleRegistration | -VoLTEProvisioningStatus | -XDMSIdentityHeader | -XDMSQuoteIdentity | -XDMSStripPlusFromXui | -XDMSStripPlusInHeader | - +See descriptions in Windows Configuration Designer. +[//]: # (Table in temp folder > CELLCORE ### SMS From 1299cec0fa4396df2e3aa438818b1c18ade52d25 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 14 Sep 2017 13:29:12 -0700 Subject: [PATCH 034/117] fix span tag --- windows/configuration/wcd/wcd-cellcore.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 36f338f859..317988a51b 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -398,7 +398,7 @@ IMSOMADMServices | Allows configuration of OMA DM Services Mask. The value is ma IMSServices | Identifies which IMS services are enabled (if any). The value is any combination of flags 1 (IMS), 2 (SMS over IMS), 4 (Voice over IMS) and 8 (Video Over IMS). Set the value for the IMSServices setting to any combination of the following flags or bitmasks:

- IMS, Flag: 1, Bitmask: 0001
- SMS over IMS, Flag: 2, Bitmask: 0010
- Voice over IMS, Flag: 4, Bitmask: 0100
Video over IMS, Flag: 8, Bitmask: 1000 - ## Error messages for reject codes Reject code | Extended error message | Short error message From 3710b97ba22a9b25c31688974f468e5f10b78c32 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 06:54:14 -0700 Subject: [PATCH 035/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 317988a51b..3bcf025df9 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -401,6 +401,7 @@ IMSServices | Identifies which IMS services are enabled (if any). The value is a ## Error messages for reject codes + Reject code | Extended error message | Short error message --- | --- | --- 2 (The SIM card hasn't been activated or has been deactivated) | SIM not set up MM#2 | Invalid SIM From a07db48e987e7993c517ae91d92f067e82e152de Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 07:02:08 -0700 Subject: [PATCH 036/117] text intro --- windows/configuration/wcd/wcd-textinput.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-textinput.md b/windows/configuration/wcd/wcd-textinput.md index 865944b8e9..f6f910591d 100644 --- a/windows/configuration/wcd/wcd-textinput.md +++ b/windows/configuration/wcd/wcd-textinput.md @@ -12,7 +12,7 @@ ms.date: 10/17/2017 # TextInput (Windows Configuration Designer reference) -Use TextInput settings to configure ... +Use TextInput settings to configure text intelligence and keyboard for mobile devices. ## Applies to From 5d0738da01eebaa81365e7655030ba8ac0de1ce4 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 07:11:39 -0700 Subject: [PATCH 037/117] trying a comment --- windows/configuration/wcd/wcd-cellcore.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 3bcf025df9..6c7ffb09ca 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -189,8 +189,7 @@ OperatorListForExcludedSystemTypes | Enter a comma-separated list of MCC and MNC OperatorPreferredForFasterRadio | Set Issuer Identification Number (IIN) or partial ICCID of preferred operator for the faster radio. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can map a partial ICCID or an Industry Identification Number (IIN) to the faster radio regardless of which SIM card is chosen for data connectivity. This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To map a partial ICCID or an IIN to the faster radio regardless of which SIM card is chosen for data connectivity, set the value of OperatorPreferredForFasterRadio to match the IIN or the ICCID, up to 7 digits, of the preferred operator. PreferredDataProviderList | OEMs can set a list of MCC/MNC pairs for the purchase order (PO) carrier or primary operator. For mobile operators that require it, OEMs can set a list of MCC/MNC pairs for the purchase order (PO) carrier or primary operator so that it can be set as the default data line for phones that have a dual SIM. When the PO SIM is inserted into the phone, the OS picks the PO SIM as the data line and shows a notification to the user that the SIM has been selected for Internet data. If two PO SIMs are inserted, the OS will choose the first PO SIM that was detected as the default data line and the mobile operator action required dialogue (ARD) is shown. If two non-PO SIMs are inserted, the user is prompted to choose the SIM to use as the default data line. Note OEMs should not set this customization unless required by the mobile operator. To enumerate the MCC/MNC value pairs to use for data connections, set the value for **PreferredDataProviderList**. The value must be a comma-separated list of preferred MCC:MNC values. For example, the value can be 301:026,310:030 and so on. Slot2DisableAppsList | Disable specified apps from slot 2 on a C+G dual SIM phone. To disable a list of specified apps from Slot 2, set Slot2DisableAppsList to a comma-separated list of values representing the apps. For example, `4,6`. -Slot2ExcludedSystemTypes | Exclude specified system types from SIM cards inserted in Slot 2. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can restrict the second slot in a dual-SIM phone regardless of what apps or executor mapping the second slot is associated with. Note This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To allow an operator to simply restrict the second slot in a dual SIM phone regardless of what apps or executor mapping the second slot is associated with, set the value of Slot2ExcludedSystemTypes to the system types to be excluded from the SIM cards inserted in Slot 2. -For example, a value of 0x8 specifies RIL_SYSTEMTYPE_UMTS (3G) while 0x10 specifies RIL_SYSTEMTYPE_LTE (4G). To exclude more than one system type, perform a bitwise OR operation on the radio technologies you want to exclude. For example, a bitwise OR operation on RIL_SYSTEMTYPE_LTE (4G) and RIL_SYSTEMTYPE_UMTS (3G) results in the value 11000 (binary) or 0x18 (hexadecimal). In this case, any SIM inserted in Slot 2 will be limited to 2G. For more information about the RIL system types, see [RILSYSTEMTYPE](https://msdn.microsoft.com/library/windows/hardware/dn931143.aspx). +Slot2ExcludedSystemTypes | Exclude specified system types from SIM cards inserted in Slot 2. For mobile operators that require more control over the system types that their phones use to connect to the mobile operators' networks, OEMs can restrict the second slot in a dual-SIM phone regardless of what apps or executor mapping the second slot is associated with. Note This setting is used only for China. OEMs should not use this setting unless required by the mobile operator. To allow an operator to simply restrict the second slot in a dual SIM phone regardless of what apps or executor mapping the second slot is associated with, set the value of Slot2ExcludedSystemTypes to the system types to be excluded from the SIM cards inserted in Slot 2. For example, a value of 0x8 specifies RIL_SYSTEMTYPE_UMTS (3G) while 0x10 specifies RIL_SYSTEMTYPE_LTE (4G). To exclude more than one system type, perform a bitwise OR operation on the radio technologies you want to exclude. For example, a bitwise OR operation on RIL_SYSTEMTYPE_LTE (4G) and RIL_SYSTEMTYPE_UMTS (3G) results in the value 11000 (binary) or 0x18 (hexadecimal). In this case, any SIM inserted in Slot 2 will be limited to 2G. For more information about the RIL system types, see [RILSYSTEMTYPE](https://msdn.microsoft.com/library/windows/hardware/dn931143.aspx). SuggestDataRoamingARD | Use to show the data roaming suggestion dialog when roaming and the data roaming setting is set to no roaming. SuggestGlobalModeARD | Define whether Global Mode is suggested on a C+G dual SIM phone. SuggestGlobalModeTimeout | To specify the number of seconds to wait for network registration before suggesting global mode, set SuggestGlobalModeTimeout to a value between 1 and 600, inclusive. For example, to set the timeout to 60 seconds, set the value to 60 (decimal) or 0x3C (hexadecimal). @@ -354,7 +353,7 @@ SuggestDataRoamingARD | Use to show the data roaming suggestion dialog when roam See descriptions in Windows Configuration Designer. -[//]: # (Table in temp folder > CELLCORE + ### SMS From e337553d8a90366dea55b07ac0365c4408ee5127 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 07:13:17 -0700 Subject: [PATCH 038/117] fix italic --- windows/configuration/wcd/wcd-cellcore.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 6c7ffb09ca..899c1693fd 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -170,7 +170,7 @@ Setting | Description --- | --- atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. -CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. +CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (\*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. DefaultSlotAffinity | Set the data connection preference for:

- **SlotAffinityForInternetData_Automatic**: data connection preference is automatically set
- **SlotAffinityForInternetData_Slot0**: sets the data connection preference to Slot 0. The data connection cannot be edited by the user.
- **SlotAffinityForInternetData_Slot1**: Sets the data connection preference to Slot 1. The data connection cannot be edited by the user. From 702b059948deb4b17d0f32c3ac1b2311b0466ab2 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 07:37:56 -0700 Subject: [PATCH 039/117] removed literal astrisk --- windows/configuration/wcd/wcd-cellcore.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 899c1693fd..85d3c73126 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -170,7 +170,7 @@ Setting | Description --- | --- atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. -CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (\*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. +CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk, to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. DefaultSlotAffinity | Set the data connection preference for:

- **SlotAffinityForInternetData_Automatic**: data connection preference is automatically set
- **SlotAffinityForInternetData_Slot0**: sets the data connection preference to Slot 0. The data connection cannot be edited by the user.
- **SlotAffinityForInternetData_Slot1**: Sets the data connection preference to Slot 1. The data connection cannot be edited by the user. From 16735720fc52ee09b2068ad21941aa5ab5bf2602 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 15 Sep 2017 08:17:27 -0700 Subject: [PATCH 040/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 34 ++++++++++++++++++++--- 1 file changed, 30 insertions(+), 4 deletions(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 85d3c73126..3beb75e2be 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -171,7 +171,7 @@ Setting | Description atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk, to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. -CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. +CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk, to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. DefaultSlotAffinity | Set the data connection preference for:

- **SlotAffinityForInternetData_Automatic**: data connection preference is automatically set
- **SlotAffinityForInternetData_Slot0**: sets the data connection preference to Slot 0. The data connection cannot be edited by the user.
- **SlotAffinityForInternetData_Slot1**: Sets the data connection preference to Slot 1. The data connection cannot be edited by the user. DisableLTESupportWhenRoaming | Set to **Yes** to disable LTE support when roaming. @@ -331,8 +331,8 @@ AvoidStayingInManualSelection | You can enable permanent automatic mode for mobi CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. -Critical > MultivariantProvisionedSPN | -Critical > SimNameWithoutMSISDNENabled | +Critical > MultivariantProvisionedSPN | Used to change the default friendly SIM names in dual SIM phones. By default, the OS displays SIM 1 or SIM 2 as the default friendly name for the SIM in slot 1 or slot 2 if the service provider name (SPN) or mobile operator name has not been set. Partners can use this setting to change the default name read from the SIM to define the SPN for SIM cards that do not contain this information or to generate the default friendly name for the SIM. The OS uses the default value as the display name for the SIM or SPN in the Start screen and other parts of the UI including the SIM settings screen. For dual SIM phones that contain SIMs from the same mobile operator, the names that appear in the UI may be similar. See [Values for MultivariantProvisionedSPN](#spn). +Critical > SimNameWithoutMSISDNENabled | Use this setting to remove the trailing MSISDN digits from the service provider name (SPN) in the phone UI. By default, the OS appends the trailing MSISDN digits to the service provider name (SPN) in the phone UI, including on the phone and messaging apps. If required by mobile operators, OEMs can use the SimNameWithoutMSISDNEnabled setting to remove the trailing MSISDN digits. However, you must use this setting together with **MultivariantProvisionedSPN** to suppress the MSISDN digits. DisableLTESupportWhenRoaming | Set to **Yes** to disable LTE support when roaming. ExcludedSystemTypesByDefault | Set the default value for **Highest connection speed** in the **Settings** > **Cellular & SIM** > **SIM** screen by specifying the bitmask for any combination of radio technology to be excluded from the default value. The connection speed that has not been excluded will show up as the highest connection speed. On dual SIM phones that only support up to 3G connection speeds, the **Highest connection speed** option is replaced by a 3G on/off toggle based on the per-device setting. Enter the binary setting to exclude 4G (`10000`) or 3G (`01000`). LTEEnabled | Select **Yes** to enable LTE, and **No** to disable LTE. @@ -405,4 +405,30 @@ Reject code | Extended error message | Short error message --- | --- | --- 2 (The SIM card hasn't been activated or has been deactivated) | SIM not set up MM#2 | Invalid SIM 3 (The SIM card fails authentication or one of the identity check procedures. This can also happen due to a duplication of the TMSI across different MSCs.) | Can't verify SIM MM#3 | Invalid SIM -6 (The device has been put on a block list, such as when the phone has been stolen or the IMEI is restricted.) | Phone not allowed MM#6 | No service \ No newline at end of file +6 (The device has been put on a block list, such as when the phone has been stolen or the IMEI is restricted.) | Phone not allowed MM#6 | No service + + +## Values for MultivariantProvisionedSPN + +Set the MultivariantProvisionedSPN value to the name of the SPN or mobile operator. + +The following table shows the scenarios supported by this customization: + +>[!NOTE] +>In the Default SIM name column: +> +>- The " " in MultivariantProvisionedSPN" "1234 means that there is a space between the mobile operator name or SPN and the last 4 digits of the MSISDN. +>- MultivariantProvisionedSPN means the value that you set for the MultivariantProvisionedSPN setting. +>- SIM 1 or SIM 2 is the default friendly name for the SIM in slot 1 or slot 2. + + +Multivariant setting set?|SPN provisioned?|MSISDN (last 4 digits: 1234, for example) provisioned?|Default SIM name +Yes|Yes|Yes|*MultivariantProvisionedSPN*1234 or *MultivariantProvisionedSPN*" "1234 +Yes|No|No|*MultivariantProvisionedSPN* (up to 16 characters) +Yes|Yes|No|*MultivariantProvisionedSPN* (up to 16 characters) +Yes|No|Yes|*MultivariantProvisionedSPN*1234 or *MultivariantProvisionedSPN*" "1234 +No|Yes|Yes|If SPN string >= 12: *SPN*1234

If SPN string < 12: *SPN*" "1234 +No|No|No|*SIM 1* or *SIM 2* +No|Yes|No|SPN (up to 16 characters) +No|No|Yes|*SIM 1* or *SIM 2* + From 35cefb8d64781e89eae7855fc3729eb7a5537cc8 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Fri, 15 Sep 2017 17:05:38 -0700 Subject: [PATCH 041/117] working changes --- .../windows-defender-antivirus-compatibility.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 1d49a1e634..7b46aec73f 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -15,7 +15,7 @@ ms.date: 09/07/2017 --- -# Windows Defender Antivirus and third party protection products +# Windows Defender Antivirus compatibility **Applies to:** @@ -60,12 +60,10 @@ Windows Server 2016 | Windows Defender AV | No | Active mode -In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware. +In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware: -The reasons for this are twofold: - -1. If you are enrolled in Windows Defender ATP, [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -2. If the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, then Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. +1. Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. +2. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. Therefore, the Windows Defender AV service needs to update itself to ensure it has up-to-date protection coverage in case it needs to automatically enable itself. From 01deb6da8b3d2a9719ba4544a9673107c9a2adc4 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 07:54:43 -0700 Subject: [PATCH 042/117] add brandingicon --- windows/configuration/wcd/wcd-cellular.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index e6977a3572..9e5183b21c 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -37,10 +37,11 @@ Enter the AppID for the mobile operator's app in Microsoft Store. ## BrandingIcon +Browse to and select an .ico file. ## BrandingIconPath - +Enter the destination path for the BrandingIcon .ico file. ## BrandingName From 5f5af05fb2f21c23972fadad4a7d6275a24decaa Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 09:16:57 -0700 Subject: [PATCH 043/117] sync --- windows/configuration/wcd/wcd-deviceinfo.md | 24 ++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index 689c1b3e09..1bb5423745 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -26,17 +26,39 @@ Use to configure settings for DeviceInfo. ## PhoneMobileOperatorDisplayName +Enter a friendly name for the mobile operator. This string is displayed in the support section of the **Settings > About** screen and in the ringtone list. ## PhoneMobileOperatorName +This setting is used for targeting phone updates. It must contain a code specified by Microsoft that corresponds to the mobile operator. These codes are provided in [Registry values for mobile operator IDs](https://msdn.microsoft.com/library/windows/hardware/dn772250.aspx). For open market phones, in which the mobile operator is not known, use the codes in [Registry values for carrier-unlocked phones](https://msdn.microsoft.com/library/windows/hardware/dn772248.aspx) instead. + +This string is not visible to the user. + +This setting must not be changed over time even if the user switches SIMs or mobile operators, as updates are always targeted based on the first mobile operator associated with the phone. + +The [PhoneManufacturer](https://msdn.microsoft.com/library/windows/hardware/mt138328.aspx), [PhoneManufacturerModelName](https://msdn.microsoft.com/library/windows/hardware/mt138336.aspx), and PhoneMobileOperatorName should create a unique Phone-Operator-Pairing (POP). + + ## PhoneOEMSupportLink +This should be a functional link that starts with http://. The link should be a URL that redirects to the mobile version of the web page. The content in the webpage should reflow to the screen width. This can be achieved by adding the CSS Tag `"@-ms-viewport { width: device-width; }"`. + +The default is an empty string (""), which means that a support link will not be displayed to the user. + +This setting varies by OEM. + ## PhoneSupportLink +This should be a functional link that starts with http://. The link should be a URL that redirects to the mobile version of the web page. The content in the webpage should reflow to the screen width. This can be achieved by adding the CSS Tag `"@-ms-viewport { width: device-width; }"`. + +The default is an empty string (""), which means that a support link will not be displayed to the user. + +This setting varies by OEM. + ## PhoneSupportPhoneNumber - +Use to specify the OEM or mobile operator's support contact phone number. The country code is not required. This string is displayed in the About screen in Settings. This setting also corresponds to the Genuine Windows Phone Certificates (GWPC) support number. From 83a5b9440e3acb26585b5049f63a12ad0b9dc0b7 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 10:28:14 -0700 Subject: [PATCH 044/117] updates --- ...dic-scanning-windows-defender-antivirus.md | 103 ++++++++++++++++++ ...indows-defender-antivirus-compatibility.md | 21 ++-- ...fender-antivirus-on-windows-server-2016.md | 3 - 3 files changed, 116 insertions(+), 11 deletions(-) create mode 100644 windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md diff --git a/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md new file mode 100644 index 0000000000..2f73f17890 --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -0,0 +1,103 @@ +--- +title: Configure always-on real-time protection in Windows Defender AV +description: Enable and configure real-time protectoin features such as behavior monitoring, heuristics, and machine-learning in Windows Defender AV +keywords: real-time protection, rtp, machine-learning, behavior monitoring, heuristics +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: iaanw +ms.author: iawilt +ms.date: 08/25/2017 +--- + + + +# Enable and configure Windows Defender AV always-on protection and monitoring + + + +**Applies to:** + +- Windows 10 + + +**Audience** + +- Enterprise security administrators + + +**Manageability available with** + +- Group Policy + + + + +Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. + +These activities include events such as processes making unusual changes to existing files, modifying or creating automatic startup registry keys and startup locations (also known as auto-start extensibility points, or ASEPs), and other changes to the file system or file structure. + + +## Configure and enable always-on protection + +You can configure how always-on protection works with the Group Policy settings described in this section. + +To configure these settings: + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Antivirus** and then the **Location** specified in the table below. + +6. Double-click the policy **Setting** as specified in the table below, and set the option to your desired configuration. Click **OK**, and repeat for any other settings. + + + + +Location | Setting | Description | Default setting (if not configured) +---|---|---|--- +Real-time protection | Monitor file and program activity on your computer | The AV engine makes note of any file changes (file writes, such as moves, copies, or modifications) and general program activity (programs that are opened or running and that cause other programs to run) | Enabled +Real-time protection | Scan all downloaded files and attachments | Downloaded files and attachments are automatically scanned. This operates in addition to Windows Defender SmartScreen filter, which scans files before and during downloading | Enabled +Real-time protection | Turn on process scanning whenever real-time protection is enabled | You can independently enable the AV engine to scan running processes for suspicious modifications or behaviors. This is useful if you have disabled real-time protection | Enabled +Real-time protection | Turn on behavior monitoring | The AV engine will monitor file processes, file and registry changes, and other events on your endpoints for suspicious and known malicious activity | Enabled +Real-time protection | Turn on raw volume write notifications | Information about raw volume writes will be analyzed by behavior monitoring | Enabled +Real-time protection | Define the maximum size of downloaded files and attachments to be scanned | You can define the size in kilobytes | Enabled +Real-time protection | Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Note that fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) +Scan | Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the AV engine is asked to detect the activity | Enabled +Root | Allow antimalware service to startup with normal priority | You can lower the priority of the AV engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled +Root | Allow antimalware service to remain running always | If protection updates have been disabled, you can set Windows Defender AV to still run. This lowers the protection on the endpoint. | Disabled + + + + +## Disable real-time protection +> [!WARNING] +> Disabling real-time protection will drastically reduce the protection on your endpoints and is not recommended. + +The main real-time protection capability is enabled by default, but you can disable it with Group Policy: + +**Use Group Policy to disable real-time protection:** + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Antivirus > Real-time protection**. + +6. Double-click the **Turn off real-time protection** setting and set the option to **Enabled**. Click **OK**. + + + +## Related topics + +- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-windows-defender-antivirus.md) +- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 7b46aec73f..663e22ca35 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -36,7 +36,7 @@ If you are also using Windows Defender Advanced Threat Protection, then Windows On Windows Server 2016, Windows Defender AV will not enter passive or disabled mode if you have also installed a third-party antivirus product. See [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) topic for key differences and management options for Windows Server installations. -The following matrix illustrates how Windows Defender AV operates when third-party antivirus products or Windows Defender ATP are also used. +The following matrix illustrates the states that Windows Defender AV will enter when third-party antivirus products or Windows Defender ATP are also used. Windows version | Antimalware protection offered by | Organization enrolled in Windows Defender ATP | Windows Defender AV state -|-|-|- @@ -58,23 +58,28 @@ Windows Server 2016 | Windows Defender AV | No | Active mode >Windows Defender is also offered for [consumer devices on Windows 8.1 and Windows Server 2012](https://technet.microsoft.com/en-us/library/dn344918#BKMK_WindowsDefender), although it does not provide enterprise-level management (or an interface on Windows Server 2012 Server Core installations). +This table describes what each of the three states do: +State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates +-|-|-|-|-|- +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | N | Y | Y | N | Y +Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N +Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y -In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware: +Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -1. Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -2. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. +Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. - Therefore, the Windows Defender AV service needs to update itself to ensure it has up-to-date protection coverage in case it needs to automatically enable itself. +In passive and automatic disabled mode, you can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. - You can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. - - If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. + If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. >[!WARNING] >You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Windows Defender ATP, or the Windows Defender Security Center app. > >This includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and process. Manually modifying these services can cause severe instability on your endpoints and open your network to infections and attacks. +> +>It can also cause problems when using third-party antivirus apps and how their information is displayed in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md). ## Related topics diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 77b79508b8..1c459208be 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -144,8 +144,6 @@ By default, Windows Update does not download and install updates automatically o To ensure that protection from malware is maintained, we recommend that you enable the following services: -- Windows Defender Network Inspection service - - Windows Error Reporting service - Windows Update service @@ -155,7 +153,6 @@ The following table lists the services for Windows Defender and the dependent se |Service Name|File Location|Description| |--------|---------|--------| |Windows Defender Service (Windefend)|C:\Program Files\Windows Defender\MsMpEng.exe|This is the main Windows Defender Antivirus service that needs to be running at all times.| -|Windows Defender Network Inspection Service (Wdnissvc)|C:\Program Files\Windows Defender\NisSrv.exe|This service is invoked when Windows Defender Antivirus encounters a trigger to load it.| |Windows Error Reporting Service (Wersvc)|C:\WINDOWS\System32\svchost.exe -k WerSvcGroup|This service sends error reports back to Microsoft.| |Windows Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Firewall service enabled.| |Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get definition updates and antimalware engine updates| From 0cd27bb8de6d0933b37c869aa902cf36469aff5b Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 10:47:36 -0700 Subject: [PATCH 045/117] cellcore --- windows/configuration/wcd/wcd-cellcore.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 3beb75e2be..4ad78e494d 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -168,7 +168,8 @@ SRVCCAutoToggleWmRil | Configure whether to link SRVCC to VOLTE on/off. Setting | Description --- | --- -atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | +atomicRoamingTableSettings3GPP | If you enable 3GPP roaming, configure the following settings:

- **Exceptions** maps the SerialNumber key to the Exceptions value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Exceptions" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Exceptions). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC.
- **HomePLMN** maps the SerialNumber key to the HomePLMN value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "HomePLMN" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (HomePLMN). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC.
- **TargetImsi** maps the SerialNubmer key to the TargetIMSI value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "TargetImsi" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (TargetImsi). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC. +atomicRoamingTableSettings3GPP2 | If you enable 3GPP2 roaming, configure the following settings:

- **Home** maps the SerialNumber key to the Home value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Home" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Home). The data in the regvalue is a DWORD representing the Roaming Indicator.
- **Roaming** maps the SerialNumber key to the Roaming value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Roaming" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Roaming). The data in the regvalue is a DWORD representing the Roaming Indicator. AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk, to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk, to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. From 5251ce53dc1fa87bef2690d9b149d1c6cbdc4854 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 11:23:58 -0700 Subject: [PATCH 046/117] sync --- windows/configuration/wcd/wcd-cellcore.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 4ad78e494d..443ad603ea 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -176,7 +176,7 @@ CardBlockList | Define the list of SIM cards that are not allowed in the first s CardLock | Used to enforce either the card allow list or both the card allow and block lists on a C+G dual SIM phone. DefaultSlotAffinity | Set the data connection preference for:

- **SlotAffinityForInternetData_Automatic**: data connection preference is automatically set
- **SlotAffinityForInternetData_Slot0**: sets the data connection preference to Slot 0. The data connection cannot be edited by the user.
- **SlotAffinityForInternetData_Slot1**: Sets the data connection preference to Slot 1. The data connection cannot be edited by the user. DisableLTESupportWhenRoaming | Set to **Yes** to disable LTE support when roaming. -DisableSystemTypeSupport | +DisableSystemTypeSupport | Enter the system types to be removed. DTMFOffTime | Sets the length of time, in milliseconds (between 64 and 1000 inclusive), of the pause between DTMF digits. For example, a value of 120 specifies 0.12 seconds. DTMFOnTime | Sets the length of time, in milliseconds (between 64 and 1000 inclusive), to generate the DTMF tone when a key is pressed. For example, a value of 120 specifies 0.12 seconds. ExcludedSystemTypesByDefault | Set the default value for **Highest connection speed** in the **Settings** > **Cellular & SIM** > **SIM** screen by specifying the bitmask for any combination of radio technology to be excluded from the default value. The connection speed that has not been excluded will show up as the highest connection speed. On dual SIM phones that only support up to 3G connection speeds, the **Highest connection speed** option is replaced by a 3G on/off toggle based on the per-device setting. Enter the binary setting to exclude 4G (`10000`) or 3G (`01000`). From f1817169b5245585a4a8cbe77285b2e2fc946418 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 11:30:26 -0700 Subject: [PATCH 047/117] atomic tables --- windows/configuration/wcd/wcd-cellcore.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index 443ad603ea..d777b43b1b 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -327,7 +327,8 @@ ShowWifiCallingError | Select **Yes** to show Wi-Fi calling error message. Setting | Description --- | --- -atomicRoamingTableSettings3GPP
and
atomicRoamingTableSettings3GPP2 | +atomicRoamingTableSettings3GPP | If you enable 3GPP roaming, configure the following settings:

- **Exceptions** maps the SerialNumber key to the Exceptions value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Exceptions" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Exceptions). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC.
- **HomePLMN** maps the SerialNumber key to the HomePLMN value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "HomePLMN" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (HomePLMN). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC.
- **TargetImsi** maps the SerialNubmer key to the TargetIMSI value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "TargetImsi" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (TargetImsi). The data in the regvalue is a string representing an MCC-MNC pair, such as "410510" where 410 is the MCC and 510 is the MNC. +atomicRoamingTableSettings3GPP2 | If you enable 3GPP2 roaming, configure the following settings:

- **Home** maps the SerialNumber key to the Home value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Home" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Home). The data in the regvalue is a DWORD representing the Roaming Indicator.
- **Roaming** maps the SerialNumber key to the Roaming value. The wildcard, $(SerialNumber), is a 3-digit decimal serial number (000 through 999) represented as a string. The wildcard is used as a regvalue under the "Roaming" subkey. Multiple reg values in this form may be configured or customized by the OEM, all placed under the same subkey (Roaming). The data in the regvalue is a DWORD representing the Roaming Indicator. AvoidStayingInManualSelection | You can enable permanent automatic mode for mobile networks that require the cellular settings to revert to automatic network selection after the user has manually selected another network when roaming or out of range of the home network. CardAllowList | Define the list of SIM cards allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards allowed in the first slot, set the value for CardAllowList to a comma-separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. CardBlockList | Define the list of SIM cards that are not allowed in the first slot of a C+G dual SIM phone. This setting is used only if **CardLock** is set to allow it. If **CardLock** is not set, this list is ignored. To configure the list of SIM cards that are not allowed in the first slot, set the value for CardBlockList to a comma separated MCC:MNC list. You can also use wild cards, represented by an asterisk (*), to accept any value. For example, you can set the value to `310:410,311:*,404:012,310:70`. From 6dc218d2ae810aa97a2a7f6030b112de518f2f70 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 13:09:20 -0700 Subject: [PATCH 048/117] updates for compat and custom notifs --- ...-first-sight-windows-defender-antivirus.md | 2 +- .../images/svg/check-no.md | 7 +++ .../images/svg/check-yes.md | 7 +++ ...indows-defender-antivirus-compatibility.md | 16 ++++- ...fender-antivirus-on-windows-server-2016.md | 2 +- ...dows-defender-security-center-antivirus.md | 2 +- .../windows-defender-security-center.md | 63 +++++++++++-------- 7 files changed, 68 insertions(+), 31 deletions(-) create mode 100644 windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md create mode 100644 windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md diff --git a/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 01bec5d98d..258a939423 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -34,7 +34,7 @@ ms.date: 08/25/2017 - Windows Defender Security Center app -Block at First Sight is a feature of Windows Defender Antivirus cloud-delivered protection that provides a way to detect and block new malware within seconds. +Block at first sight is a feature of Windows Defender Antivirus cloud-delivered protection that provides a way to detect and block new malware within seconds. It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. You can use group policy settings to confirm the feature is enabled. diff --git a/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md b/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md new file mode 100644 index 0000000000..afa7a3d27d --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md @@ -0,0 +1,7 @@ + + Check mark no + + \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md b/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md new file mode 100644 index 0000000000..4dd10553c4 --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md @@ -0,0 +1,7 @@ + + Check mark yes + + \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 663e22ca35..aed2016cfd 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -60,17 +60,29 @@ Windows Server 2016 | Windows Defender AV | No | Active mode This table describes what each of the three states do: +State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates +-|-|-|-|-|-|- +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] +Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] +Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] + + + + + State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates -|-|-|-|-|- -Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | N | Y | Y | N | Y +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)]N | Y | Y | N | Y Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y + + Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. -In passive and automatic disabled mode, you can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. +In passive and automatic disabled mode, you can still [manage updates for Windows Defender AV](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 1c459208be..c1cedd3d5d 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -154,7 +154,7 @@ The following table lists the services for Windows Defender and the dependent se |--------|---------|--------| |Windows Defender Service (Windefend)|C:\Program Files\Windows Defender\MsMpEng.exe|This is the main Windows Defender Antivirus service that needs to be running at all times.| |Windows Error Reporting Service (Wersvc)|C:\WINDOWS\System32\svchost.exe -k WerSvcGroup|This service sends error reports back to Microsoft.| -|Windows Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Firewall service enabled.| +|Windows Defender Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Defender Firewall service enabled.| |Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get definition updates and antimalware engine updates| diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 495cc05eec..99ebbdf36d 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -38,7 +38,7 @@ In Windows 10, version 1703 (also known as the Creators Update), the Windows Def Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703. > [!IMPORTANT] -> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These will be disabled automatically when a third-party antivirus or firewall product is installed and kept up to date. +> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These will be disabled automatically when a third-party antivirus or firewall product is installed and kept up to date. > [!WARNING] > If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. diff --git a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 804c2d9152..5bc79e341c 100644 --- a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -29,25 +29,20 @@ ms.date: 08/25/2017 In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one easy-to-use app. - - - ![Screen shot of the Windows Defender Security Center app showing that the device is protected and five icons for each of the features](images/security-center-home.png) - - Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. The app includes the settings and status for the following security features: - Virus & threat protection, including settings for Windows Defender Antivirus and Controlled folder access - Device performance & health, which includes information about drivers, storage space, and general Windows Update issues -- Firewall & network protection, including Windows Firewall +- Firewall & network protection, including Windows Defender Firewall - App & browser control, covering Windows Defender SmartScreen settings and Exploit protection mitigations -- Family options, which include a number of parental controls along with tips and information for keeping kids safe online - +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online +In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. The Windows Defender Security Center app uses the [Security Center service](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA) to provide the status and information on third-party antivirus and firewall products that are installed on the device. @@ -55,13 +50,13 @@ The Windows Defender Security Center app uses the [Security Center service](http >[!IMPORTANT] >Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. > ->The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Firewall, and other security protection. +>The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, and other security protection. > >These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. > >Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). > ->Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). +>Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). > [!WARNING] > If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. @@ -97,9 +92,12 @@ Disabling any of the individual features (through Group Policy or other manageme > [!IMPORTANT] > Individually disabling any of the services will not disable the other services or the Windows Defender Security Center app. -For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus). However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Firewall. +For example, using a third-party antivirus will disable Windows Defender Antivirus. However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. + +The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section and third-party firewalls will be shown under the **Firewall & network protection** section in the Windows Defender Security Center app. + +See the [Windows Defender Antivirus compatibility](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility) topic for more information on how Windows Defender AV works with other antivirus apps, and what options are availble. -The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section in the Windows Defender Security Center app. @@ -112,32 +110,38 @@ See the following links for more information on the features in the Windows Defe - Device performance & health - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) -- Windows Firewall - - IT administrators and IT pros can get configuration guidance from the [Windows Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) +- Windows Defender Firewall + - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) - Windows Defender SmartScreen - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) -- Family options, which include a number of parental controls along with tips and information for keeping kids safe online +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) -## Customize notifications from the Windows Defender Security Center + +## Customize the Windows Defender Security Center app for your organization -You can customize notifcations so they show information to users about how to get more help from your organization's help desk. - -![](images/security-center-custom-notif.png) - -This information will also appear as a pop-out window on the Windows Defender Security Center app. +You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. ![](images/security-center-custom-flyout.png) -Users can click on the displayed information to get more help: +This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). + +![](images/security-center-custom-notif.png) + + +Users can click on the displayed information to easily initiate a support request: - Clicking **Call** or the phone number will open Skype to start a call to the displayed number - Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email - Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address -### Use Group Policy to customize the notification +### Use Group Policy to enable and customize contact information + +There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. + +This can only be done in Group Policy. 1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. @@ -147,11 +151,15 @@ Users can click on the displayed information to get more help: 5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. -6. Open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. +6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: -7. Open the **Specify contact company name** setting and set it to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. -8. To ensure the custom notification appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: + 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. + +7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + +8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: 1. Specify contact email address of Email ID 2. Specify contact phone number or Skype ID 3. Specify contact website @@ -159,6 +167,9 @@ Users can click on the displayed information to get more help: 9. Click **OK** after configuring each setting to save your changes. +>[!IMPORTANT] +>You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. + >[!NOTE] >The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). From d17a5bad1914d7e8cfccf8e236e56c9e87d04b1b Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 18 Sep 2017 13:35:40 -0700 Subject: [PATCH 049/117] sync --- windows/configuration/TOC.md | 1 + windows/configuration/wcd/wcd-policies.md | 44 +++++++++++++++++++---- 2 files changed, 38 insertions(+), 7 deletions(-) diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 194ca7eced..cd6876f5b1 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -122,6 +122,7 @@ #### [UnifiedWriteFilter](wcd/wcd-unifiedwritefilter.md) #### [UniversalAppInstall](wcd/wcd-universalappinstall.md) #### [UniversalAppUninstall](wcd/wcd-universalappuninstall.md) +#### [UsbErrorsOEMOverride](wcd/wcd-usberrorsoemoverride.md) #### [WeakCharger](wcd/wcd-weakcharger.md) #### [WindowsTeamSettings](wcd/wcd-windowsteamsettings.md) #### [WLAN](wcd/wcd-wlan.md) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 00f49192d9..323e0d05b8 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -76,9 +76,9 @@ This section describes the **Policies** settings that you can configure in [prov | --- | --- | :---: | :---: | :---: | :---: | :---: | | [AllowAdvertising](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-allowadvertising) | Whether the device can send out Bluetooth advertisements | X | X | X | X | X | | [AllowDiscoverableMode](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-allowdiscoverablemode) | Whether other Bluetooth-enabled devices can discover the device | X | X | X | X | X | -| [AllowPrepairing](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-allowprepairing) | Whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device | X | X | X | X | X | -| [LocalDeviceName](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-localdevicename) | Set the local Bluetooth device name | X | X | X | X | X | -| [ServicesAllowedList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-servicesallowedlist) | Set a list of allowable services and profiles | X | X | | | | +| [AllowPrepairing](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-allowprepairing) | Whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device | X | X | X | | X | +| [LocalDeviceName](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-localdevicename) | Set the local Bluetooth device name | X | X | X | | X | +| [ServicesAllowedList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#bluetooth-servicesallowedlist) | Set a list of allowable services and profiles | X | X | | X | | ## Browser @@ -130,7 +130,7 @@ This section describes the **Policies** settings that you can configure in [prov | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| [AllowBluetooth](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#connectivity-allowbluetooth) | Allow the user to enable Bluetooth or restrict access. | X | X | X | | | +| [AllowBluetooth](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#connectivity-allowbluetooth) | Allow the user to enable Bluetooth or restrict access. | X | X | X | X | | | [AllowCellularData](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#connectivity-allowcellulardata) | Allow the cellular data channel on the device. | X | X | X | | | | [AllowCellularDataRoaming](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#connectivity-allowcellulardataroaming) | Allow or disallow cellular data roaming on the device. | X | X | X | | | | [AllowConnectedDevices](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#connectivity-allowconnecteddevices) | Allows IT admins the ability to disable the Connected Devices Platform component. | X | X | X | | | @@ -141,6 +141,12 @@ This section describes the **Policies** settings that you can configure in [prov | HideCellularConnectionMode | Hide the checkbox that lets the user change the connection mode. | X | X | X | | | | HideCellularRoamingOption | Hide the dropdown menu that lets the user change the roaming preferences. | X | X | X | | | +## CredentialProviders + +| Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | --- | :---: | :---: | :---: | :---: | :---: | +[DisableAutomaticReDeploymentCredentials](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-credentialproviders) | This setting disables the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. The Windows 10 Automatic ReDeployment feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the automatic redeployment is triggered the devices are for ready for use by information workers or students. | X | | | | | + ## Cryptography | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | @@ -200,6 +206,11 @@ This section describes the **Policies** settings that you can configure in [prov | [DOMonthlyUploadDataCap](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#deliveryoptimization-domonthlyuploaddatacap) | Specify the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. | X | | | | | | [DOPercentageMaxDownloadBandwidth](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#deliveryoptimization-dopercentagemaxdownloadbandwidth) | Specify the maximum download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. | X | | | | | +## DeviceGuard + +| Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | --- | :---: | :---: | :---: | :---: | :---: | +[EnableVirtualizationBasedSecurity](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceguard) | Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. | X | | | | | ## DeviceLock @@ -238,7 +249,7 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowManualMDMUnenrollment](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowmanualmdmunenrollment) | Specify whether the user is allowed to delete the workplace account. | X | X | | | | | [AllowScreenCapture](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowscreencapture) | Specify whether screen capture is allowed. | | X | | | | | [AllowSIMErrorDialogPromptWhenNoSIM](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowsimerrordialogpromptwhennosim) | Specify whether to display a dialog prompt when no SIM card is detected. | | X | | | | -| [AllowSyncMySettings](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowsyncmysettings) | Allow or disallow all Windows sync settings on the device. | X | | | | | +| [AllowSyncMySettings](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowsyncmysettings) | Allow or disallow all Windows sync settings on the device. | X | X | | | | | [AllowTailoredExperiencesWithDiagnosticData](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowtailoredexperienceswithdiagnosticdata) | Prevent Windows from using diagnostic data to provide customized experiences to the user. | X | | | | | | [AllowTaskSwitcher](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowtaskswitcher) | Allow or disallow task switching on the device. | | X | | | | | [AllowThirdPartySuggestionsInWindowsSpotlight](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowthirdpartysuggestionsinwindowsspotlight) | Specify whether to allow app and content suggestions from third-party software publishers in Windows Spotlight. | X | | | | | @@ -250,6 +261,12 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowWindowsTips](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowwindowstips) | Enable or disable Windows Tips. | X | | | | | | [ConfigureWindowsSpotlightOnLockScreen](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-configurewindowsspotlightonlockscreen) | Specify whether Spotlight should be used on the user's lock screen. | X | | | | | +## ExploitGuard + +| Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | +| --- | --- | :---: | :---: | :---: | :---: | :---: | +| ExploitProtectionSettings | | X | X | | | | + ## Games @@ -310,6 +327,7 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowDataSense](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#settings-allowdatasense) | Allow the user to change Data Sense settings. | | X | | | | | [AllowVPN](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#settings-allowvpn) | Allow the user to change VPN settings. | | X | | | | | [ConfigureTaskbarCalendar](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#settings-configuretaskbarcalendar) | Configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. | X | | | | | +[PageVisiblityList](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist) | Allows IT admins to prevent specific pages in the System Settings app from being visible or accessible. Pages are identified by a shortened version of their already [published URIs](https://docs.microsoft.com/windows/uwp/launch-resume/launch-settings-app#ms-settings-uri-scheme-reference), which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. | X | | | | | ## Start @@ -331,6 +349,7 @@ This section describes the **Policies** settings that you can configure in [prov | [HideFrequentlyUsedApps](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hidefrequentlyusedapps) | Hide **Most used** section of Start. | X | | | | | | [HideHibernate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hidehibernate) | Prevent **Hibernate** option from appearing in the Power button. | X | | | | | | [HideLock](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hidelock) | Prevent **Lock** from appearing in the user tile. | X | | | | | +| HidePeopleBar | Remove the people icon from the taskbar, as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. | X | | | | | | [HidePowerButton](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hidepowerbutton) | Hide the **Power** button. | X | | | | | | [HideRecentJumplists](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hiderecentjumplists) | Hide jumplists of recently opened items. | X | | | | | | [HideRecentlyAddedApps](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hiderecentlyaddedapps) | Hide **Recently added** section of Start. | X | | | | | @@ -356,6 +375,7 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowTelemetry](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowtelemetry) | Allow the device to send diagnostic and useage telemetry data. | X | X | | | | | [AllowUserToResetPhone](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowusertoresetphone) | Allow the user to factory reset the phone. | X | X | | | | | [DisableOneDriveFileSync](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-disableonedrivefilesync) | Prevent apps and features from working with files on OneDrive. | X | | | | | +| [LimitEnhancedDiagnosticDataWindowsAnalytics](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-limitenhanceddiagnosticdatawindowsanalytics) | This policy setting, in combination with the System/AllowTelemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. To enable this behavior you must enable this policy setting, and set Allow Telemetry to level 2 (Enhanced). When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented in [Windows 10, version 1703 basic level Windows diagnostic events and fields](https://go.microsoft.com/fwlink/?linkid=847594). Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft. If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. | X | X | | | | ## TextInput @@ -390,25 +410,35 @@ This section describes the **Policies** settings that you can configure in [prov | --- | --- | :---: | :---: | :---: | :---: | :---: | | [ActiveHoursEnd](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-activehoursend) | Use with **Update/ActiveHoursStart** to manage the range of active hours where update rboots are not scheduled. | X | X | X | X | X | | [ActiveHoursMaxRange](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-activehoursmaxrange) | Specify the maximum active hours range. | X | X | X | X | X | -| [ActiveHoursStart](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-activehoursstart) | Use with **Update/ActiveHoursEnd** to manage the range of active hours where update rboots are not scheduled. | X | X | X | X | X | +| [ActiveHoursStart](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-activehoursstart) | Use with **Update/ActiveHoursEnd** to manage the range of active hours where update reboots are not scheduled. | X | X | X | X | X | | [AllowautoUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allowautoupdate) | Configure automatic update behavior to scan, download, and install updates. | X | X | X | X | X | +| [AllowAutoWindowsUpdateDownloadOverMeteredNetwork](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautowindowsupdatedownloadovermeterednetwork)| Option to download updates automatically over metered connections (off by default). Enter `0` for not allowed, or `1` for allowed. | X | X | X | X | X | | [AllowMUUpdateService](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allowmuupdateservice) | Manage whether to scan for app updates from Microsoft Update. | X | X | X | X | X | | [AllowNonMicrosoftSignedUpdate](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allownonmicrosoftsignedupdate) | Manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. | X | X | X | X | X | | [AllowUpdateService](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-allowupdateservice) | Specify whether the device can use Microsoft Update, Windows Server Update Services (WSUS), or Windows Store. | X | X | X | X | X | -| AutoRestartDeadlinePeriodInDays | Specify number of days (between 2 and 30) after which a forced restart will occur outside of active hours when restart is pending. | X | X | X | X | X | +| [AutoRestartDeadlinePeriodInDays](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-autorestartdeadlineperiodindays) | Specify number of days (between 2 and 30) after which a forced restart will occur outside of active hours when restart is pending. | X | X | X | X | X | | [AutoRestartNotificationSchedule](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-autorestartnotificationschedule) | Specify the period for auto-restart reminder notifications. | X | X | X | X | X | | [AutoRestartRequiredNotificationDismissal](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-autorestartrequirednotificationdismissal) | Specify the method by which the auto-restart required notification is dismissed. | X | X | X | X | X | | [BranchReadinessLevel](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-branchreadinesslevel) | Select which branch a device receives their updates from. | X | X | X | X | X | | [DeferFeatureUpdatesPeriodInDays](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-deferfeatureupdatesperiodindays) | Defer Feature Updates for the specified number of days. | X | X | X | X | X | | [DeferQualityUpdatesPeriodInDays](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-deferqualityupdatesperiodindays) | Defer Quality Updates for the specified number of days. | X | X | X | X | X | +| [DeferUpdatePeriod](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-deferupdateperiod) | Specify update delays for up to 4 weeks. | X | X | X | X | X | +| [DeferUpgradePeriod](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-deferupgradeperiod) |Specify upgrade delays for up to 8 months. | X | X | X | X | X | | [DetectionFrequency](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-detectionfrequency) | Specify the frequency to scan for updates, from every 1-22 hours. | X | X | X | X | X | +| [DisableDualScan](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-disabledualscan) | Do not allow update deferral policies to cause scans against Windows Update. | X | X | X | X | X | | [EngagedRestartDeadline](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-engagedrestartdeadline) | Specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. | X | X | X | X | X | | [EngagedRestartSnoozeSchedule](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-engagedrestartsnoozeschedule) | Specify the number of days a user can snooze Engaged restart reminder notifications. | X | X | X | X | X | | [EngagedRestartTransitionSchedule](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-engagedrestarttransitionschedule) | Specify the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. | X | X | X | X | X | | [FillEmptyContentUrls](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-fillemptycontenturls) | Allow Windows Update Agent to determine the download URL when it is missing from the metadata. | X | X | X | X | X | +| ManagePreviewBuilds | Use to enable or disable preview builds. | X | X | X | X | X | | PhoneUpdateRestrictions | Deprecated | | X | | | | | [RequireDeferUpgrade](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-requiredeferupgrade) | Configure device to receive updates from Current Branch for Business (CBB). | X | X | X | X | X | | [ScheduledInstallDay](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-scheduledinstallday) | Schedule the day for update installation. | X | X | X | X | X | +| [ScheduledInstallEveryWeek](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstalleveryweek) | To schedule update installation every week, set the value as `1`. | X | X | X | X | X | +| [ScheduledInstallFirstWeek](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstallfirstweek) | To schedule update installation the first week of the month, see the value as `1`. | X | X | X | X | X | +| [ScheduledInstallFourthWeek](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstallfourthweek) | To schedule update installation the fourth week of the month, see the value as `1`. | X | X | X | X | X | +| [ScheduledInstallSecondWeek](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstallsecondweek) | To schedule update installation the second week of the month, see the value as `1`. | X | X | X | X | X | +| [ScheduledInstallThirdWeek](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-scheduledinstallthirdweek) | To schedule update installation the third week of the month, see the value as `1`. | X | X | X | X | X | | [ScheduledInstallTime](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-scheduledinstalltime) | Schedule the time for update installation. | X | X | X | X | X | | [ScheduleImminentRestartWarning](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-scheduleimminentrestartwarning) | Specify the period for auto-restart imminent warning notifications. | X | X | X | X | X || | [ScheduleRestartWarning](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#update-schedulerestartwarning) | Specify the period for auto-restart warning reminder notifications. | X | X | X | X | X | From d0665facf95bd197a91b3588eed8503f8a05f9c6 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 15:27:27 -0700 Subject: [PATCH 050/117] add WDSC topics --- ...indows-defender-antivirus-compatibility.md | 12 -- .../wdsc-app-browser-control.md | 3 + .../wdsc-customize-contact-information.md | 53 ++++++ .../wdsc-device-performance-health.md | 3 + .../wdsc-family-options.md | 2 + .../wdsc-firewall-network-protection.md | 3 + .../wdsc-hide-notifications.md | 0 .../wdsc-virus-threat-protection.md | 0 .../windows-defender-security-center.md | 158 ++++++------------ 9 files changed, 114 insertions(+), 120 deletions(-) create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-family-options.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index aed2016cfd..0235f43e85 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -66,18 +66,6 @@ Passive mode | Windows Defender AV will not be used as the antivirus app, and th Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] - - - - -State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates --|-|-|-|-|- -Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)]N | Y | Y | N | Y -Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N -Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y - - - Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md new file mode 100644 index 0000000000..74061fcac7 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md @@ -0,0 +1,3 @@ +- Windows Defender SmartScreen + - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) + - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md b/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md new file mode 100644 index 0000000000..602bdeba23 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md @@ -0,0 +1,53 @@ + + +## Customize the Windows Defender Security Center app for your organization + +You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. + +![](images/security-center-custom-flyout.png) + +This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). + +![](images/security-center-custom-notif.png) + + +Users can click on the displayed information to easily initiate a support request: +- Clicking **Call** or the phone number will open Skype to start a call to the displayed number +- Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email +- Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address + + +### Use Group Policy to enable and customize contact information + +There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. + +This can only be done in Group Policy. + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. + +6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: + + 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. + + 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. + +7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + +8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: + 1. **Specify contact email address or Email ID** + 2. **Specify contact phone number or Skype ID** + 3. **Specify contact website** + +9. Click **OK** after configuring each setting to save your changes. + + +>[!IMPORTANT] +>You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. + + diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md new file mode 100644 index 0000000000..a2ad85bc83 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md @@ -0,0 +1,3 @@ +- Device performance & health + - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) + - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md new file mode 100644 index 0000000000..f6b1ad952c --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md @@ -0,0 +1,2 @@ +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online + - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md new file mode 100644 index 0000000000..472ddc118c --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -0,0 +1,3 @@ +- Windows Defender Firewall + - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) + - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md new file mode 100644 index 0000000000..e69de29bb2 diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md new file mode 100644 index 0000000000..e69de29bb2 diff --git a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 5bc79e341c..0586d8a2b4 100644 --- a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -27,43 +27,35 @@ ms.date: 08/25/2017 -In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one easy-to-use app. +In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one app. + ![Screen shot of the Windows Defender Security Center app showing that the device is protected and five icons for each of the features](images/security-center-home.png) -Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. +Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. -The app includes the settings and status for the following security features: +>[!NOTE] +>The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal console that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). -- Virus & threat protection, including settings for Windows Defender Antivirus and Controlled folder access -- Device performance & health, which includes information about drivers, storage space, and general Windows Update issues -- Firewall & network protection, including Windows Defender Firewall -- App & browser control, covering Windows Defender SmartScreen settings and Exploit protection mitigations -- Family options, which includes access to parental controls along with tips and information for keeping kids safe online +This library describes the Windows defender Security Center app, and provides information on configuring certain features, inlcuding: -In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. + +- [Showing and customizing contact information on the app and in notifications](wdsc-customize-contact-information.md) +- [Hiding notifications](wdsc-hide-notifications.md) + +You can find more information about each section, including options for configuring the sections - such as hiding each of the sections - at the following topics: + + +- [Virus & threat protection](wdsc-virus-threat-protection.md), which has information and access to antivirus settings and the Controlled folder access feature of Windows Defender Exploit Guard +- [Device performance & health](wdsc-device-performance-health.md), which has information about drivers, storage space, and general Windows Update issues +- [Firewall & network protection](wdsc-firewall-network-protection.md), which has information and access to firewall settings, including Windows Defender Firewall +- [App & browser control](wdsc-app-browser-control.md), covering Windows Defender SmartScreen settings and Exploit protection mitigations +- [Family options](wdsc-family-options.md), which includes access to parental controls along with tips and information for keeping kids safe online -The Windows Defender Security Center app uses the [Security Center service](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA) to provide the status and information on third-party antivirus and firewall products that are installed on the device. ->[!IMPORTANT] ->Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. -> ->The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, and other security protection. -> ->These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. -> ->Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). -> ->Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). -> [!WARNING] -> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. -> ->It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. -> ->This will significantly lower the protection of your device and could lead to malware infection. @@ -78,11 +70,31 @@ The Windows Defender Security Center app uses the [Security Center service](http > [!NOTE] -> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Defender Security Center. Review the settings for each feature in its appropriate library. Links for both home user and enterprise or commercial audiences are listed below. +> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Defender Security Center. See the topics for each of the sections for links to configuring the associated features or products. + + ## How the Windows Defender Security Center app works with Windows security features +>[!IMPORTANT] +>Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. +> +>The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection. +> +>These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. +> +>Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). +> +>Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). + +> [!WARNING] +> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. +> +>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. +> +>This will significantly lower the protection of your device and could lead to malware infection. + The Windows Defender Security Center app operates as a separate app or process from each of the individual features, and will display notifications through the Action Center. It acts as a collector or single place to see the status and perform some configuration for each of the features. @@ -92,87 +104,17 @@ Disabling any of the individual features (through Group Policy or other manageme > [!IMPORTANT] > Individually disabling any of the services will not disable the other services or the Windows Defender Security Center app. -For example, using a third-party antivirus will disable Windows Defender Antivirus. However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. - -The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section and third-party firewalls will be shown under the **Firewall & network protection** section in the Windows Defender Security Center app. - -See the [Windows Defender Antivirus compatibility](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility) topic for more information on how Windows Defender AV works with other antivirus apps, and what options are availble. - - - - -## More information - -See the following links for more information on the features in the Windows Defender Security Center app: -- Windows Defender Antivirus - - IT administrators and IT pros can get configuration guidance from the [Windows Defender Antivirus in the Windows Defender Security Center topic](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus) and the [Windows Defender Antivirus documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) - - Home users can learn more at the [Virus & threat protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012987/windows-10-virus-threat-protection-windows-defender-security-center) -- Device performance & health - - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) - - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) -- Windows Defender Firewall - - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) - - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) -- Windows Defender SmartScreen - - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) - - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) -- Family options, which includes access to parental controls along with tips and information for keeping kids safe online - - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) - - -## Customize the Windows Defender Security Center app for your organization - -You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. - -![](images/security-center-custom-flyout.png) - -This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). - -![](images/security-center-custom-notif.png) - - -Users can click on the displayed information to easily initiate a support request: -- Clicking **Call** or the phone number will open Skype to start a call to the displayed number -- Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email -- Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address - - -### Use Group Policy to enable and customize contact information - -There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. - -This can only be done in Group Policy. - -1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. - -3. In the **Group Policy Management Editor** go to **Computer configuration**. - -4. Click **Policies** then **Administrative templates**. - -5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. - -6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: - - 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. - - 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. - -7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. - -8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: - 1. Specify contact email address of Email ID - 2. Specify contact phone number or Skype ID - 3. Specify contact website - -9. Click **OK** after configuring each setting to save your changes. - - ->[!IMPORTANT] ->You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. - - ->[!NOTE] ->The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). +For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility). However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. + + + + + + + + + + From c2d8c2364231e34e49d23ee276be0c82c45e2452 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Wed, 20 Sep 2017 12:13:15 -0700 Subject: [PATCH 051/117] exploitguard --- windows/configuration/wcd/wcd-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 323e0d05b8..544ed72118 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -265,7 +265,7 @@ This section describes the **Policies** settings that you can configure in [prov | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| ExploitProtectionSettings | | X | X | | | | +| [ExploitProtectionSettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-exploitguard) | See the [explanation of ExploitProtectionSettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-exploitguard) in the Policy CSP for instructions. In the **ExploitProtectionSettings** field, you can enter a path (local, UNC, or URI) to the mitigation options config, or you can enter the XML for the config. | X | X | | | | ## Games From 54d4e0cdd150d490e5b3d034256aa42bc99ce0a0 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 21 Sep 2017 06:49:32 -0700 Subject: [PATCH 052/117] tweak note --- windows/configuration/wcd/wcd-callandmessagingenhancement.md | 2 +- windows/configuration/wcd/wcd-calling.md | 2 +- windows/configuration/wcd/wcd-cellcore.md | 2 +- windows/configuration/wcd/wcd-cellular.md | 2 +- windows/configuration/wcd/wcd-deviceinfo.md | 2 +- windows/configuration/wcd/wcd-messaging.md | 2 +- 6 files changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/configuration/wcd/wcd-callandmessagingenhancement.md b/windows/configuration/wcd/wcd-callandmessagingenhancement.md index 8bef045fdb..0ccf7992cb 100644 --- a/windows/configuration/wcd/wcd-callandmessagingenhancement.md +++ b/windows/configuration/wcd/wcd-callandmessagingenhancement.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use to configure call origin and blocking apps. >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-calling.md b/windows/configuration/wcd/wcd-calling.md index e736deb637..0b1d46a821 100644 --- a/windows/configuration/wcd/wcd-calling.md +++ b/windows/configuration/wcd/wcd-calling.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use to configure settings for Calling. >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index d777b43b1b..57347d1878 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use to configure settings for cellular data. >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-cellular.md b/windows/configuration/wcd/wcd-cellular.md index 9e5183b21c..15ff4cbc51 100644 --- a/windows/configuration/wcd/wcd-cellular.md +++ b/windows/configuration/wcd/wcd-cellular.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use to configure settings for cellular connections. >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-deviceinfo.md b/windows/configuration/wcd/wcd-deviceinfo.md index 1bb5423745..28e15ade95 100644 --- a/windows/configuration/wcd/wcd-deviceinfo.md +++ b/windows/configuration/wcd/wcd-deviceinfo.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use to configure settings for DeviceInfo. >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. ## Applies to diff --git a/windows/configuration/wcd/wcd-messaging.md b/windows/configuration/wcd/wcd-messaging.md index 6d482dbb17..2f2ab14958 100644 --- a/windows/configuration/wcd/wcd-messaging.md +++ b/windows/configuration/wcd/wcd-messaging.md @@ -15,7 +15,7 @@ ms.date: 10/17/2017 Use for settings related to Messaging and Commercial Mobile Alert System (CMAS). >[!IMPORTANT] ->These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring mobile devices and are not intended for use by administrators in the enterprise. +>These settings are intended to be used only by manufacturers, mobile operators, and solution providers when configuring devices, and are not intended for use by administrators in the enterprise. >[!NOTE] >CMAS is now known as Wireless Emergency Alerts (WEA). From 045e38e4f1b4ab4e7b0d0fa75e2026c495c81e7b Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 21 Sep 2017 07:32:39 -0700 Subject: [PATCH 053/117] sync --- .../wcd/wcd-desktopbackgroundandcolors.md | 4 ++-- .../configuration/wcd/wcd-devicemanagement.md | 2 +- windows/configuration/wcd/wcd-policies.md | 22 +++++++++---------- 3 files changed, 14 insertions(+), 14 deletions(-) diff --git a/windows/configuration/wcd/wcd-desktopbackgroundandcolors.md b/windows/configuration/wcd/wcd-desktopbackgroundandcolors.md index 6f954aec14..097f2e9273 100644 --- a/windows/configuration/wcd/wcd-desktopbackgroundandcolors.md +++ b/windows/configuration/wcd/wcd-desktopbackgroundandcolors.md @@ -1,5 +1,5 @@ --- -title: DesktopBackgrounAndColors (Windows 10) +title: DesktopBackgroundAndColors (Windows 10) description: This section describes the DesktopBackgrounAndColors settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. ms.prod: w10 ms.mktglfcycl: deploy @@ -10,7 +10,7 @@ ms.author: jdecker ms.date: 08/21/2017 --- -# DesktopBackgrounAndColors (Windows Configuration Designer reference) +# DesktopBackgroundAndColors (Windows Configuration Designer reference) Do not use. Instead, use the [Personalization settings](wcd-personalization.md). diff --git a/windows/configuration/wcd/wcd-devicemanagement.md b/windows/configuration/wcd/wcd-devicemanagement.md index 297225f5a1..a37c32bee6 100644 --- a/windows/configuration/wcd/wcd-devicemanagement.md +++ b/windows/configuration/wcd/wcd-devicemanagement.md @@ -12,7 +12,7 @@ ms.date: 08/21/2017 # DeviceManagement (Windows Configuration Designer reference) -Use to... +Use to configure device management settings. ## Applies to diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index 544ed72118..f1108cd189 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -104,7 +104,7 @@ This section describes the **Policies** settings that you can configure in [prov | [ConfigureAdditionalSearchEngines](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-configureadditionalsearchengines) | Allows you to add up to 5 addtional search engines for MDM-enrolled devices. | X | X | X | | | | [DisableLockdownOfStartPages](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-disablelockdownofstartpages) | Specify whether the lockdown on the Start pages is disabled. | X | | | | | | [EnterpriseModeSiteList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-enterprisemodesitelist) | Allow the user to specify a URL of an enterprise site list. | X | | | | | -| EnterpriseSiteListServiceUrl | This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-enterprisemodesitelist). | X | | | | | +| [EnterpriseSiteListServiceUrl](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-browser#browser-enterprisesitelistserviceurl) | This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-enterprisemodesitelist). | X | | | | | | [FirstRunURL](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-firstrunurl) | Specify the URL that Microsoft Edge will use when it is opened for the first time. | | X | | | | | [HomePages](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-homepages) | Specify your Start pages for MDM-enrolled devices. | X | | | | | | [PreventAccessToAboutFlagsInMicrosoftEdge](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#browser-preventaccesstoaboutflagsinmicrosoftedge) | Specify whether users can access the **about:flags** page, which is used to change developer settings and to enable experimental features. | X | X | X | | | @@ -333,16 +333,16 @@ This section describes the **Policies** settings that you can configure in [prov | Setting | Description | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | | --- | --- | :---: | :---: | :---: | :---: | :---: | -| AllowPinnedFolderDocuments | Control the visibility of the Documents shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderDownloads | Control the visibility of the Downloadds shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderFileExplorer | Control the visibility of the File Explorer shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderHomeGroup | Control the visibility of the Home Group shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderMusic | Control the visibility of the Music shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderNetwork | Control the visibility of the Network shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderPersonalFolder | Control the visibility of the Personal Folder shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderPictures | Control the visibility of the Pictures shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderSettings | Control the visibility of the Settings shortcut on the Start menu. | X | | | | | -| AllowPinnedFolderVideos |Control the visibility of the Videos shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderDocuments](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderdocuments) | Control the visibility of the Documents shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderDownloads](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderdownloads) | Control the visibility of the Downloadds shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderFileExplorer](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderfileexplorer) | Control the visibility of the File Explorer shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderHomeGroup](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderhomegroup) | Control the visibility of the Home Group shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderMusic](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldermusic) | Control the visibility of the Music shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderNetwork](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldernetwork) | Control the visibility of the Network shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderPersonalFolder](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderpersonalfolder) | Control the visibility of the Personal Folder shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderPictures](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfolderpictures) | Control the visibility of the Pictures shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderSettings](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldersettings) | Control the visibility of the Settings shortcut on the Start menu. | X | | | | | +| [AllowPinnedFolderVideos](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-start#start-allowpinnedfoldervideos) |Control the visibility of the Videos shortcut on the Start menu. | X | | | | | | [ForceStartSize](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-forcestartsize) | Force the size of the Start screen. | X | | | | | | [HideAppList](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hideapplist) | Collapse or remove the all apps list. | X | | | | | | [HideChangeAccountSettings](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#start-hidechangeaccountsettings) | Hide **Change account settings** from appearing in the user tile. | X | | | | | From 4b624408a2d12146b9ef36efee964b18bf5332e0 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 21 Sep 2017 12:13:42 -0700 Subject: [PATCH 054/117] sync --- windows/configuration/wcd/wcd-power.md | 38 +++++++++++++------------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index 621ab15b33..f95af80d53 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -43,25 +43,25 @@ SmartUserPresenceConfidence | Specify the confidence, in percentage, in predicte Setting | Description --- | --- -CPU > EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum vallue is 64000. -DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. -DisplayBacklightPowerGradient | -DisplayBacklightPowerQDenominator | -DisplayBacklightPowerQNumerator | -DisplayPanelPowerAreaFactor | -DisplayPanelPowerDpiFactor | -DisplayPanelPowerFloor | -DisplayPanelPowerVsyncDelta | -BatteryDrainMaxE3UploadRank | -BatteryDrainMinE3UploadBI | -BatteryDrainMinRate | -LongtermTimerInMinutes | -UploadAcRecords | -MBBClass | -DripsPowerFloorMilliWatts | -NonDripsPenaltyMilliWatts | -StorageType | -WifiClass | +CPU > EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum value is 64000. +Display > DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. +Display > DisplayBacklightPowerGradient | Configure the backlight power gradient brightness. Minimum value is 1, and maximum value is 25. +Display > DisplayBacklightPowerQDenominator | +Display > DisplayBacklightPowerQNumerator | +Display > DisplayPanelPowerAreaFactor | +Display > DisplayPanelPowerDpiFactor | +Display > DisplayPanelPowerFloor | +Display > DisplayPanelPowerVsyncDelta | +EnergyEstimationTelemetry > BatteryDrainMaxE3UploadRank | +EnergyEstimationTelemetry > BatteryDrainMinE3UploadBI | +EnergyEstimationTelemetry > BatteryDrainMinRate | +EnergyEstimationTelemetry > LongtermTimerInMinutes | +EnergyEstimationTelemetry > UploadAcRecords | +MobileBroadband > MBBClass | +StandbyActivationEnergy > DripsPowerFloorMilliWatts | +StandbyActivationEnergy > NonDripsPenaltyMilliWatts | +Storage > StorageType | +Wifi > WifiClass | ## Policy From 8cf0efd05531aaaf7d09ca43b8eca7d13076d396 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Thu, 21 Sep 2017 12:15:50 -0700 Subject: [PATCH 055/117] sync --- windows/configuration/wcd/wcd-power.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md index f95af80d53..e4a5dd50a7 100644 --- a/windows/configuration/wcd/wcd-power.md +++ b/windows/configuration/wcd/wcd-power.md @@ -46,9 +46,9 @@ Setting | Description CPU > EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum value is 64000. Display > DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. Display > DisplayBacklightPowerGradient | Configure the backlight power gradient brightness. Minimum value is 1, and maximum value is 25. -Display > DisplayBacklightPowerQDenominator | -Display > DisplayBacklightPowerQNumerator | -Display > DisplayPanelPowerAreaFactor | +Display > DisplayBacklightPowerQDenominator | Configure the display backlight power's denominator part of the gradient with respect to brightness squared. Minimum value is 1, and maximum value is 100. +Display > DisplayBacklightPowerQNumerator | Configure the display backlight power's numerator part of the gradient with respect to brightness squared. Minimum value is 1, and maximum value is 100. +Display > DisplayPanelPowerAreaFactor | Display > DisplayPanelPowerDpiFactor | Display > DisplayPanelPowerFloor | Display > DisplayPanelPowerVsyncDelta | From d0f714278102e22f59789839539e8b7442a1b7c4 Mon Sep 17 00:00:00 2001 From: Kaushik Ainapure Date: Fri, 22 Sep 2017 02:17:41 +0530 Subject: [PATCH 056/117] Fixing the hyperlink for 0xC1900101 error Hyperlink broken due to typo. [0xC1900101 error when Windows 10 upgrade fails after the second system restart'(https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) --- windows/client-management/windows-10-support-solutions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/windows-10-support-solutions.md b/windows/client-management/windows-10-support-solutions.md index 03b15f9859..5c68eb15b8 100644 --- a/windows/client-management/windows-10-support-solutions.md +++ b/windows/client-management/windows-10-support-solutions.md @@ -40,7 +40,7 @@ These are the top Microsoft Support solutions for the most common issues experie - [Resolve Windows 10 upgrade errors : Technical information for IT Pros](/windows/deployment/upgrade/resolve-windows-10-upgrade-errors) - [Windows OOBE fails when you start a new Windows-based computer for the first time](https://support.microsoft.com/help/4020048/windows-oobe-fails-when-you-start-a-new-windows-based-computer-for-the) - ["0xc1800118" error when you push Windows 10 Version 1607 by using WSUS](https://support.microsoft.com/help/3194588/-0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus) -- [0xC1900101 error when Windows 10 upgrade fails after the second system restart'(https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) +- [0xC1900101 error when Windows 10 upgrade fails after the second system restart](https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) - [Updates fix in-place upgrade to Windows 10 version 1607 problem](https://support.microsoft.com/help/4020149/updates-fix-in-place-upgrade-to-windows-10-version-1607-problem) - [OOBE update for Windows 10 Version 1703: May 9, 2017](https://support.microsoft.com/help/4020008) - [OOBE update for Windows 10 Version 1607: May 30, 2017](https://support.microsoft.com/help/4022632) From f29872f6b8560c0ec3eef102b13a89ff85d6438b Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Fri, 22 Sep 2017 08:29:59 -0700 Subject: [PATCH 057/117] remove power --- windows/configuration/TOC.md | 1 - windows/configuration/wcd/wcd-power.md | 237 ------------------------- windows/configuration/wcd/wcd.md | 1 - 3 files changed, 239 deletions(-) delete mode 100644 windows/configuration/wcd/wcd-power.md diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index cd6876f5b1..6343350a62 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -106,7 +106,6 @@ #### [OtherAssets](wcd/wcd-otherassets.md) #### [Personalization](wcd/wcd-personalization.md) #### [Policies](wcd/wcd-policies.md) -#### [Power](wcd/wcd-power.md) #### [ProvisioningCommands](wcd/wcd-provisioningcommands.md) #### [SharedPC](wcd/wcd-sharedpc.md) #### [Shell](wcd/wcd-shell.md) diff --git a/windows/configuration/wcd/wcd-power.md b/windows/configuration/wcd/wcd-power.md deleted file mode 100644 index e4a5dd50a7..0000000000 --- a/windows/configuration/wcd/wcd-power.md +++ /dev/null @@ -1,237 +0,0 @@ ---- -title: Power (Windows 10) -description: This section describes the Power settings that you can configure in provisioning packages for Windows 10 using Windows Configuration Designer. -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -author: jdeckerMS -ms.localizationpriority: medium -ms.author: jdecker -ms.date: 10/17/2017 ---- - -# Power (Windows Configuration Designer reference) - -Use to configure settings for Power. - -## Applies to - -| Setting groups | Desktop editions | Mobile editions | Surface Hub | HoloLens | IoT Core | -| --- | :---: | :---: | :---: | :---: | :---: | -| All settings | X | X | X | X | X | - - -## Controls - -Setting | Description ---- | --- -AllowSystemRequiredPowerRequests | Specify whether System Required power requests are allowed on systems capable of connected standby. -BootLowLatencyDuration | -DefaultOverlayAcPowerScheme | Specify the default overlay power scheme to use when device is plugged in. -DefaultOverlayDcPowerScheme | Specify the default overlay power shceme to use when the device is on battery. -DefaultOverlayPowerScheme | Specify the default overlay power scheme to use. This setting is deprecated. -DimTimeoutIsManuallySpecified | Set to **True** to control the period before the screen dims using the DimTimeout setting. Set to **False** to allow Windows to automatically select the period based on the screen off timeout. -EnergyEstimationEnabled | -EnforceConsoleLockScreenTimeout | Specify whether the console lock screen timeout should be enforced independently of the user display timeout. -EnforceDisconnectedStandby | Specify whether to force the network to disconnect during standby. -HiberFiletype | Specify the type of HiberFile to be used by the system. Set to **Reduced** to allow fast startup, but not hibernate. Set to **Full** to allow both fast startup and hibernate. -IgnoreCsComplianceCheck | Specify whether to ignore connected standby compliance chcks. -LidNotificationsAreReliable | Use to notify the OS whether the platform guarantees that lid notifications are sent whenever the lid is opened or closed. When configured as **True**, the platform guarantees that lid notifications will be sent every time the device lid is opened or closed. The OS suppresses Windows Hello when the device lid is closed to ensure further input is not processed and to save battery life. OEMs must reliably report lid open and lid close events to opt-in to this setting. If there are scenarios where a lid open event is not reliably reported to the OS, Windows Hello may not work for the user. -SmartUserPresenceConfidence | Specify the confidence, in percentage, in predicted user-away intervals. - -## EnergyEstimationEngine - -Setting | Description ---- | --- -CPU > EfficiencyClass | Select **0** or **1** and click **Add**. For the added EfficiencyClassId > **PowerParameters** > **PowerEnvelope**, configure the power in milli-watts for CPU at 100% usage and 100% frequency. Minimum value is 100, and maximum value is 64000. -Display > DisplayBacklightPowerFloor | Configure the backlight power floor in milli-watts. Minimum value is 24, and maximum value is 250. -Display > DisplayBacklightPowerGradient | Configure the backlight power gradient brightness. Minimum value is 1, and maximum value is 25. -Display > DisplayBacklightPowerQDenominator | Configure the display backlight power's denominator part of the gradient with respect to brightness squared. Minimum value is 1, and maximum value is 100. -Display > DisplayBacklightPowerQNumerator | Configure the display backlight power's numerator part of the gradient with respect to brightness squared. Minimum value is 1, and maximum value is 100. -Display > DisplayPanelPowerAreaFactor | -Display > DisplayPanelPowerDpiFactor | -Display > DisplayPanelPowerFloor | -Display > DisplayPanelPowerVsyncDelta | -EnergyEstimationTelemetry > BatteryDrainMaxE3UploadRank | -EnergyEstimationTelemetry > BatteryDrainMinE3UploadBI | -EnergyEstimationTelemetry > BatteryDrainMinRate | -EnergyEstimationTelemetry > LongtermTimerInMinutes | -EnergyEstimationTelemetry > UploadAcRecords | -MobileBroadband > MBBClass | -StandbyActivationEnergy > DripsPowerFloorMilliWatts | -StandbyActivationEnergy > NonDripsPenaltyMilliWatts | -Storage > StorageType | -Wifi > WifiClass | - - -## Policy - - -### Definitions: Processor - -1. For both **HeteroDecreaseThreshold** and **HeteroIncreaseThreshold**, enter an Id in the **List** field, and click **Add**. -2. In the **Available Customizations** pane, select the Id that you added, and configure the value as follows. - -**HeteroDecreaseThreshold** specifies a threshold to cross below, which is required to park the Nth efficiency class 1 core. There is a separate value for each core index. The threshold is relative to efficiency class 0 performance. The provisioning interface can specify up to 4 different thresholds. If the system has 5 or more class 1 cores, the 4th value is used for all remaining cores of the same class. - -HeteroDecreaseThreshold is a four-byte unsigned integer where each byte represents a threshold in percentage. The lowest byte is the first threshold. For example, to set four thresholds—A, B, C, and D—the value of the parameter will be A + B*256 + C*65536 + D*16777216. - -Minimum value: `0 + 0*256 + 0*65536 + 0*16777216` -Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` - -**HeteroIncreaseThreshold** specifies the threshold value to cross above, which is required to unpark the Nth efficiency class 1 core. There is a separate value for each core index. The threshold is relative to efficiency class 0 performance. The provisioning interface can specify up to 4 different thresholds. If the system has 5 or more class 1 cores, the 4th value is used for all remaining cores of the same class. - -HeteroIncreaseThreshold is a four-byte unsigned integer where each byte represents a threshold in percentage. The lowest byte is the first threshold. For example, to set four thresholds—A, B, C, and D—the value of the parameter will be A + B*256 + C*65536 + D*16777216. - -Minimum value: `0 + 0*256 + 0*65536 + 0*16777216` -Maximum value: `100 + 100*256 + 100*65536 + 100*16777216` - -### Settings - -1. For each setting, select a power scheme for **SchemePersonality**, and then click **Add**. -2. In the **Available Customizations** pane, select the **SchemePersonality** that you added, and configure the value as follows. -3. Repeate for each power scheme that you want to configure. - ->[!NOTE] ->Each setting can be configured for **AcValue** (plugged in) and **DcValue** (on battery). - -

-Settings for AdaptivePowerBehavior | Description ---- | --- -StandbyBudgetGracePeriod | Define the minimum time, in seconds, after the system enters standby before the system makes the check if standby power budget is consumed. -StandbyBudgetPercent | Define the battery drain percentage that the user is allowed in a standby session. -StandbyReserveGracePeriod | Define the minimum time, in seconds, after the screen turns off before the system checks to make sure there is enough battery available to maintain the specified screen on time. -StandbyReserveTime | Define the screen on time, in seconds, that will be available to the user after standby exists and the screen turns on. -StandbyResetPercent | Specify the percentage of battery when the system will reset the standby budget. -

-Settings for Battery | Description ---- | --- -CriticalAction | Select the action to take when critical battery level is reached. -CriticalBatteryLevel | Specify the percentage of capacity when the critical battery action is taken. -LowAction | Specify the action to take when the low batter level is reached. -LowBatteryLevel | Specify the percentage of capacity when the low battery action is taken and the low battery warning, if enabled, appears. -LowBatteryWarning | Specify whether the OS displays a UI warning at the batter meter when the battery capacity crosses the low battery threshold. -ReserveBatteryLevel | Specify the percentage of capacity when the reserve battery warning is shown to the user. -

-Settings for Button | Description ---- | --- -ForcedShutdown | Specify the type of system shutdown that occurs when the system power button is pressed if the power button action is set to **Shut down**. When configured as **On**, a forced system shutdown will occur. When configured as **Off**, a normal system shutdown will occur. -LidAction | Specify the action to take when the system lid is closed. -LidOpenWake | Specify the action to take when the system lid is opened. -PowerButtonAction | Specify the action to take when the system power button is pressed. -SleepButtonAction | Specify the action to take when the sleep power button is pressed. -UIPowerButtonAction | Specify the action to take when the UI power button is pressed. -

-Settings for Disk | Description ---- | --- -BurstIgnoreDuration | Specify the period of inactivity, in seconds, to ignore when attempting to aggressively power down the disk. -IdleTimeout | Specify the period of inactivity, in seconds, before the disk is automatically powered down. -MaxDiskPower | -

-Settings for Display | Description ---- | --- -AdapativeIncrease | This setting denotes the user annoyance detection threshold. It specifies the duration, in seconds, between automatic display brightness level reduction and user input to consider the automatic display brightness level reduction as an annoyance to the user. This setting applies only to portable computers that support Windows control of the brightness level of an integrated display device. In most situations, you should not change the default value of this setting. -AdaptiveTimeout | Specify whether the OS automatically scales the display idle time-out based on user activity. If the user provides input to the system shortly after the display idle timeout is reached, Windows automatically extends the display idle time-out to deliver a better user experience. -AllowAdaptiveBrightness | -AllowDisplayRequired | Specify whether Windows allows applications to temporarily prevent the display from automatically reducing brightness or turning off to save power. -AnoyanceTimout | -ConsoleLockTimeout | -DimLevel | Specify the reduced display brightness level, in percentage, after the dim idle timeout has been reached. This setting applies only to portable computers that support Windows control of the brightness level of an integrated display device. -DimTimeout | Specify the period of inactivity, in seconds, before the display is dimmed. -IdleTimeout | Specify the period of inactivity, in seconds, before the display is automatically turned off. -NormalLevel | Specify the default display brightness level, in percentage. -

-Settings for EnergySaver | Description ---- | --- -BatteryThreshold | Specify the battery charge level, as a percentage, at which Energy Saver is turned on. -Brightness | Specify the percentage value to scale brightness to when Energy Saver is turned on. -Policy | Select between **User** and **Aggressive**. -

-Settings for IdleResiliency | Description ---- | --- -AllowDeepSleep | -ExecutionRequiredTimeout | -IdleResiliencyPeriod | -IOCoalescingTimeout | -

-Settings for Misc | Description ---- | --- -AllowWifiInStandby | Specify whether to allow Wi-Fi networking during standby. -ConnectivityInStandby | Specify whether to allow connectivity during standby. -DeviceIdlePolicy | Configure for power-saving or performance. -LockConsoleOnWake | Specify whether to lock the console. -

-Settings for Multimedia | Description ---- | --- -VideoPlayBackQuality | Configure for power-saving or performance. -

-Settings for PCIExpress | Description ---- | --- -ASPM | Configure Active State Power Management (ASPM) for moderate power savings or maximum power savings. -

-Settings for Processor
(Some parameters have suffix "1" to indicate efficiency class)
[Learn more about processor power management options](https://msdn.microsoft.com/library/windows/hardware/mt422910.aspx) | Description ---- | --- -CPConcurrency | -CPDecreasePolicy | -CPDecreaseTime | -CPDistribution | -DPHeadroom | -CPIncreasePolicy | -CPIncreaseTime | -CpLatencyHintUnpark | -CPMaxCores | -CPMinCores | -CPOverUtilizationThreshold | -CPPerfState | -DutyCycling | -HeteroClass0FloorPerf | -HeteroClass1InitialPerf | -HeteroDecreaseThreshold | -HeteroDecreaseTime | -HeteroIncreaseThreshold | -HeteroIncreaseTime | -HeteroPolicy | -IdleDemoteThreshold | -IdleDisable | -IdlePromoteThreshold | -IdleScaling | -IdleStateMax | -IdleTimeCheck | -MaxFrequency | -MaxPerformance | -MinPerformance | -PerfAllowThrottling | -PerfAutonomousMode | -PerfAutonomousWindows | -PerfBoostMode | -PerfBoostPolicy | -PerfDecreasePolicy | -PerfDecreaseThreshold | -PerfDecreaseThreshold1 | -PerfDecreaseTime | -PerfDistributeUtility | -PerfEnergyPereference | -PerfEnergyPreference | -PerfHistory | -PerfIncreasePolicy | -PerfIncreaseThreshold | -PerfIncreaseTime | -PerfLatencyHint | -PerfTimeCheck | -SchedulingPolicy | -ShortSchedulingPolicy | -SystemCoolingPolicy | -

- - -Settings for Sleep | Description ---- | --- -AllowRemoteOpenSleep | Configure the network file system to prevent the computer from automatically entering sleep when remote network files are open. **Disabled** prevents automatic sleep when remote network files are open. However, if the open files are stored in Offline Files and are backed by the Offline File cache, automatic sleep is allowed. **Enabled** prevents automatic sleep when remote network files are open. However, if the open files are stored in Offline Files or the open files have not been updated since they were originally opened, automatic sleep is allowed. -AllowRtcWake | whether the system uses the system-wide wake-on-timer capability. The system can automatically use wake-on-timer on capable hardware to perform scheduled tasks. For example, the system might wake automatically to install updates. **Important** wakes on internal system timers only. -AllowStandby | Specify whether to allow standby. -AllowSystemRequired | Configure the power manager to accept or ignore application system required requests. These requests prevent the system from automatically entering sleep after a period of user inactivity. -AwayMode | Specify whether the system uses away mode. If this setting is disabled, away mode is not used even if programs request it. -HibernateTimeout | Specify the duration of time after sleep that the system automatically wakes and enters hibernation, in seconds. This settings enables hibernate option on Modern Standby systems. Set the value to 0 to disable the feature. -HybridSleep | Specify whether the system can enter hybrid sleep. -StandbyTimeout | Specify the duration of inactivity before the system automatically enters sleep, in seconds. -UnattendTimeout | Specify the duration of inactivity before the system automatically enters sleep after waking from sleep in an unattended state, in seconds. For example, if the system wakes from sleep because of a timed event or a wake on LAN (WoL) event, the sleep unattended idle timeout value will be used instead of the sleep idle timeout value. diff --git a/windows/configuration/wcd/wcd.md b/windows/configuration/wcd/wcd.md index d0ab5d9dd1..6588bebea9 100644 --- a/windows/configuration/wcd/wcd.md +++ b/windows/configuration/wcd/wcd.md @@ -59,7 +59,6 @@ This section describes the settings that you can configure in [provisioning pack | [OtherAssets](wcd-otherassets.md) | | X | | | | | [Personalization](wcd-personalization.md) | X | | | | | | [Policies](wcd-policies.md) | X | X | X | X | X | -| [Power](wcd-power.md) | X | X | X | X | X | | [ProvisioningCommands](wcd-provisioningcommands.md) | X | | | | | | [SharedPC](wcd-sharedpc.md) | X | | | | | | [Shell](wcd-shell.md) | | X | | | | From ed787b6c0d2f1229eb39ac9cea4d9ba8223fde07 Mon Sep 17 00:00:00 2001 From: Andreas Stenhall Date: Sun, 24 Sep 2017 21:40:07 +0200 Subject: [PATCH 058/117] Missing a backslash in UNC path Missing a backslash in UNC path, it looks OK in the source but only one backslash is displayed in the browser where it should be two backslashes. --- .../import-export-exploit-protection-emet-xml.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index c864cb9ed7..bc57272913 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -157,7 +157,7 @@ You can use Group Policy to deploy the configuration you've created to multiple 7. In the **Options::** section, enter the location and filename of the Exploit Protection configuration file that you want to use, such as in the following examples: - C:\MitigationSettings\Config.XML - - \\Server\Share\Config.xml + - \\\Server\Share\Config.xml - https://localhost:8080/Config.xml 8. Click **OK** and [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). From 69515d0b19d2c6af44e3b7498f25c9eb9d8496c6 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 25 Sep 2017 09:38:18 -0700 Subject: [PATCH 059/117] sync --- windows/configuration/wcd/wcd-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index f1108cd189..5419cb3598 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -254,7 +254,7 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowTaskSwitcher](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowtaskswitcher) | Allow or disallow task switching on the device. | | X | | | | | [AllowThirdPartySuggestionsInWindowsSpotlight](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowthirdpartysuggestionsinwindowsspotlight) | Specify whether to allow app and content suggestions from third-party software publishers in Windows Spotlight. | X | | | | | | [AllowVoiceRecording](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowvoicerecording) | Specify whether voice recording is allowed for apps. | | X | | | | -| [AllowWindowsConsumerFeatures](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowwindowsconsumerfeatures) | Turn on experiences that are typically for consumers only, such as Start suggetions, membership notifications, post-OOBE app install, and redirect tiles. | X | | | | | +| [AllowWindowsConsumerFeatures](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-experience#experience-allowwindowsconsumerfeatures) | Turn on experiences that are typically for consumers only, such as Start suggetions, membership notifications, post-OOBE app install, and redirect tiles. | X | | | | | | [AllowWindowsSpotlight](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowwindowsspotlight) |Specify whether to turn off all Windows Spotlight features at once. | X | | | | | | [AllowWindowsSpotlightOnActionCenter](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowwindowsspotlightonactioncenter) | Prevent Windows Spotlight notifications from being displayed in the Action Center. | X | | | | | | [AllowWindowsSpotlightWindowsWelcomeExperience](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowwindowsspotlightwindowswelcomeexperience) | Turn off the Windows Spotlight Windows welcome experience feature. | X | | | | | From d021b139bf021367d6bafaa848a305edd3a3d290 Mon Sep 17 00:00:00 2001 From: Kaushik Ainapure Date: Wed, 27 Sep 2017 19:38:37 +0530 Subject: [PATCH 060/117] Adding LTSB to Token-based Activation section Our documentation does not currently address LTSB versions. It doesn't have any statement pertaining to LTSB, either way. Added the following text: Token-based Activation option is available for Windows 10 Enterprise LTSB editions (Version 1507 and 1607) --- .../volume-activation/plan-for-volume-activation-client.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/volume-activation/plan-for-volume-activation-client.md b/windows/deployment/volume-activation/plan-for-volume-activation-client.md index 37335d3504..92299edb2e 100644 --- a/windows/deployment/volume-activation/plan-for-volume-activation-client.md +++ b/windows/deployment/volume-activation/plan-for-volume-activation-client.md @@ -75,6 +75,7 @@ Telephone activation is primarily used in situations where a computer is isolate **Note**   A specialized method, Token-based activation, is available for specific situations when approved customers rely on a public key infrastructure in a completely isolated, and usually high-security, environment. For more information, contact your Microsoft Account Team or your service representative. +Token-based Activation option is available for Windows 10 Enterprise LTSB editions (Version 1507 and 1607). ### Multiple activation key From a472673eac9afa3d5b1a95f0b495b5c869a473d3 Mon Sep 17 00:00:00 2001 From: Don Gill Date: Wed, 27 Sep 2017 09:00:37 -0700 Subject: [PATCH 061/117] Version tweak It should read version 1607 (or later) --- windows/client-management/connect-to-remote-aadj-pc.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index 43db69d30f..d8a901623a 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -23,7 +23,7 @@ From its release, Windows 10 has supported remote connections to PCs that are jo ## Set up -- Both PCs (local and remote) must be running Windows 10, version 1607. Remote connection to an Azure AD-joined PC that is running earlier versions of Windows 10 is not supported. +- Both PCs (local and remote) must be running Windows 10, version 1607 (or later). Remote connection to an Azure AD-joined PC that is running earlier versions of Windows 10 is not supported. - Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC that you are using to connect to the remote PC. - On the PC that you want to connect to: 1. Open system properties for the remote PC. From 9658240e0174eb060d219b9029d478895faa2087 Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 11:29:39 -0700 Subject: [PATCH 062/117] Added videos to FAQ section --- .../hello-identity-verification.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index a866155093..27c613c2ea 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -71,6 +71,24 @@ The table shows the minimum requirements for each deployment. ## Frequently Asked Questions +### What is the user experience for Windows Hello for Business? +The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. + +Windows Hello for Business Enrollment including Biometrics +> [!Video https://youtu.be/FJqHPTZTpNM] + +Windows Hello for Business Enrollment PIN only +> [!Video https://youtu.be/etXJsZb8Fso] + +### What happens when my user forgets their PIN? + +If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider. + +Windows Hello PIN Reset above Lock (Fall Creators Update) +> [!Video https://youtu.be/KcVTq8lTlkI] + +For on-premises deployments, devices must be well connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can onboard their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs without access to their corporate network. + ### Do I need Windows Server 2016 domain controllers? There are many deployment options from which to choose. Some of those options require an adequate number of Windows Server 2016 domain controllers in the site where you have deployed Windows Hello for Business. There are other deployment options that use existing Windows Server 2008 R2 or later domain controllers. Choose the deployment option that best suits your environment From a7acb3bcc58221df6268ab56a25926d08493c85c Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 14:19:22 -0700 Subject: [PATCH 063/117] Attempt to fix URL --- .../hello-for-business/hello-identity-verification.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index 27c613c2ea..d1acb86c68 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -75,17 +75,17 @@ The table shows the minimum requirements for each deployment. The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. Windows Hello for Business Enrollment including Biometrics -> [!Video https://youtu.be/FJqHPTZTpNM] +> [!VIDEO https://www.youtube.com/watch?v=FJqHPTZTpNM&feature=youtu.be] Windows Hello for Business Enrollment PIN only -> [!Video https://youtu.be/etXJsZb8Fso] +> [!VIDEO https://youtu.be/etXJsZb8Fso] ### What happens when my user forgets their PIN? If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider. Windows Hello PIN Reset above Lock (Fall Creators Update) -> [!Video https://youtu.be/KcVTq8lTlkI] +> [!VIDEO https://youtu.be/KcVTq8lTlkI] For on-premises deployments, devices must be well connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can onboard their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs without access to their corporate network. From ee97558ae303df587f21748e888847dd31d27e1c Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 14:46:38 -0700 Subject: [PATCH 064/117] another attempt to fix video links --- .../hello-for-business/hello-identity-verification.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index d1acb86c68..ddccce6045 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -75,17 +75,17 @@ The table shows the minimum requirements for each deployment. The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. Windows Hello for Business Enrollment including Biometrics -> [!VIDEO https://www.youtube.com/watch?v=FJqHPTZTpNM&feature=youtu.be] +> [!VIDEO https://www.youtube.com/embed/FJqHPTZTpNM] Windows Hello for Business Enrollment PIN only -> [!VIDEO https://youtu.be/etXJsZb8Fso] +> [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso] ### What happens when my user forgets their PIN? If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider. Windows Hello PIN Reset above Lock (Fall Creators Update) -> [!VIDEO https://youtu.be/KcVTq8lTlkI] +> [!VIDEO https://www.youtube.com/embed/KcVTq8lTlkI] For on-premises deployments, devices must be well connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can onboard their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs without access to their corporate network. From 2d26921712b5bf3a476ea83434ffbfb7ef3d234d Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 15:21:44 -0700 Subject: [PATCH 065/117] final updates for adding videos --- .../hello-for-business/hello-identity-verification.md | 3 --- 1 file changed, 3 deletions(-) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index ddccce6045..7cb9166f03 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -74,17 +74,14 @@ The table shows the minimum requirements for each deployment. ### What is the user experience for Windows Hello for Business? The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. -Windows Hello for Business Enrollment including Biometrics > [!VIDEO https://www.youtube.com/embed/FJqHPTZTpNM] -Windows Hello for Business Enrollment PIN only > [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso] ### What happens when my user forgets their PIN? If the user can sign-in with a password, they can reset their PIN by clicking the "I forgot my PIN" link in settings. Beginning with the Fall Creators Update, users can reset their PIN above the lock screen by clicking the "I forgot my PIN" link on the PIN credential provider. -Windows Hello PIN Reset above Lock (Fall Creators Update) > [!VIDEO https://www.youtube.com/embed/KcVTq8lTlkI] For on-premises deployments, devices must be well connected to their on-premises network (domain controllers and/or certificate authority) to reset their PINs. Hybrid customers can onboard their Azure tenant to use the Windows Hello for Business PIN reset service to reset their PINs without access to their corporate network. From 01368763d59bba34d359c9eb144a4241898fd2a5 Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 15:48:34 -0700 Subject: [PATCH 066/117] adding a line of white space between the enrollment videos --- .../hello-for-business/hello-identity-verification.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index 7cb9166f03..4889e47cab 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -75,7 +75,7 @@ The table shows the minimum requirements for each deployment. The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. > [!VIDEO https://www.youtube.com/embed/FJqHPTZTpNM] - +
> [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso] ### What happens when my user forgets their PIN? From dfb9bd25ef14019d3da4719af9ff9364df5af481 Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Thu, 28 Sep 2017 17:45:19 -0700 Subject: [PATCH 067/117] fix style problem between videos --- .../hello-for-business/hello-identity-verification.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/access-protection/hello-for-business/hello-identity-verification.md b/windows/access-protection/hello-for-business/hello-identity-verification.md index 4889e47cab..1ca171237b 100644 --- a/windows/access-protection/hello-for-business/hello-identity-verification.md +++ b/windows/access-protection/hello-for-business/hello-identity-verification.md @@ -75,7 +75,9 @@ The table shows the minimum requirements for each deployment. The user experience for Windows Hello for Business occurs after user sign once you deploy Windows Hello for Business policy settings to your environment. > [!VIDEO https://www.youtube.com/embed/FJqHPTZTpNM] -
+ +
+ > [!VIDEO https://www.youtube.com/embed/etXJsZb8Fso] ### What happens when my user forgets their PIN? From 4360980e6c8886414cb8ce63519fa3bd31b0348f Mon Sep 17 00:00:00 2001 From: chintanpatel Date: Fri, 29 Sep 2017 10:07:32 -0700 Subject: [PATCH 068/117] Update reqs-wd-app-guard.md --- .../windows-defender-application-guard/reqs-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index 15b33475fa..4fb205b6cc 100644 --- a/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -24,7 +24,7 @@ Your environment needs the following hardware to run Application Guard. |--------|-----------| |64-bit CPU|A 64-bit computer is required for hypervisor and virtualization-based security (VBS). For more info about Hyper-V, see [Hyper-V on Windows Server 2016](https://docs.microsoft.com/en-us/windows-server/virtualization/hyper-v/hyper-v-on-windows-server) or [Introduction to Hyper-V on Windows 10](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/about/). For more info about hypervisor, see [Hypervisor Specifications](https://docs.microsoft.com/en-us/virtualization/hyper-v-on-windows/reference/tlfs).| |CPU virtualization extensions|Extended page tables, also called _Second Level Address Translation (SLAT)_

**-AND-**

One of the following virtualization extensions for VBS:

VT-x (Intel)

**-OR-**

AMD-V| -|Hardware memory|8 GB minimum, 16 GB recommended| +|Hardware memory|Microsoft recommends 8GB RAM for optimal performance| |Hard disk|5 GB free space, solid state disk (SSD) recommended| |Input/Output Memory Management Unit (IOMMU) support|Not required, but strongly recommended| From 6e75bf3e2f61378a7a7acc77fd0a10a70db43fd1 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Fri, 29 Sep 2017 13:42:20 -0700 Subject: [PATCH 069/117] updates to image alts --- .../attack-surface-reduction-exploit-guard.md | 2 +- .../controlled-folders-exploit-guard.md | 2 +- ...tomize-controlled-folders-exploit-guard.md | 8 +++--- .../customize-exploit-protection.md | 28 +++++++++---------- .../enable-attack-surface-reduction.md | 2 +- ...enable-controlled-folders-exploit-guard.md | 4 +-- .../evaluate-attack-surface-reduction.md | 4 +-- .../evaluate-controlled-folder-access.md | 4 +-- .../evaluate-network-protection.md | 2 +- .../event-views-exploit-guard.md | 6 ++-- 10 files changed, 31 insertions(+), 31 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md index ca4ced3a04..320ea854bf 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard.md @@ -144,7 +144,7 @@ You can review the Windows event log to see events that are created when an Atta 2. On the left panel, under **Actions**, click **Import custom view...** - ![](images/events-import.gif) + ![Animation showing the import custom view on the Event viewer window](images/events-import.gif) 3. Navigate to the Exploit Guard Evaluation Package, and select the file *asr-events.xml*. Alternatively, [copy the XML directly](event-views-exploit-guard.md). diff --git a/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md index 9faffd8366..7f728d947a 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/controlled-folders-exploit-guard.md @@ -75,7 +75,7 @@ You can review the Windows event log to see events that are created when Control 3. On the left panel, under **Actions**, click **Import custom view...** - ![](images/events-import.gif) + ![Animation showing the import custom view on the Event viewer window](images/events-import.gif) 4. Navigate to where you extracted *cfa-events.xml* and select it. Alternatively, [copy the XML directly](event-views-exploit-guard.md). diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md index e185c31b19..eecb3be7a2 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-controlled-folders-exploit-guard.md @@ -75,7 +75,7 @@ You can use the Windows Defender Security Center app or Group Policy to add and 4. Click **Add a protected folder** and follow the prompts to add apps. - ![](images/cfa-prot-folders.png) + ![Screenshot of the Virus and threat protection settings button](images/cfa-prot-folders.png) ### Use Group Policy to protect additional folders @@ -107,7 +107,7 @@ You can use the Windows Defender Security Center app or Group Policy to add and Continue to use `Add-MpPreference -ControlledFolderAccessProtectedFolders` to add more folders to the list. Folders added using this cmdlet will appear in the Windows Defender Security Center app. -![](images/cfa-allow-folder-ps.png) +![Screenshot of a PowerShell window with the cmdlet above entered](images/cfa-allow-folder-ps.png) >[!IMPORTANT] @@ -144,7 +144,7 @@ When you add an app, you have to specify the app's location. Only the app in tha 4. Click **Add an allowed app** and follow the prompts to add apps. - ![](images/cfa-allow-app.png) + ![Screenshot of the add an allowed app button](images/cfa-allow-app.png) ### Use Group Policy to whitelist specific apps @@ -178,7 +178,7 @@ When you add an app, you have to specify the app's location. Only the app in tha Continue to use `Add-MpPreference -ControlledFolderAccessAllowedApplications` to add more apps to the list. Apps added using this cmdlet will appear in the Windows Defender Security Center app. -![](images/cfa-allow-app-ps.png) +![Screenshot of a PowerShell window with the above cmdlet entered](images/cfa-allow-app-ps.png) >[!IMPORTANT] diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index c837adc81b..1f4767560d 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -51,25 +51,25 @@ It also describes how to enable or configure the mitigations using Windows Defen All mitigations can be configured for individual apps. Some mitigations can also be applied at the operating system level. -You can set each of the mitigations to on, off, or to their default value as indicated in the table below. Some mitigations have additional options, these are indicated in the description in the table. +You can set each of the mitigations to on, off, or to their default value. Some mitigations have additional options, these are indicated in the description in the table. Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On". -![](images/ep-default.png) +![Screenshot showing the drop down menu for DEP which shows the default for DEP as On](images/ep-default.png) The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults. For the associated PowerShell cmdlets for each mitigation, see the [PowerShell reference table](#cmdlets-table) at the bottom of this topic. -Mitigation | Description | Can be applied to, and default value for system mitigations | Audit mode available +Mitigation | Description | Can be applied to | Audit mode available - | - | - | - -Control flow guard (CFG) | Ensures control flow integrity for indirect calls. Can optionally suppress exports and use strict CFG. | System and app-level (system default: **On**) | [!include[Check mark no](images/svg/check-no.md)] -Data Execution Prevention (DEP) | Prevents code from being run from data-only memory pages such as the heap and stacks. Only configurable for 32-bit (x86) apps, permanently enabled for all other architectures. Can optionally enable ATL thunk emulation. | System and app-level (system default: **On**) | [!include[Check mark no](images/svg/check-no.md)] -Force randomization for images (Mandatory ASLR) | Forcibly relocates images not compiled with /DYNAMICBASE. Can optionally fail loading images that don't have relocation information. | System and app-level (system default: **Off**) | [!include[Check mark no](images/svg/check-no.md)] -Randomize memory allocations (Bottom-Up ASLR) | Randomizes locations for virtual memory allocations including those for system structures heaps, stacks, TEBs, and PEBs. Can optionally use a wider randomization variance for 64-bit processes. | System and app-level (system default: **On**) | [!include[Check mark no](images/svg/check-no.md)] -Validate exception chains (SEHOP) | Ensures the integrity of an exception chain during exception dispatch. Only configurable for 32-bit (x86) applications. | System and app-level (system default: **On**) | [!include[Check mark no](images/svg/check-no.md)] -Validate heap integrity | Terminates a process when heap corruption is detected. | System and app-level (system default: **Off**) | [!include[Check mark no](images/svg/check-no.md)] +Control flow guard (CFG) | Ensures control flow integrity for indirect calls. Can optionally suppress exports and use strict CFG. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] +Data Execution Prevention (DEP) | Prevents code from being run from data-only memory pages such as the heap and stacks. Only configurable for 32-bit (x86) apps, permanently enabled for all other architectures. Can optionally enable ATL thunk emulation. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] +Force randomization for images (Mandatory ASLR) | Forcibly relocates images not compiled with /DYNAMICBASE. Can optionally fail loading images that don't have relocation information. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] +Randomize memory allocations (Bottom-Up ASLR) | Randomizes locations for virtual memory allocations including those for system structures heaps, stacks, TEBs, and PEBs. Can optionally use a wider randomization variance for 64-bit processes. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] +Validate exception chains (SEHOP) | Ensures the integrity of an exception chain during exception dispatch. Only configurable for 32-bit (x86) applications. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] +Validate heap integrity | Terminates a process when heap corruption is detected. | System and app-level | [!include[Check mark no](images/svg/check-no.md)] Arbitrary code guard (ACG) | Prevents the introduction of non-image-backed executable code and prevents code pages from being modified. Can optionally allow thread opt-out and allow remote downgrade (configurable only with PowerShell). | App-level only | [!include[Check mark yes](images/svg/check-yes.md)] Block low integrity images | Prevents the loading of images marked with Low Integrity. | App-level only | [!include[Check mark yes](images/svg/check-yes.md)] Block remote images | Prevents loading of images from remote devices. | App-level only | [!include[Check mark yes](images/svg/check-yes.md)] @@ -127,7 +127,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi 2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then the **Exploit protection** label: - ![](images/wdsc-exp-prot.png) + ![App & browser control screen in the Windows Defender Security Center](images/wdsc-exp-prot.png) 3. Under the **System settings** section, find the mitigation you want to configure and select one of the following. Apps that aren't configured individually in the **Program settings** section will use the settings configured here: - **On by default** - The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section @@ -139,7 +139,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi Changing some settings may required a restart, which will be indicated in red text underneath the setting. - ![](images/wdsc-exp-prot-sys-settings.png) + ![Screenshot showing the DEP drop down menu where you can select On, Off, or Default](images/wdsc-exp-prot-sys-settings.png) 4. Repeat this for all the system-level mitigations you want to configure. @@ -154,7 +154,7 @@ Exporting the configuration as an XML file allows you to copy the configuration 2. Click the **App & browser control** tile (or the app icon on the left menu bar) and then the **Exploit protection settings** at the bottom of the screen: - ![](images/wdsc-exp-prot.png) + ![Screenshot showing the Exploit protection label highlighted in the Windows Defender Security Center App & browser settings section](images/wdsc-exp-prot.png) 3. Go to the **Program settings** section and choose the app you want to apply mitigations to: @@ -164,14 +164,14 @@ Exporting the configuration as an XML file allows you to copy the configuration - Use **Add by program name** to have the mitigation applied to any running process with that name. You must specify a file with an extension. You can enter a full path to limit the mitigation to only the app with that name in that location. - Use **Choose exact file path** to use a standard Windows Explorer file picker window to find and select the file you want. - ![](images/wdsc-exp-prot-app-settings.png) + ![Screenshot showing the add file or folder button](images/wdsc-exp-prot-app-settings.png) 4. After selecting the app, you'll see a list of all the mitigations that can be applied. To enable the mitigation, click the check box and then change the slider to **On**. Select any additional options. Choosing **Audit** will apply the mitigation in audit mode only. You will be notified if you need to restart the process or app, or if you need to restart Windows. 5. Repeat this for all the apps and mitigations you want to configure. Click **Apply** when you're done setting up your configuration. - ![](images/wdsc-exp-prot-app-settings-options.png) + ![Screenshot showing some of the options available for an added program](images/wdsc-exp-prot-app-settings-options.png) You can now [export these settings as an XML file](import-export-exploit-protection-emet-xml.md) or return to configure system-level mitigations. diff --git a/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index 7158a21778..c42e32c42f 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -79,7 +79,7 @@ See the [Attack surface reduction](attack-surface-reduction-exploit-guard.md) to - Disabled = 0 - Audit mode = 2 -![](images/asr-rules-gp.png) +![Group policy setting showing a blank ASR rule ID and value of 1](images/asr-rules-gp.png) diff --git a/windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md index 6935d74d73..69153eefb4 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/enable-controlled-folders-exploit-guard.md @@ -60,7 +60,7 @@ For further details on how audit mode works, and when you might want to use it, 3. Set the switch for the feature to **On** - ![](images/cfa-on.png) + ![Screenshot of the CFA feature switched to On](images/cfa-on.png) ### Use Group Policy to enable Controlled folder access @@ -77,7 +77,7 @@ For further details on how audit mode works, and when you might want to use it, - **Disable (Default)** - The Controlled folder access feature will not work. All apps can make changes to files in protected folders. - **Audit Mode** - If a malicious or suspicious app attempts to make a change to a file in a protected folder, the change will be allowed but will be recorded in the Windows event log. This allows you to assess the impact of this feature on your organization. - ![](images/cfa-gp-enable.png) + ![Screenshot of group policy option with Enabled and then Enable selected in the drop down](images/cfa-gp-enable.png) >[!IMPORTANT] >To fully enable the Controlled folder access feature, you must set the Group Policy option to **Enabled** and also select **Enable** in the options drop-down menu. diff --git a/windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md b/windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md index 832df46955..bd2b01af18 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md +++ b/windows/threat-protection/windows-defender-exploit-guard/evaluate-attack-surface-reduction.md @@ -57,7 +57,7 @@ This tool has a simple user interface that lets you choose a rule, configure it When you run a scenario, you will see what the scenario entails, what the rule is set to, and what actions were taken. -![](images/asr-test-tool.png) +![Screenshot of the Exploit guard demo tool](images/asr-test-tool.png) Each scenario creates a fake or sample file or behavior that the rule would target and, if the rule was enabled, block from running. @@ -99,7 +99,7 @@ Audit | The rule wil fire, but the suspicious behavior will **not** be blocked f Block mode will cause a notification to appear on the user's desktop: -![](images/asr-notif.png) +![Example notification that says Action blocked: Your IT administrator caused Windows Defender Antivirus to block this action. Contact your IT desk.](images/asr-notif.png) You can [modify the notification to display your company name and links](customize-attack-surface-reduction.md#customize-the-notification) for users to obtain more information or contact your IT help desk. diff --git a/windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md b/windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md index c2483edae7..f8829b944e 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md +++ b/windows/threat-protection/windows-defender-exploit-guard/evaluate-controlled-folder-access.md @@ -73,11 +73,11 @@ You can enable Controlled folder access, run the tool, and see what the experien 6. You'll be asked to specify a name and location for the file. You can choose anything you wish to test. - ![](images/cfa-filecreator.png) + ![Screenshot of the exploit guard demo tool](images/cfa-filecreator.png) 7. A notification will appear, indicating that the tool was prevented from creating the file, as in the following example: - ![](images/cfa-notif.png) + ![Exampke notification that says Unauthorized changes blocked: Controlled folder access blocked (file name) from making changes to the folder (folder name)](images/cfa-notif.png) ## Review Controlled folder access events in Windows Event Viewer diff --git a/windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md b/windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md index 1d47864477..af1f57f168 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/evaluate-network-protection.md @@ -64,7 +64,7 @@ You can also carry out the processes described in this topic in audit or disable You will get a 403 Forbidden response in the browser, and you will see a notification that the network connnection was blocked. -![](images/np-notif.png) +![Example notification that says Connection blocked: Your IT administrator caused Windows Defender Security center to block this network connection. Contact your IT help desk.](images/np-notif.png) ## Review Network protection events in Windows Event Viewer diff --git a/windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md b/windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md index 97a86e7fa9..8b068f6f7c 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md +++ b/windows/threat-protection/windows-defender-exploit-guard/event-views-exploit-guard.md @@ -47,7 +47,7 @@ You can also manually navigate to the event area that corresponds to the Windows ### Import an existing XML custom view -1. Download the [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) and extract the appropraite file to an easily accessible location. The following filenames are each of the custom views: +1. Download the [Exploit Guard Evaluation Package](https://aka.ms/mp7z2w) and extract the appropriate file to an easily accessible location. The following filenames are each of the custom views: - Controlled folder access events custom view: *cfa-events.xml* - Exploit protection events custom view: *ep-events.xml* - Attack surface reduction events custom view: *asr-events.xml* @@ -57,7 +57,7 @@ You can also manually navigate to the event area that corresponds to the Windows 3. On the left panel, under **Actions**, click **Import Custom View...** - ![](images/events-import.gif) + ![Animation highlighting Import custom view on the left of the Even viewer window](images/events-import.gif) 4. Navigate to where you extracted XML file for the custom view you want and select it. @@ -73,7 +73,7 @@ You can also manually navigate to the event area that corresponds to the Windows 3. On the left panel, under **Actions**, click **Create Custom View...** - ![](images/events-create.gif) + ![Animation highlighting the create cusomt view option on the Event viewer window ](images/events-create.gif) 4. Go to the XML tab and click **Edit query manually**. You'll see a warning that you won't be able to edit the query using the **Filter** tab if you use the XML option. Click **Yes**. From 6c5625a168ad910bbe1089468b429a2ce90390b1 Mon Sep 17 00:00:00 2001 From: Mike Stephens Date: Mon, 2 Oct 2017 06:06:08 -0700 Subject: [PATCH 070/117] Fix reported spelling errors --- .../hello-hybrid-cert-whfb-settings-dir-sync.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md b/windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md index 51d3af12b8..084999e656 100644 --- a/windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md +++ b/windows/access-protection/hello-for-business/hello-hybrid-cert-whfb-settings-dir-sync.md @@ -25,7 +25,7 @@ ms.date: 09/08/2017 >[!IMPORTANT] >This guide only applies to Hybrid deployments for Windows 10, version 1703 or higher. -In hybrid deployments, users register the public portion of their Windows Hello for Business crednetial with Azure. Azure AD Connect syncrhonizes the Windows Hello for Business public key to Active Directory. +In hybrid deployments, users register the public portion of their Windows Hello for Business credential with Azure. Azure AD Connect synchronizes the Windows Hello for Business public key to Active Directory. The key-trust model needs Windows Server 2016 domain controllers, which configures the key registration permissions automatically; however, the certificate-trust model does not and requires you to add the permissions manually. From aec47efc8f977150e457a82e2aa86a756fb3b415 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 2 Oct 2017 15:15:27 +0000 Subject: [PATCH 071/117] Merged PR 3523: Merge msfb-updates to master change private store ingestion time --- .../app-inventory-management-windows-store-for-business.md | 2 +- store-for-business/distribute-apps-from-your-private-store.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/store-for-business/app-inventory-management-windows-store-for-business.md b/store-for-business/app-inventory-management-windows-store-for-business.md index 6c598f70cc..9eebbb170e 100644 --- a/store-for-business/app-inventory-management-windows-store-for-business.md +++ b/store-for-business/app-inventory-management-windows-store-for-business.md @@ -84,7 +84,7 @@ Once an app is in your private store, people in your org can install the app on 3. Use **Refine results** to search for online-licensed apps under **License type**. 4. From the list of online-licensed apps, click the ellipses for the app you want, and then choose **Add to private store**. -The value under **Private store** for the app will change to pending. It will take approximately twelve hours before the app is available in the private store. +The value under **Private store** for the app will change to pending. It will take approximately thirty-six hours before the app is available in the private store. Employees can claim apps that admins added to the private store by doing the following. **To claim an app from the private store** diff --git a/store-for-business/distribute-apps-from-your-private-store.md b/store-for-business/distribute-apps-from-your-private-store.md index 29e97b30bb..73c7ff9a4c 100644 --- a/store-for-business/distribute-apps-from-your-private-store.md +++ b/store-for-business/distribute-apps-from-your-private-store.md @@ -44,7 +44,7 @@ Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps & -The value under **Private store** for the app will change to pending. It will take approximately twelve hours before the app is available in the private store. +The value under **Private store** for the app will change to pending. It will take approximately thirty-six hours before the app is available in the private store. Employees can claim apps that admins added to the private store by doing the following. From 758b6f8ae3f116dc21f6ea5acdf212b494d70006 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Mon, 2 Oct 2017 16:58:08 +0000 Subject: [PATCH 072/117] Merged PR 3524: Merge msfb-12357182 to master Settings updates and request app feature. --- ...acquire-apps-windows-store-for-business.md | 22 +++++++++++++------ ...age-settings-windows-store-for-business.md | 3 +-- ...gs-reference-windows-store-for-business.md | 16 ++++++++------ ...ows-store-for-business-account-settings.md | 18 +++++++-------- 4 files changed, 34 insertions(+), 25 deletions(-) diff --git a/store-for-business/acquire-apps-windows-store-for-business.md b/store-for-business/acquire-apps-windows-store-for-business.md index aa700ada3e..42ad5a517d 100644 --- a/store-for-business/acquire-apps-windows-store-for-business.md +++ b/store-for-business/acquire-apps-windows-store-for-business.md @@ -6,6 +6,7 @@ ms.mktglfcycl: manage ms.sitesec: library ms.pagetype: store author: TrudyHa +ms.date: 10/01/2017 ms.localizationpriority: high --- @@ -30,18 +31,17 @@ There are a couple of things we need to know when you pay for apps. You can add - Legal business address - Payment option (credit card) - ## Acquire apps **To acquire an app** -1. Log in to http://businessstore.microsoft.com -2. Click Shop, or use Search to find an app. +1. Sign in to http://businessstore.microsoft.com +2. Click **Shop**, or use Search to find an app. 3. Click the app you want to purchase. 4. On the product description page, choose your license type - either online or offline. -5. Free apps will be added to **Inventory** or **Apps & software**. For apps with a price, you can set the quantity you want to buy. Type the quantity and click **Next**. -6. If you don’t have a payment method saved in **Account Information** or **Payments & billing**, we will prompt you for one. -7. Add your credit card or debit card info, and click **Next**. Your card info is saved as a payment option on **Account information** or **Payments & billing**. +5. Free apps will be added to **Products & services**. For apps with a price, you can set the quantity you want to buy. Type the quantity and click **Next**. +6. If you don’t have a payment method saved in **Billing - Payment methods**, we will prompt you for one. +7. Add your credit card or debit card info, and click **Next**. Your card info is saved as a payment option on **Billing - Payment methods**. -You’ll also need to have your business address saved on **Account information** or **Payments & billing**. The address is used to generate tax rates. For more information on taxes for apps, see [organization tax information](https://technet.microsoft.com/itpro/windows/manage/update-windows-store-for-business-account-settings#organization-tax-information). +You’ll also need to have your business address saved on ****Billing - Account profile***. The address is used to generate tax rates. For more information on taxes for apps, see [organization tax information](https://technet.microsoft.com/itpro/windows/manage/update-windows-store-for-business-account-settings#organization-tax-information). Microsoft Store adds the app to your inventory. From **Inventory** or **Apps & software**, you can: - Distribute the app: add to private store, or assign licenses @@ -51,3 +51,11 @@ Microsoft Store adds the app to your inventory. From **Inventory** or **Apps & s For info on distributing apps, see [Distribute apps to your employees from the Microsoft Store for Business](distribute-apps-to-your-employees-windows-store-for-business.md). For info on offline-licensed apps, see [Distribute offline apps](distribute-offline-apps.md). + +## Request apps +People in your org can request additional licenses for apps that are in your organization's private store. When **Allow app requests** is turned on, people in your org can respond to a notification about app license availability. Admins for your tenant will receive an email with the request, and can decide about making the purchase. + +**To manage Allow app requests** +1. Sign in to http://businessstore.microsoft.com +2. Click **Manage**, click **Settings**, and then click **Distribute**. +3. Under **Private store** turn on, or turn off **Allow app requests**. diff --git a/store-for-business/manage-settings-windows-store-for-business.md b/store-for-business/manage-settings-windows-store-for-business.md index f9592cd92e..e30487958f 100644 --- a/store-for-business/manage-settings-windows-store-for-business.md +++ b/store-for-business/manage-settings-windows-store-for-business.md @@ -12,7 +12,6 @@ ms.localizationpriority: high # Manage settings for Microsoft Store for Business and Education - **Applies to** - Windows 10 @@ -24,7 +23,7 @@ You can add users and groups, as well as update some of the settings associated | Topic | Description | | ----- | ----------- | -| [Update Microsoft Store for Business and Education account settings](update-windows-store-for-business-account-settings.md) | The **Account information** page in Microsoft Store for Business shows information about your organization that you can update, including: organization information, payment options, and offline licensing settings. | +| [Update Microsoft Store for Business and Education account settings](update-windows-store-for-business-account-settings.md) | **Billing - Account profile** in Microsoft Store for Business shows information about your organization that you can update. Payment options can be managed on **Billing - Payment methods**, and offline license settings can be managed on **Settings - Shop**. | | [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-windows-store-for-business.md) | Microsoft Store for Business manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-windows-store-for-business.md), but not to groups. | diff --git a/store-for-business/settings-reference-windows-store-for-business.md b/store-for-business/settings-reference-windows-store-for-business.md index 09fbf09a41..6d5922b831 100644 --- a/store-for-business/settings-reference-windows-store-for-business.md +++ b/store-for-business/settings-reference-windows-store-for-business.md @@ -22,13 +22,15 @@ The Microsoft Store for Business and Education has a group of settings that admi | Setting | Description | Location under **Manage** | | ------- | ----------- | ------------------------------ | -| Account information and payment options | Manage organization and payment option information. For more information, see [Manage settings for the Microsoft Store for Business and Education](manage-settings-windows-store-for-business.md).| **Payments & billing** | -| Private store | Update the name for your private store. The new name will be displayed on a tab in the Store. For more information, see [Manage private store settings](manage-private-store-settings.md). | **Store settings** | -| Offline licensing | Configure whether or not to make offline-licensed apps available in the Microsoft Store for Business and Education. For more information, see [Distribute offline apps](distribute-offline-apps.md). | **Store settings** (Private store tab) | -| Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md). | **Store settings** | -| Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Store settings** | -| Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-windows-store-for-business.md). | **Permissions** | -| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions** | +| Account information | Manage organization information. For more information, see [Manage settings for the Microsoft Store for Business and Education](update-windows-store-for-business-account-settings.md).| **Billing - Account profile** | +| Payment options | Manage payment options. For more information, see [Manage settings for the Microsoft Store for Business and Education](update-windows-store-for-business-account-settings.md#payment-options).| **Billing - Payment methods** | +| Private store | Update the name for your private store. The new name will be displayed on a tab in the Store. For more information, see [Manage private store settings](manage-private-store-settings.md). | **Settings - Distribute** | +| Offline licensing | Configure whether or not to make offline-licensed apps available in the Microsoft Store for Business and Education. For more information, see [Distribute offline apps](distribute-offline-apps.md). | **Settings - Shop** | +| App request | Configure whether or not people in your organization can request apps for admins to purchase. For more information, see [Distribute offline apps](acquire-apps-windows-store-for-business.md). | **Settings - Distribute** | +| Management tools | Management tools that are synced with Azure AD are listed on this page. You can choose one to use for managing app updates and distribution. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md). | **Settings - Distribute** | +| Device Guard signing | Use the Device Guard signing portal to add unsigned apps to a code integrity policy, or to sign code integrity policies. For more information, see [Device Guard signing portal](device-guard-signing-portal.md). | **Settings - Devices** | +| Permissions | Manage permissions for your employees. For more information, see [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-windows-store-for-business.md). | **Permissions - Roles** and **Permissions - Blocked basic purchasers** | +| Line-of-business (LOB) publishers | Invite devs to become LOB publishers for your organization. Existing LOB publishers are listed on the page, and you can deactivate or invite them again. For more information, see [Work with line-of-business apps](working-with-line-of-business-apps.md). | **Permissions - Line-of-business apps** | diff --git a/store-for-business/update-windows-store-for-business-account-settings.md b/store-for-business/update-windows-store-for-business-account-settings.md index f88eec0840..951212afbd 100644 --- a/store-for-business/update-windows-store-for-business-account-settings.md +++ b/store-for-business/update-windows-store-for-business-account-settings.md @@ -32,7 +32,7 @@ We need an email address in case we need to contact you about your Microsoft Sto **To update Organization information** 1. Sign in to the [Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com) -2. Click **Manage**, click **Payments & billing**, and then click **Edit**. +2. Click **Manage**, click **Billing**, **Account profile**, and then click **Edit**. ## Organization tax information Taxes for Microsoft Store for Business purchases are determined by your business address. Businesses in these countries can provide their VAT number or local equivalent: @@ -87,7 +87,7 @@ If you qualify for tax-exempt status in your market, start a service request to **To start a service request** 1. Sign in to the [Store for Business](http://businessstore.microsoft.com). -2. Click **Support**, and then under **Store or account support** click **Start a service request**. +2. Click **Manage**, click **Support**, and then under **Store settings & configuration** click **Create technical support ticket**. You’ll need this documentation: @@ -124,8 +124,8 @@ You can purchase apps from Microsoft Store for Business using your credit card. **To add a new payment option** 1. Sign in to the [Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). -2. Click **Manage**, and then click **Payments & billing**. -3. Under **Payment options**, click **Show my payment options**, and then select the type of credit card that you want to add. +2. Click **Manage**, click **Billing**, and then click **Payments methods**. +3. Click **Add a payment options**, and then select the type of credit card that you want to add. 4. Add information to any required fields, and then click **Next**. Once you click Next, the information you provided will be validated with a test authorization transaction and, if validated, the payment option will be added to your list of available payment options. Otherwise, you will be prompted for additional information or notified if there are any problems. @@ -136,10 +136,10 @@ Once you click Next, the information you provided will be validated with a tes **To update a payment option** 1. Sign in to the [Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). -2. Click **Manage**, and then click **Payments & billng**. -3. Under **Payment options** > **Show my payment options**, select the payment option that you want to update, and then click **Update**. +2. Click **Manage**, click **Billing**, and then click **Payments methods**. +3. Select the payment option that you want to update, and then click **Update**. 4. Enter any updated information in the appropriate fields, and then click **Next**. -Once you click **Next**, the information you provided will be validated with a test authorization transaction and, if validated, the payment option will be added to your list of available payment options. Otherwise,you will be prompted for additional information or notified if there are any problems. +Once you click **Next**, the information you provided will be validated with a test authorization transaction and, if validated, the payment option will be added to your list of available payment options. Otherwise, you will be prompted for additional information or notified if there are any problems. > [!NOTE] > Certain actions, like updating or adding a payment option, require temporary “test authorization” transactions to validate the payment option. These may appear on your statement as $0.00 authorizations or as small pending transactions. These transactions are temporary and should not impact your account unless you make several changes in a short period of time, or have a low balance. @@ -153,8 +153,8 @@ Admins can decide whether or not offline licenses are shown for apps in Microsof **To set offline license visibility** 1. Sign in to the [Store for Business](http://businessstore.microsoft.com) or [Store for Education](https://educationstore.microsoft.com). -2. Click **Manage**, and then click **Payments & billing**. -3. Under **Offline licensing**, click **Show offline licensed apps to people shopping in the store** to show availability for both online and offline licenses. +2. Click **Manage**, and then click **Settings - Shop**. +3. Under **Shopping experience** turn on or turn off **Show offline apps**,to show availability for offline-licensed apps. You have the following distribution options for offline-licensed apps: - Include the app in a provisioning package, and then use it as part of imaging a device. From 4eb941a4aa99e02d9e3640b6bf1e8f748cb76975 Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Mon, 2 Oct 2017 19:13:23 +0000 Subject: [PATCH 073/117] Merged PR 3528: Adding scope info, linked policy lists, and additional formatting. --- .../policy-configuration-service-provider.md | 22 +- .../mdm/policy-csp-abovelock.md | 46 +- .../mdm/policy-csp-accounts.md | 59 +- .../mdm/policy-csp-activexcontrols.md | 20 +- .../mdm/policy-csp-applicationdefaults.md | 20 +- .../mdm/policy-csp-applicationmanagement.md | 150 +- .../mdm/policy-csp-appvirtualization.md | 371 +- .../mdm/policy-csp-attachmentmanager.md | 46 +- .../mdm/policy-csp-authentication.md | 59 +- .../mdm/policy-csp-autoplay.md | 49 +- .../mdm/policy-csp-bitlocker.md | 20 +- .../mdm/policy-csp-bluetooth.md | 72 +- .../mdm/policy-csp-browser.md | 511 ++- .../mdm/policy-csp-camera.md | 20 +- .../mdm/policy-csp-cellular.md | 20 +- .../mdm/policy-csp-connectivity.md | 176 +- .../mdm/policy-csp-credentialproviders.md | 46 +- .../mdm/policy-csp-credentialsui.md | 34 +- .../mdm/policy-csp-cryptography.md | 33 +- .../mdm/policy-csp-dataprotection.md | 33 +- .../mdm/policy-csp-datausage.md | 33 +- .../mdm/policy-csp-defender.md | 462 ++- .../mdm/policy-csp-deliveryoptimization.md | 215 +- .../mdm/policy-csp-desktop.md | 20 +- .../mdm/policy-csp-deviceguard.md | 46 +- .../mdm/policy-csp-deviceinstallation.md | 33 +- .../mdm/policy-csp-devicelock.md | 215 +- .../mdm/policy-csp-display.md | 33 +- .../mdm/policy-csp-education.md | 46 +- .../mdm/policy-csp-enterprisecloudprint.md | 85 +- .../mdm/policy-csp-errorreporting.md | 72 +- .../mdm/policy-csp-eventlogservice.md | 59 +- .../mdm/policy-csp-experience.md | 254 +- .../mdm/policy-csp-exploitguard.md | 20 +- .../client-management/mdm/policy-csp-games.md | 21 +- .../mdm/policy-csp-handwriting.md | 25 +- .../mdm/policy-csp-internetexplorer.md | 3518 ++++++++++++++++- .../mdm/policy-csp-kerberos.md | 72 +- .../mdm/policy-csp-licensing.md | 33 +- ...policy-csp-localpoliciessecurityoptions.md | 310 +- .../mdm/policy-csp-location.md | 20 +- .../mdm/policy-csp-lockdown.md | 20 +- .../client-management/mdm/policy-csp-maps.md | 33 +- .../mdm/policy-csp-messaging.md | 46 +- .../mdm/policy-csp-networkisolation.md | 111 +- .../mdm/policy-csp-notifications.md | 20 +- .../client-management/mdm/policy-csp-power.md | 124 +- .../mdm/policy-csp-printers.md | 46 +- .../mdm/policy-csp-privacy.md | 1008 ++++- .../mdm/policy-csp-remoteassistance.md | 59 +- .../mdm/policy-csp-remotedesktopservices.md | 85 +- .../mdm/policy-csp-remotemanagement.md | 202 +- .../mdm/policy-csp-remoteprocedurecall.md | 33 +- .../mdm/policy-csp-remoteshell.md | 98 +- .../mdm/policy-csp-search.md | 137 +- .../mdm/policy-csp-security.md | 128 +- .../mdm/policy-csp-settings.md | 176 +- .../mdm/policy-csp-smartscreen.md | 46 +- .../mdm/policy-csp-speech.md | 20 +- .../client-management/mdm/policy-csp-start.md | 372 +- .../mdm/policy-csp-storage.md | 20 +- .../mdm/policy-csp-system.md | 178 +- .../mdm/policy-csp-textinput.md | 167 +- .../mdm/policy-csp-timelanguagesettings.md | 20 +- .../mdm/policy-csp-update.md | 594 ++- .../client-management/mdm/policy-csp-wifi.md | 89 +- ...olicy-csp-windowsdefendersecuritycenter.md | 189 +- .../mdm/policy-csp-windowsinkworkspace.md | 33 +- .../mdm/policy-csp-windowslogon.md | 46 +- .../mdm/policy-csp-wirelessdisplay.md | 85 +- 70 files changed, 11441 insertions(+), 143 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 121d77fdb7..f0b176f45a 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/25/2017 +ms.date: 09/29/2017 --- # Policy CSP @@ -22,6 +22,26 @@ The Policy configuration service provider has the following sub-categories: - Policy/Config/*AreaName* – Handles the policy configuration request from the server. - Policy/Result/*AreaName* – Provides a read-only path to policies enforced on the device. + + +> [!Important] +> Policy scope is the level at which a policy can be configured. Some policies can only be configured at the device level, meaning the policy will take effect independent of who is logged into the device. Other policies can be configured at the user level, meaning the policy will only take effect for that user. +> +> The allowed scope of a specific policy is represented below its table of supported Windows editions. To configure a policy under a specific scope (user vs. device), please use the following paths: +> +> User scope: +> - **./User/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. +> - **./User/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. +> +> Device scope: +> - **./Device/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. +> - **./Device/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. +> +> For device wide configuration the **_Device/_** portion may be omitted from the path, deeming the following paths respectively equivalent: +> +> - **./Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy. +> - **./Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result. + The following diagram shows the Policy configuration service provider in tree format as used by both Open Mobile Alliance Device Management (OMA DM) and OMA Client Provisioning. ![policy csp diagram](images/provisioning-csp-policy.png) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 2268695665..64f921aac1 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - AboveLock @@ -14,11 +14,24 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## AboveLock policies +
+
+ AboveLock/AllowActionCenterNotifications +
+
+ AboveLock/AllowCortanaAboveLock +
+
+ AboveLock/AllowToasts +
+
+ +
**AboveLock/AllowActionCenterNotifications** @@ -45,6 +58,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -60,6 +82,7 @@ ms.date: 08/30/2017 +
**AboveLock/AllowCortanaAboveLock** @@ -86,6 +109,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. @@ -96,6 +128,7 @@ ms.date: 08/30/2017 +


**AboveLock/AllowToasts** @@ -122,6 +155,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether to allow toast notifications above the device lock screen. diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index f2e678427b..cbec351d99 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Accounts @@ -14,11 +14,27 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Accounts policies +
+
+ Accounts/AllowAddingNonMicrosoftAccountsManually +
+
+ Accounts/AllowMicrosoftAccountConnection +
+
+ Accounts/AllowMicrosoftAccountSignInAssistant +
+
+ Accounts/DomainNamesForEmailSync +
+
+ +
**Accounts/AllowAddingNonMicrosoftAccountsManually** @@ -45,6 +61,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether user is allowed to add non-MSA email accounts. @@ -60,6 +85,7 @@ ms.date: 08/30/2017 +


**Accounts/AllowMicrosoftAccountConnection** @@ -86,6 +112,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. @@ -98,6 +133,7 @@ ms.date: 08/30/2017 +


**Accounts/AllowMicrosoftAccountSignInAssistant** @@ -124,6 +160,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. @@ -134,6 +179,7 @@ ms.date: 08/30/2017 +


**Accounts/DomainNamesForEmailSync** @@ -160,6 +206,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies a list of the domains that are allowed to sync email on the device. diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 755aeb5a2e..d01ca2a458 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - ActiveXControls @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## ActiveXControls policies +
+
+ ActiveXControls/ApprovedInstallationSites +
+
+ +
**ActiveXControls/ApprovedInstallationSites** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved Activex Install sites specified by host URL. diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 838ad9fbc8..4e71e25975 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - ApplicationDefaults @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## ApplicationDefaults policies +
+
+ ApplicationDefaults/DefaultAssociationsConfiguration +
+
+ +
**ApplicationDefaults/DefaultAssociationsConfiguration** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index db13ecc123..7953580ab4 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - ApplicationManagement @@ -14,11 +14,48 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## ApplicationManagement policies +
+
+ ApplicationManagement/AllowAllTrustedApps +
+
+ ApplicationManagement/AllowAppStoreAutoUpdate +
+
+ ApplicationManagement/AllowDeveloperUnlock +
+
+ ApplicationManagement/AllowGameDVR +
+
+ ApplicationManagement/AllowSharedUserAppData +
+
+ ApplicationManagement/AllowStore +
+
+ ApplicationManagement/ApplicationRestrictions +
+
+ ApplicationManagement/DisableStoreOriginatedApps +
+
+ ApplicationManagement/RequirePrivateStoreOnly +
+
+ ApplicationManagement/RestrictAppDataToSystemVolume +
+
+ ApplicationManagement/RestrictAppToSystemVolume +
+
+ +
**ApplicationManagement/AllowAllTrustedApps** @@ -45,6 +82,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether non Windows Store apps are allowed. @@ -58,6 +104,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/AllowAppStoreAutoUpdate** @@ -84,6 +131,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether automatic update of apps from Windows Store are allowed. @@ -96,6 +152,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/AllowDeveloperUnlock** @@ -122,6 +179,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether developer unlock is allowed. @@ -135,6 +201,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/AllowGameDVR** @@ -161,6 +228,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -176,6 +252,7 @@ ms.date: 08/30/2017 +
**ApplicationManagement/AllowSharedUserAppData** @@ -202,6 +279,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether multiple users of the same app can share data. @@ -214,6 +300,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/AllowStore** @@ -240,6 +327,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether app store is allowed at the device. @@ -252,6 +348,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/ApplicationRestrictions** @@ -278,6 +375,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. @@ -305,6 +411,7 @@ ms.date: 08/30/2017 +
**ApplicationManagement/DisableStoreOriginatedApps** @@ -331,6 +438,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Windows Store that came pre-installed or were downloaded. @@ -341,6 +457,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/RequirePrivateStoreOnly** @@ -367,6 +484,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ +

Allows disabling of the retail catalog and only enables the Private store. @@ -388,6 +514,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/RestrictAppDataToSystemVolume** @@ -414,6 +541,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether application data is restricted to the system drive. @@ -426,6 +562,7 @@ ms.date: 08/30/2017 +


**ApplicationManagement/RestrictAppToSystemVolume** @@ -452,6 +589,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether the installation of applications is restricted to the system drive. diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index e44fda0b34..512cbecf60 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - AppVirtualization @@ -14,11 +14,99 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## AppVirtualization policies +
+
+ AppVirtualization/AllowAppVClient +
+
+ AppVirtualization/AllowDynamicVirtualization +
+
+ AppVirtualization/AllowPackageCleanup +
+
+ AppVirtualization/AllowPackageScripts +
+
+ AppVirtualization/AllowPublishingRefreshUX +
+
+ AppVirtualization/AllowReportingServer +
+
+ AppVirtualization/AllowRoamingFileExclusions +
+
+ AppVirtualization/AllowRoamingRegistryExclusions +
+
+ AppVirtualization/AllowStreamingAutoload +
+
+ AppVirtualization/ClientCoexistenceAllowMigrationmode +
+
+ AppVirtualization/IntegrationAllowRootGlobal +
+
+ AppVirtualization/IntegrationAllowRootUser +
+
+ AppVirtualization/PublishingAllowServer1 +
+
+ AppVirtualization/PublishingAllowServer2 +
+
+ AppVirtualization/PublishingAllowServer3 +
+
+ AppVirtualization/PublishingAllowServer4 +
+
+ AppVirtualization/PublishingAllowServer5 +
+
+ AppVirtualization/StreamingAllowCertificateFilterForClient_SSL +
+
+ AppVirtualization/StreamingAllowHighCostLaunch +
+
+ AppVirtualization/StreamingAllowLocationProvider +
+
+ AppVirtualization/StreamingAllowPackageInstallationRoot +
+
+ AppVirtualization/StreamingAllowPackageSourceRoot +
+
+ AppVirtualization/StreamingAllowReestablishmentInterval +
+
+ AppVirtualization/StreamingAllowReestablishmentRetries +
+
+ AppVirtualization/StreamingSharedContentStoreMode +
+
+ AppVirtualization/StreamingSupportBranchCache +
+
+ AppVirtualization/StreamingVerifyCertificateRevocationList +
+
+ AppVirtualization/VirtualComponentsAllowList +
+
+ +
**AppVirtualization/AllowAppVClient** @@ -45,6 +133,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting allows you to enable or disable Microsoft Application Virtualization (App-V) feature. Reboot is needed for disable to take effect. @@ -65,6 +162,7 @@ ADMX Info: +
**AppVirtualization/AllowDynamicVirtualization** @@ -91,6 +189,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Enables Dynamic Virtualization of supported shell extensions, browser helper objects, and ActiveX controls. @@ -111,6 +218,7 @@ ADMX Info: +
**AppVirtualization/AllowPackageCleanup** @@ -137,6 +245,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Enables automatic cleanup of appv packages that were added after Windows10 anniversary release. @@ -157,6 +274,7 @@ ADMX Info: +
**AppVirtualization/AllowPackageScripts** @@ -183,6 +301,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Enables scripts defined in the package manifest of configuration files that should run. @@ -203,6 +330,7 @@ ADMX Info: +
**AppVirtualization/AllowPublishingRefreshUX** @@ -229,6 +357,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Enables a UX to display to the user when a publishing refresh is performed on the client. @@ -249,6 +386,7 @@ ADMX Info: +
**AppVirtualization/AllowReportingServer** @@ -275,6 +413,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Reporting Server URL: Displays the URL of reporting server. @@ -305,6 +452,7 @@ ADMX Info: +
**AppVirtualization/AllowRoamingFileExclusions** @@ -331,6 +479,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. @@ -351,6 +508,7 @@ ADMX Info: +
**AppVirtualization/AllowRoamingRegistryExclusions** @@ -377,6 +535,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the registry paths that do not roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. @@ -397,6 +564,7 @@ ADMX Info: +
**AppVirtualization/AllowStreamingAutoload** @@ -423,6 +591,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies how new packages should be loaded automatically by App-V on a specific computer. @@ -443,6 +620,7 @@ ADMX Info: +
**AppVirtualization/ClientCoexistenceAllowMigrationmode** @@ -469,6 +647,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Migration mode allows the App-V client to modify shortcuts and FTA's for packages created using a previous version of App-V. @@ -489,6 +676,7 @@ ADMX Info: +
**AppVirtualization/IntegrationAllowRootGlobal** @@ -515,6 +703,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. @@ -535,6 +732,7 @@ ADMX Info: +
**AppVirtualization/IntegrationAllowRootUser** @@ -561,6 +759,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. @@ -581,6 +788,7 @@ ADMX Info: +
**AppVirtualization/PublishingAllowServer1** @@ -607,6 +815,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Publishing Server Display Name: Displays the name of publishing server. @@ -645,6 +862,7 @@ ADMX Info: +
**AppVirtualization/PublishingAllowServer2** @@ -671,6 +889,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Publishing Server Display Name: Displays the name of publishing server. @@ -709,6 +936,7 @@ ADMX Info: +
**AppVirtualization/PublishingAllowServer3** @@ -735,6 +963,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Publishing Server Display Name: Displays the name of publishing server. @@ -773,6 +1010,7 @@ ADMX Info: +
**AppVirtualization/PublishingAllowServer4** @@ -799,6 +1037,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Publishing Server Display Name: Displays the name of publishing server. @@ -837,6 +1084,7 @@ ADMX Info: +
**AppVirtualization/PublishingAllowServer5** @@ -863,6 +1111,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Publishing Server Display Name: Displays the name of publishing server. @@ -901,6 +1158,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** @@ -927,6 +1185,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the path to a valid certificate in the certificate store. @@ -947,6 +1214,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowHighCostLaunch** @@ -973,6 +1241,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This setting controls whether virtualized applications are launched on Windows 8 machines connected via a metered network connection (e.g. 4G). @@ -993,6 +1270,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowLocationProvider** @@ -1019,6 +1297,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. @@ -1039,6 +1326,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowPackageInstallationRoot** @@ -1065,6 +1353,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies directory where all new applications and updates will be installed. @@ -1085,6 +1382,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowPackageSourceRoot** @@ -1111,6 +1409,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Overrides source location for downloading package content. @@ -1131,6 +1438,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowReestablishmentInterval** @@ -1157,6 +1465,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the number of seconds between attempts to reestablish a dropped session. @@ -1177,6 +1494,7 @@ ADMX Info: +
**AppVirtualization/StreamingAllowReestablishmentRetries** @@ -1203,6 +1521,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies the number of times to retry a dropped session. @@ -1223,6 +1550,7 @@ ADMX Info: +
**AppVirtualization/StreamingSharedContentStoreMode** @@ -1249,6 +1577,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies that streamed package contents will be not be saved to the local hard disk. @@ -1269,6 +1606,7 @@ ADMX Info: +
**AppVirtualization/StreamingSupportBranchCache** @@ -1295,6 +1633,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support is not desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache @@ -1315,6 +1662,7 @@ ADMX Info: +
**AppVirtualization/StreamingVerifyCertificateRevocationList** @@ -1341,6 +1689,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Verifies Server certificate revocation status before streaming using HTTPS. @@ -1361,6 +1718,7 @@ ADMX Info: +
**AppVirtualization/VirtualComponentsAllowList** @@ -1387,6 +1745,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Specifies a list of process paths (may contain wildcards) which are candidates for using virtual components (shell extensions, browser helper objects, etc). Only processes whose full path matches one of these items can use virtual components. diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index 202f7f324a..19b60c53f6 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - AttachmentManager @@ -14,11 +14,24 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## AttachmentManager policies +
+
+ AttachmentManager/DoNotPreserveZoneInformation +
+
+ AttachmentManager/HideZoneInfoMechanism +
+
+ AttachmentManager/NotifyAntivirusPrograms +
+
+ +
**AttachmentManager/DoNotPreserveZoneInformation** @@ -45,6 +58,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows cannot make proper risk assessments. @@ -71,6 +93,7 @@ ADMX Info: +
**AttachmentManager/HideZoneInfoMechanism** @@ -97,6 +120,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + This policy setting allows you to manage whether users can manually remove the zone information from saved file attachments by clicking the Unblock button in the file's property sheet or by using a check box in the security warning dialog. Removing the zone information allows users to open potentially dangerous file attachments that Windows has blocked users from opening. @@ -123,6 +155,7 @@ ADMX Info: +
**AttachmentManager/NotifyAntivirusPrograms** @@ -149,6 +182,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are registered, they will all be notified. If the registered antivirus program already performs on-access checks or scans files as they arrive on the computer's email server, additional calls would be redundant. diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 3c483fb097..d33bbd648c 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 09/06/2017 +ms.date: 09/29/2017 --- # Policy CSP - Authentication @@ -14,11 +14,27 @@ ms.date: 09/06/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Authentication policies +
+
+ Authentication/AllowAadPasswordReset +
+
+ Authentication/AllowEAPCertSSO +
+
+ Authentication/AllowFastReconnect +
+
+ Authentication/AllowSecondaryAuthenticationDevice +
+
+ +
**Authentication/AllowAadPasswordReset** @@ -45,6 +61,15 @@ ms.date: 09/06/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen.  @@ -55,6 +80,7 @@ ms.date: 09/06/2017 +


**Authentication/AllowEAPCertSSO** @@ -81,6 +107,15 @@ ms.date: 09/06/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ +

Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. @@ -98,6 +133,7 @@ ms.date: 09/06/2017 +


**Authentication/AllowFastReconnect** @@ -124,6 +160,15 @@ ms.date: 09/06/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Allows EAP Fast Reconnect from being attempted for EAP Method TLS. @@ -136,6 +181,7 @@ ms.date: 09/06/2017 +


**Authentication/AllowSecondaryAuthenticationDevice** @@ -162,6 +208,15 @@ ms.date: 09/06/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index daac26b55d..f63666cdc6 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Autoplay @@ -14,11 +14,24 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Autoplay policies +
+
+ Autoplay/DisallowAutoplayForNonVolumeDevices +
+
+ Autoplay/SetDefaultAutoRunBehavior +
+
+ Autoplay/TurnOffAutoPlay +
+
+ +
**Autoplay/DisallowAutoplayForNonVolumeDevices** @@ -45,6 +58,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + This policy setting disallows AutoPlay for MTP devices like cameras or phones. @@ -69,6 +92,7 @@ ADMX Info: +
**Autoplay/SetDefaultAutoRunBehavior** @@ -95,6 +119,16 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + This policy setting sets the default behavior for Autorun commands. @@ -128,6 +162,7 @@ ADMX Info: +
**Autoplay/TurnOffAutoPlay** @@ -154,6 +189,16 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + This policy setting allows you to turn off the Autoplay feature. diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 1220f63607..3d4c5bac81 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Bitlocker @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Bitlocker policies +
+
+ Bitlocker/EncryptionMethod +
+
+ +
**Bitlocker/EncryptionMethod** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies the BitLocker Drive Encryption method and cipher strength. diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 7bd2ea4992..d874f9ffa2 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Bluetooth @@ -14,11 +14,30 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Bluetooth policies +
+
+ Bluetooth/AllowAdvertising +
+
+ Bluetooth/AllowDiscoverableMode +
+
+ Bluetooth/AllowPrepairing +
+
+ Bluetooth/LocalDeviceName +
+
+ Bluetooth/ServicesAllowedList +
+
+ +
**Bluetooth/AllowAdvertising** @@ -45,6 +64,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether the device can send out Bluetooth advertisements. @@ -59,6 +87,7 @@ ms.date: 08/30/2017 +


**Bluetooth/AllowDiscoverableMode** @@ -85,6 +114,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether other Bluetooth-enabled devices can discover the device. @@ -99,6 +137,7 @@ ms.date: 08/30/2017 +


**Bluetooth/AllowPrepairing** @@ -125,6 +164,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. @@ -135,6 +183,7 @@ ms.date: 08/30/2017 +


**Bluetooth/LocalDeviceName** @@ -161,6 +210,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Sets the local Bluetooth device name. @@ -170,6 +228,7 @@ ms.date: 08/30/2017 +


**Bluetooth/ServicesAllowedList** @@ -196,6 +255,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 82c992e8eb..2c7f399858 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Browser @@ -14,11 +14,123 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Browser policies +
+
+ Browser/AllowAddressBarDropdown +
+
+ Browser/AllowAutofill +
+
+ Browser/AllowBrowser +
+
+ Browser/AllowCookies +
+
+ Browser/AllowDeveloperTools +
+
+ Browser/AllowDoNotTrack +
+
+ Browser/AllowExtensions +
+
+ Browser/AllowFlash +
+
+ Browser/AllowFlashClickToRun +
+
+ Browser/AllowInPrivate +
+
+ Browser/AllowMicrosoftCompatibilityList +
+
+ Browser/AllowPasswordManager +
+
+ Browser/AllowPopups +
+
+ Browser/AllowSearchEngineCustomization +
+
+ Browser/AllowSearchSuggestionsinAddressBar +
+
+ Browser/AllowSmartScreen +
+
+ Browser/AlwaysEnableBooksLibrary +
+
+ Browser/ClearBrowsingDataOnExit +
+
+ Browser/ConfigureAdditionalSearchEngines +
+
+ Browser/DisableLockdownOfStartPages +
+
+ Browser/EnterpriseModeSiteList +
+
+ Browser/EnterpriseSiteListServiceUrl +
+
+ Browser/FirstRunURL +
+
+ Browser/HomePages +
+
+ Browser/LockdownFavorites +
+
+ Browser/PreventAccessToAboutFlagsInMicrosoftEdge +
+
+ Browser/PreventFirstRunPage +
+
+ Browser/PreventLiveTileDataCollection +
+
+ Browser/PreventSmartScreenPromptOverride +
+
+ Browser/PreventSmartScreenPromptOverrideForFiles +
+
+ Browser/PreventUsingLocalHostIPAddressForWebRTC +
+
+ Browser/ProvisionFavorites +
+
+ Browser/SendIntranetTraffictoInternetExplorer +
+
+ Browser/SetDefaultSearchEngine +
+
+ Browser/ShowMessageWhenOpeningSitesInInternetExplorer +
+
+ Browser/SyncFavoritesBetweenIEAndMicrosoftEdge +
+
+ +
**Browser/AllowAddressBarDropdown** @@ -45,6 +157,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  @@ -60,6 +182,7 @@ ms.date: 08/30/2017 +


**Browser/AllowAutofill** @@ -86,6 +209,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether autofill on websites is allowed. @@ -105,6 +238,7 @@ ms.date: 08/30/2017 +


**Browser/AllowBrowser** @@ -131,6 +265,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. @@ -149,6 +293,7 @@ ms.date: 08/30/2017 +
**Browser/AllowCookies** @@ -175,6 +320,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether cookies are allowed. @@ -194,6 +349,7 @@ ms.date: 08/30/2017 +


**Browser/AllowDeveloperTools** @@ -220,6 +376,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -236,6 +402,7 @@ ms.date: 08/30/2017 +
**Browser/AllowDoNotTrack** @@ -262,6 +429,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether Do Not Track headers are allowed. @@ -281,6 +458,7 @@ ms.date: 08/30/2017 +


**Browser/AllowExtensions** @@ -307,6 +485,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. @@ -317,6 +505,7 @@ ms.date: 08/30/2017 +


**Browser/AllowFlash** @@ -343,6 +532,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. @@ -353,6 +552,7 @@ ms.date: 08/30/2017 +


**Browser/AllowFlashClickToRun** @@ -379,6 +579,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. @@ -389,6 +599,7 @@ ms.date: 08/30/2017 +


**Browser/AllowInPrivate** @@ -415,6 +626,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether InPrivate browsing is allowed on corporate networks. @@ -427,6 +648,7 @@ ms.date: 08/30/2017 +


**Browser/AllowMicrosoftCompatibilityList** @@ -453,6 +675,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. By default, the Microsoft compatibility list is enabled and can be viewed by visiting "about:compat". @@ -468,6 +700,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AllowPasswordManager** @@ -494,6 +727,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether saving and managing passwords locally on the device is allowed. @@ -513,6 +756,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AllowPopups** @@ -539,6 +783,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether pop-up blocker is allowed or enabled. @@ -558,6 +812,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AllowSearchEngineCustomization** @@ -584,6 +839,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.     @@ -598,6 +863,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AllowSearchSuggestionsinAddressBar** @@ -624,6 +890,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether search suggestions are allowed in the address bar. @@ -636,6 +912,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AllowSmartScreen** @@ -662,6 +939,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether Windows Defender SmartScreen is allowed. @@ -681,9 +968,20 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/AlwaysEnableBooksLibrary** + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

@@ -691,6 +989,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/ClearBrowsingDataOnExit** @@ -717,6 +1016,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. @@ -735,6 +1044,7 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis +


**Browser/ConfigureAdditionalSearchEngines** @@ -761,6 +1071,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.    @@ -781,6 +1101,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/DisableLockdownOfStartPages** @@ -807,6 +1128,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.     @@ -825,6 +1156,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/EnterpriseModeSiteList** @@ -851,6 +1183,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -865,6 +1207,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/EnterpriseSiteListServiceUrl** @@ -891,12 +1234,23 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!IMPORTANT] > This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist). +
**Browser/FirstRunURL** @@ -923,6 +1277,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -936,6 +1300,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/HomePages** @@ -962,6 +1327,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only available for Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -977,6 +1352,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/LockdownFavorites** @@ -1003,6 +1379,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. @@ -1022,6 +1408,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventAccessToAboutFlagsInMicrosoftEdge** @@ -1048,6 +1435,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. @@ -1058,6 +1455,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventFirstRunPage** @@ -1084,6 +1482,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. @@ -1096,6 +1504,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventLiveTileDataCollection** @@ -1122,6 +1531,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. @@ -1134,6 +1553,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventSmartScreenPromptOverride** @@ -1160,6 +1580,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. @@ -1172,6 +1602,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventSmartScreenPromptOverrideForFiles** @@ -1198,6 +1629,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. @@ -1208,6 +1649,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/PreventUsingLocalHostIPAddressForWebRTC** @@ -1234,6 +1676,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -1248,6 +1700,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/ProvisionFavorites** @@ -1274,6 +1727,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines.   @@ -1292,6 +1755,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/SendIntranetTraffictoInternetExplorer** @@ -1318,6 +1782,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -1334,6 +1808,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/SetDefaultSearchEngine** @@ -1360,6 +1835,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. @@ -1379,6 +1864,7 @@ Employees cannot remove these search engines, but they can set any one as the de +


**Browser/ShowMessageWhenOpeningSitesInInternetExplorer** @@ -1405,6 +1891,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -1421,6 +1917,7 @@ Employees cannot remove these search engines, but they can set any one as the de +
**Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** @@ -1447,6 +1944,16 @@ Employees cannot remove these search engines, but they can set any one as the de + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ +

Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index ca7b98ecc5..ce33fa4faa 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Camera @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Camera policies +
+
+ Camera/AllowCamera +
+
+ +
**Camera/AllowCamera** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Disables or enables the camera. diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index b1c206e118..183748ec41 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Cellular @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## Cellular policies +
+
+ Cellular/ShowAppCellularAccessUI +
+
+ +
**Cellular/ShowAppCellularAccessUI** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 5ffa503ab6..415ebf1eac 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Connectivity @@ -14,11 +14,54 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Connectivity policies +
+
+ Connectivity/AllowBluetooth +
+
+ Connectivity/AllowCellularData +
+
+ Connectivity/AllowCellularDataRoaming +
+
+ Connectivity/AllowConnectedDevices +
+
+ Connectivity/AllowNFC +
+
+ Connectivity/AllowUSBConnection +
+
+ Connectivity/AllowVPNOverCellular +
+
+ Connectivity/AllowVPNRoamingOverCellular +
+
+ Connectivity/DiablePrintingOverHTTP +
+
+ Connectivity/DisableDownloadingOfPrintDriversOverHTTP +
+
+ Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards +
+
+ Connectivity/HardenedUNCPaths +
+
+ Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge +
+
+ +
**Connectivity/AllowBluetooth** @@ -45,6 +88,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Allows the user to enable Bluetooth or restrict access. @@ -64,6 +116,7 @@ ms.date: 08/30/2017 +


**Connectivity/AllowCellularData** @@ -90,6 +143,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. @@ -101,6 +163,7 @@ ms.date: 08/30/2017 +


**Connectivity/AllowCellularDataRoaming** @@ -127,6 +190,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. @@ -148,6 +220,7 @@ ms.date: 08/30/2017 +


**Connectivity/AllowConnectedDevices** @@ -174,6 +247,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy requires reboot to take effect. @@ -187,6 +269,7 @@ ms.date: 08/30/2017 +
**Connectivity/AllowNFC** @@ -213,6 +296,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -229,6 +321,7 @@ ms.date: 08/30/2017 +
**Connectivity/AllowUSBConnection** @@ -255,6 +348,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -273,6 +375,7 @@ ms.date: 08/30/2017 +
**Connectivity/AllowVPNOverCellular** @@ -299,6 +402,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Specifies what type of underlying connections VPN is allowed to use. @@ -311,6 +423,7 @@ ms.date: 08/30/2017 +


**Connectivity/AllowVPNRoamingOverCellular** @@ -337,6 +450,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Prevents the device from connecting to VPN when the device roams over cellular networks. @@ -349,6 +471,7 @@ ms.date: 08/30/2017 +


**Connectivity/DiablePrintingOverHTTP** @@ -375,6 +498,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!TIP] @@ -393,6 +525,7 @@ ADMX Info: +
**Connectivity/DisableDownloadingOfPrintDriversOverHTTP** @@ -419,6 +552,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!TIP] @@ -437,6 +579,7 @@ ADMX Info: +
**Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards** @@ -463,6 +606,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!TIP] @@ -481,6 +633,7 @@ ADMX Info: +
**Connectivity/HardenedUNCPaths** @@ -507,6 +660,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting configures secure access to UNC paths. @@ -529,6 +691,7 @@ ADMX Info: +
**Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge** @@ -555,6 +718,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index e253febdf8..5274de917b 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - CredentialProviders @@ -14,11 +14,24 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## CredentialProviders policies +
+
+ CredentialProviders/AllowPINLogon +
+
+ CredentialProviders/BlockPicturePassword +
+
+ CredentialProviders/DisableAutomaticReDeploymentCredentials +
+
+ +
**CredentialProviders/AllowPINLogon** @@ -45,6 +58,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting allows you to control whether a domain user can sign in using a convenience PIN. @@ -73,6 +95,7 @@ ADMX Info: +
**CredentialProviders/BlockPicturePassword** @@ -99,6 +122,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting allows you to control whether a domain user can sign in using a picture password. @@ -125,6 +157,7 @@ ADMX Info: +
**CredentialProviders/DisableAutomaticReDeploymentCredentials** @@ -151,6 +184,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Added in Windows 10, version 1709. Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index 15d68cf69e..1b7955f4e5 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - CredentialsUI @@ -14,11 +14,21 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## CredentialsUI policies +
+
+ CredentialsUI/DisablePasswordReveal +
+
+ CredentialsUI/EnumerateAdministrators +
+
+ +
**CredentialsUI/DisablePasswordReveal** @@ -45,6 +55,16 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User +> * Device + +
+ + This policy setting allows you to configure the display of the password reveal button in password entry user experiences. @@ -73,6 +93,7 @@ ADMX Info: +
**CredentialsUI/EnumerateAdministrators** @@ -99,6 +120,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application. diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index eef7cdeba4..9c5f328c19 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Cryptography @@ -14,11 +14,21 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Cryptography policies +
+
+ Cryptography/AllowFipsAlgorithmPolicy +
+
+ Cryptography/TLSCipherSuites +
+
+ +
**Cryptography/AllowFipsAlgorithmPolicy** @@ -45,6 +55,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Allows or disallows the Federal Information Processing Standard (FIPS) policy. @@ -55,6 +74,7 @@ ms.date: 08/30/2017 +


**Cryptography/TLSCipherSuites** @@ -81,6 +101,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index edba750722..1261f2c311 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - DataProtection @@ -14,11 +14,21 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -


+ ## DataProtection policies +
+
+ DataProtection/AllowDirectMemoryAccess +
+
+ DataProtection/LegacySelectiveWipeID +
+
+ +
**DataProtection/AllowDirectMemoryAccess** @@ -45,6 +55,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +

This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. @@ -57,6 +76,7 @@ ms.date: 08/30/2017 +


**DataProtection/LegacySelectiveWipeID** @@ -83,6 +103,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!IMPORTANT] > This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time. diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index a8724cc2f6..540a7d26a6 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - DataUsage @@ -14,11 +14,21 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## DataUsage policies +
+
+ DataUsage/SetCost3G +
+
+ DataUsage/SetCost4G +
+
+ +
**DataUsage/SetCost3G** @@ -45,6 +55,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting configures the cost of 3G connections on the local machine. @@ -75,6 +94,7 @@ ADMX Info: +
**DataUsage/SetCost4G** @@ -101,6 +121,15 @@ ADMX Info: + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + This policy setting configures the cost of 4G connections on the local machine. diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index 3f35e2d4eb..9d75a9f6fa 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Defender @@ -14,11 +14,120 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Defender policies +
+
+ Defender/AllowArchiveScanning +
+
+ Defender/AllowBehaviorMonitoring +
+
+ Defender/AllowCloudProtection +
+
+ Defender/AllowEmailScanning +
+
+ Defender/AllowFullScanOnMappedNetworkDrives +
+
+ Defender/AllowFullScanRemovableDriveScanning +
+
+ Defender/AllowIOAVProtection +
+
+ Defender/AllowIntrusionPreventionSystem +
+
+ Defender/AllowOnAccessProtection +
+
+ Defender/AllowRealtimeMonitoring +
+
+ Defender/AllowScanningNetworkFiles +
+
+ Defender/AllowScriptScanning +
+
+ Defender/AllowUserUIAccess +
+
+ Defender/AttackSurfaceReductionOnlyExclusions +
+
+ Defender/AttackSurfaceReductionRules +
+
+ Defender/AvgCPULoadFactor +
+
+ Defender/CloudBlockLevel +
+
+ Defender/CloudExtendedTimeout +
+
+ Defender/ControlledFolderAccessAllowedApplications +
+
+ Defender/ControlledFolderAccessProtectedFolders +
+
+ Defender/DaysToRetainCleanedMalware +
+
+ Defender/EnableControlledFolderAccess +
+
+ Defender/EnableNetworkProtection +
+
+ Defender/ExcludedExtensions +
+
+ Defender/ExcludedPaths +
+
+ Defender/ExcludedProcesses +
+
+ Defender/PUAProtection +
+
+ Defender/RealTimeScanDirection +
+
+ Defender/ScanParameter +
+
+ Defender/ScheduleQuickScanTime +
+
+ Defender/ScheduleScanDay +
+
+ Defender/ScheduleScanTime +
+
+ Defender/SignatureUpdateInterval +
+
+ Defender/SubmitSamplesConsent +
+
+ Defender/ThreatSeverityDefaultAction +
+
+ +
**Defender/AllowArchiveScanning** @@ -45,6 +154,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -59,6 +177,7 @@ ms.date: 08/30/2017 +
**Defender/AllowBehaviorMonitoring** @@ -85,6 +204,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -99,6 +227,7 @@ ms.date: 08/30/2017 +
**Defender/AllowCloudProtection** @@ -125,6 +254,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -139,6 +277,7 @@ ms.date: 08/30/2017 +
**Defender/AllowEmailScanning** @@ -165,6 +304,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -179,6 +327,7 @@ ms.date: 08/30/2017 +
**Defender/AllowFullScanOnMappedNetworkDrives** @@ -205,6 +354,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -219,6 +377,7 @@ ms.date: 08/30/2017 +
**Defender/AllowFullScanRemovableDriveScanning** @@ -245,6 +404,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -259,6 +427,7 @@ ms.date: 08/30/2017 +
**Defender/AllowIOAVProtection** @@ -285,6 +454,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -299,6 +477,7 @@ ms.date: 08/30/2017 +
**Defender/AllowIntrusionPreventionSystem** @@ -325,6 +504,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -339,6 +527,7 @@ ms.date: 08/30/2017 +
**Defender/AllowOnAccessProtection** @@ -365,6 +554,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -379,6 +577,7 @@ ms.date: 08/30/2017 +
**Defender/AllowRealtimeMonitoring** @@ -405,6 +604,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -419,6 +627,7 @@ ms.date: 08/30/2017 +
**Defender/AllowScanningNetworkFiles** @@ -445,6 +654,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -459,6 +677,7 @@ ms.date: 08/30/2017 +
**Defender/AllowScriptScanning** @@ -485,6 +704,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -499,6 +727,7 @@ ms.date: 08/30/2017 +
**Defender/AllowUserUIAccess** @@ -525,6 +754,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -539,6 +777,7 @@ ms.date: 08/30/2017 +
**Defender/AttackSurfaceReductionOnlyExclusions** @@ -565,6 +804,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -576,6 +824,7 @@ ms.date: 08/30/2017 +
**Defender/AttackSurfaceReductionRules** @@ -602,6 +851,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -615,6 +873,7 @@ ms.date: 08/30/2017 +
**Defender/AvgCPULoadFactor** @@ -641,6 +900,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -654,6 +922,7 @@ ms.date: 08/30/2017 +
**Defender/CloudBlockLevel** @@ -680,6 +949,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -703,6 +981,7 @@ ms.date: 08/30/2017 +
**Defender/CloudExtendedTimeout** @@ -729,6 +1008,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -744,6 +1032,7 @@ ms.date: 08/30/2017 +
**Defender/ControlledFolderAccessAllowedApplications** @@ -770,6 +1059,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersAllowedApplications and changed to ControlledFolderAccessAllowedApplications. @@ -778,6 +1076,7 @@ ms.date: 08/30/2017 +
**Defender/ControlledFolderAccessProtectedFolders** @@ -804,6 +1103,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersList and changed to ControlledFolderAccessProtectedFolders. @@ -812,6 +1120,7 @@ ms.date: 08/30/2017 +
**Defender/DaysToRetainCleanedMalware** @@ -838,6 +1147,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -851,6 +1169,7 @@ ms.date: 08/30/2017 +
**Defender/EnableControlledFolderAccess** @@ -877,6 +1196,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess. @@ -889,6 +1217,7 @@ ms.date: 08/30/2017 +
**Defender/EnableNetworkProtection** @@ -915,6 +1244,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -935,6 +1273,7 @@ ms.date: 08/30/2017 +
**Defender/ExcludedExtensions** @@ -961,6 +1300,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -970,6 +1318,7 @@ ms.date: 08/30/2017 +
**Defender/ExcludedPaths** @@ -996,6 +1345,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1005,6 +1363,7 @@ ms.date: 08/30/2017 +
**Defender/ExcludedProcesses** @@ -1031,6 +1390,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1046,6 +1414,7 @@ ms.date: 08/30/2017 +
**Defender/PUAProtection** @@ -1072,6 +1441,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1087,6 +1465,7 @@ ms.date: 08/30/2017 +
**Defender/RealTimeScanDirection** @@ -1113,6 +1492,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1132,6 +1520,7 @@ ms.date: 08/30/2017 +
**Defender/ScanParameter** @@ -1158,6 +1547,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1172,6 +1570,7 @@ ms.date: 08/30/2017 +
**Defender/ScheduleQuickScanTime** @@ -1198,6 +1597,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1217,6 +1625,7 @@ ms.date: 08/30/2017 +
**Defender/ScheduleScanDay** @@ -1243,6 +1652,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1268,6 +1686,7 @@ ms.date: 08/30/2017 +
**Defender/ScheduleScanTime** @@ -1294,6 +1713,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1313,6 +1741,7 @@ ms.date: 08/30/2017 +
**Defender/SignatureUpdateInterval** @@ -1339,6 +1768,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1354,6 +1792,7 @@ ms.date: 08/30/2017 +
**Defender/SubmitSamplesConsent** @@ -1380,6 +1819,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1396,6 +1844,7 @@ ms.date: 08/30/2017 +
**Defender/ThreatSeverityDefaultAction** @@ -1422,6 +1871,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index e352718a5d..f001c4ea3e 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - DeliveryOptimization @@ -14,11 +14,63 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## DeliveryOptimization policies +
+
+ DeliveryOptimization/DOAbsoluteMaxCacheSize +
+
+ DeliveryOptimization/DOAllowVPNPeerCaching +
+
+ DeliveryOptimization/DODownloadMode +
+
+ DeliveryOptimization/DOGroupId +
+
+ DeliveryOptimization/DOMaxCacheAge +
+
+ DeliveryOptimization/DOMaxCacheSize +
+
+ DeliveryOptimization/DOMaxDownloadBandwidth +
+
+ DeliveryOptimization/DOMaxUploadBandwidth +
+
+ DeliveryOptimization/DOMinBackgroundQos +
+
+ DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload +
+
+ DeliveryOptimization/DOMinDiskSizeAllowedToPeer +
+
+ DeliveryOptimization/DOMinFileSizeToCache +
+
+ DeliveryOptimization/DOMinRAMAllowedToPeer +
+
+ DeliveryOptimization/DOModifyCacheDrive +
+
+ DeliveryOptimization/DOMonthlyUploadDataCap +
+
+ DeliveryOptimization/DOPercentageMaxDownloadBandwidth +
+
+ +
**DeliveryOptimization/DOAbsoluteMaxCacheSize** @@ -45,6 +97,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -56,6 +117,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOAllowVPNPeerCaching** @@ -82,6 +144,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -93,6 +164,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DODownloadMode** @@ -119,6 +191,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -137,6 +218,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOGroupId** @@ -163,6 +245,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -175,6 +266,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMaxCacheAge** @@ -201,6 +293,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -212,6 +313,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMaxCacheSize** @@ -238,6 +340,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -249,6 +360,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMaxDownloadBandwidth** @@ -275,6 +387,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -286,6 +407,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMaxUploadBandwidth** @@ -312,6 +434,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -323,6 +454,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMinBackgroundQos** @@ -349,6 +481,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -360,6 +501,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** @@ -386,6 +528,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -396,6 +547,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMinDiskSizeAllowedToPeer** @@ -422,6 +574,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -436,6 +597,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMinFileSizeToCache** @@ -462,6 +624,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -473,6 +644,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMinRAMAllowedToPeer** @@ -499,6 +671,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -510,6 +691,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOModifyCacheDrive** @@ -536,6 +718,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -547,6 +738,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOMonthlyUploadDataCap** @@ -573,6 +765,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -586,6 +787,7 @@ ms.date: 08/30/2017 +
**DeliveryOptimization/DOPercentageMaxDownloadBandwidth** @@ -612,6 +814,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index 8a3b89d0f5..8d89bebfb5 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - Desktop @@ -14,11 +14,18 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## Desktop policies +
+
+ Desktop/PreventUserRedirectionOfProfileFolders +
+
+ +
**Desktop/PreventUserRedirectionOfProfileFolders** @@ -45,6 +52,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * User + +
+ + Prevents users from changing the path to their profile folders. diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index df77a218e7..b45125a146 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 08/30/2017 +ms.date: 09/29/2017 --- # Policy CSP - DeviceGuard @@ -14,11 +14,24 @@ ms.date: 08/30/2017 > [!WARNING] > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. -
+ ## DeviceGuard policies +
+
+ DeviceGuard/EnableVirtualizationBasedSecurity +
+
+ DeviceGuard/LsaCfgFlags +
+
+ DeviceGuard/RequirePlatformSecurityFeatures +
+
+ +
**DeviceGuard/EnableVirtualizationBasedSecurity** @@ -45,6 +58,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +  

Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. Supported values: @@ -55,6 +77,7 @@ ms.date: 08/30/2017 +


**DeviceGuard/LsaCfgFlags** @@ -81,6 +104,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ +  

Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. Supported values: @@ -93,6 +125,7 @@ ms.date: 08/30/2017 +


**DeviceGuard/RequirePlatformSecurityFeatures** @@ -119,6 +152,15 @@ ms.date: 08/30/2017 + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. Supported values: