mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'main' of github.com:MicrosoftDocs/windows-docs-pr into pm-8744759-store
This commit is contained in:
commit
3e1dc1e2fe
@ -11,7 +11,7 @@ manager: aaroncz
|
||||
appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
ms.date: 12/06/2023
|
||||
ms.date: 03/12/2024
|
||||
---
|
||||
|
||||
# UCClient
|
||||
@ -35,7 +35,6 @@ UCClient acts as an individual device's record. It contains data such as the cur
|
||||
| **IsVirtual** | [bool](/azure/data-explorer/kusto/query/scalar-data-types/bool) | No | `Yes, No` | Whether device is a virtual device. |
|
||||
| **LastCensusScanTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The last time this device performed a successful census scan, if any. |
|
||||
| **LastWUScanTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | The last time this device performed a successful Windows Update scan, if any. |
|
||||
| **NewTest_CF [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. |
|
||||
| **OSArchitecture** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | Yes | `x86` | The architecture of the operating system (not the device) this device is currently on. |
|
||||
| **OSBuild** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `10.0.22621.1702` | The full operating system build installed on this device, such as Major.Minor.Build.Revision |
|
||||
| **OSBuildNumber** | [int](/azure/kusto/query/scalar-data-types/int) | No | `22621` | The major build number, in int format, the device is using. |
|
||||
@ -62,18 +61,18 @@ UCClient acts as an individual device's record. It contains data such as the cur
|
||||
| **WUAutomaticUpdates** | | No | | Currently, data isn't gathered to populate this field. Manage automatic update behavior to scan, download, and install updates. |
|
||||
| **WUDeadlineNoAutoRestart** | | No | | Currently, data isn't gathered to populate this field. Devices won't automatically restart outside of active hours until the deadline is reached - It's 1 by default and indicates enabled, 0 indicates disabled |
|
||||
| **WUDODownloadMode** | | No | | Currently, data isn't gathered to populate this field. The Windows Update DO DownloadMode configuration. |
|
||||
| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: ConfigureDeadlineForFeatureUpdates. The Windows Update feature update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. |
|
||||
| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: DeferFeatureUpdates. The Windows Update feature update deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the policy setting. |
|
||||
| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | The Windows Update grace period for feature update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. |
|
||||
| **WUFeaturePauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause will end, if activated, else null. |
|
||||
| **WUFeatureDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: ConfigureDeadlineForFeatureUpdates. The feature update deadline configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. |
|
||||
| **WUFeatureDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | CSP: DeferFeatureUpdates. The feature update deferral configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the policy setting. |
|
||||
| **WUFeatureGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | The Windows Update grace period for feature update in days. -1 indicates not configured. 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. |
|
||||
| **WUFeaturePauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause ends, if activated, else null. |
|
||||
| **WUFeaturePauseStartTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update feature update pause was activated, if activated, else null. Feature updates are paused for 35 days from the specified start date. |
|
||||
| **WUFeaturePauseState** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `NotConfigured` | Indicates pause status of device for feature updates. Possible values are Paused, NotPaused, NotConfigured. |
|
||||
| **WUNotificationLevel** | | No | | Currently, data isn't gathered to populate this field. This policy allows you to define what Windows Update notifications users see. 0 (default) - Use the default Windows Update notifications. 1 - Turn off all notifications, excluding restart warnings. 2 - Turn off all notifications, including restart warnings |
|
||||
| **WUPauseUXDisabled** | | No | | Currently, data isn't gathered to populate this field. This policy allows the IT admin to disable the Pause Updates feature. When this policy is enabled, the user can't access the Pause updates' feature. Supported values 0, 1. |
|
||||
| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | CSP: ConfigureDeadlineForQualityUpdates. The Windows update quality update deadline configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. |
|
||||
| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `-1` | CSP: DeferQualityUpdates. The Windows Update quality update deferral configuration in days. -1 indicates not configured, 0 indicates configured but set to 0. Values greater than 0 indicate the policy setting. |
|
||||
| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | The Windows Update grace period for quality update in days. -1 indicates not configured, 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. |
|
||||
| **WUQualityPauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update quality update pause- will end, if activated, else null. |
|
||||
| **WUQualityDeadlineDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `7` | CSP: ConfigureDeadlineForQualityUpdates. The Windows update quality update deadline configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values > 0 indicate the deadline in days. |
|
||||
| **WUQualityDeferralDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `-1` | CSP: DeferQualityUpdates. The Windows Update quality update deferral configuration in days. -1 indicates not configured. 0 indicates configured but set to 0. Values greater than 0 indicate the policy setting. |
|
||||
| **WUQualityGracePeriodDays** | [int](/azure/kusto/query/scalar-data-types/int) | No | `0` | The Windows Update grace period for quality update in days. -1 indicates not configured. 0 indicates configured and set to 0. Values greater than 0 indicate the grace period in days. |
|
||||
| **WUQualityPauseEndTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time the quality update pause ends, if activated, else null. |
|
||||
| **WUQualityPauseStartTime [UTC]** | [datetime](/azure/kusto/query/scalar-data-types/datetime) | No | `2020-05-14 09:26:03.478039` | Currently, data isn't gathered to populate this field. The time Windows Update quality update pause- was activated; if activated; else null. |
|
||||
| **WUQualityPauseState** | [string](/azure/data-explorer/kusto/query/scalar-data-types/string) | No | `NotConfigured` | Indicates pause status of device for quality updates. Possible values are Paused, NotPaused, NotConfigured. |
|
||||
| **WURestartNotification** | | No | | Currently, data isn't gathered to populate this field. Allows the IT Admin to specify the method by which the auto restart required notification is dismissed. The following list shows the supported values: 1 (default) = Auto Dismissal. 2 - User Dismissal. |
|
||||
|
@ -26,6 +26,7 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
|
||||
- csi.exe
|
||||
- dbghost.exe
|
||||
- dbgsvc.exe
|
||||
- dbgsrv.exe
|
||||
- dnx.exe
|
||||
- dotnet.exe
|
||||
- fsi.exe
|
||||
@ -143,6 +144,7 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and
|
||||
<Deny ID="ID_DENY_CSCRIPT" FriendlyName="cscript.exe" FileName="cscript.exe" MinimumFileVersion="5.812.10240.0" />
|
||||
<Deny ID="ID_DENY_DBGHOST" FriendlyName="dbghost.exe" FileName="DBGHOST.Exe" MinimumFileVersion="2.3.0.0" />
|
||||
<Deny ID="ID_DENY_DBGSVC" FriendlyName="dbgsvc.exe" FileName="DBGSVC.Exe" MinimumFileVersion="2.3.0.0" />
|
||||
<Deny ID="ID_DENY_DBGSRV" FriendlyName="dbgsrv.exe" FileName="dbgsrv.exe" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65355.65355.65355.65355" />
|
||||
<Deny ID="ID_DENY_DNX" FriendlyName="dnx.exe" FileName="dnx.Exe" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65355.65355.65355.65355" />
|
||||
<Deny ID="ID_DENY_DOTNET" FriendlyName="dotnet.exe" FileName="dotnet.exe" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65355.65355.65355.65355" />
|
||||
<Deny ID="ID_DENY_FSI" FriendlyName="fsi.exe" FileName="fsi.exe" MinimumFileVersion="0.0.0.0" MaximumFileVersion="65355.65355.65355.65355" />
|
||||
@ -854,6 +856,7 @@ The blocklist policy that follows includes "Allow all" rules for both kernel and
|
||||
<FileRuleRef RuleID="ID_DENY_CSCRIPT" />
|
||||
<FileRuleRef RuleID="ID_DENY_DBGHOST" />
|
||||
<FileRuleRef RuleID="ID_DENY_DBGSVC" />
|
||||
<FileRuleRef RuleID="ID_DENY_DBGSRV" />
|
||||
<FileRuleRef RuleID="ID_DENY_DNX" />
|
||||
<FileRuleRef RuleID="ID_DENY_DOTNET" />
|
||||
<FileRuleRef RuleID="ID_DENY_FSI" />
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Enterprise certificate pinning
|
||||
description: Enterprise certificate pinning is a Windows feature for remembering, or pinning, a root issuing certificate authority, or end-entity certificate to a domain name.
|
||||
ms.topic: concept-article
|
||||
ms.date: 05/24/2023
|
||||
ms.date: 03/12/2024
|
||||
---
|
||||
|
||||
# Enterprise certificate pinning overview
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Windows Hello for Business cloud-only deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in a cloud-only deployment scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.topic: how-to
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
# Cloud-only deployment guide
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure Active Directory Federation Services in a hybrid certificate trust model
|
||||
description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business hybrid certificate trust model.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure and enroll in Windows Hello for Business in hybrid certificate trust model
|
||||
description: Learn how to configure devices and enroll them in Windows Hello for Business in a hybrid certificate trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure and validate the PKI in an hybrid certificate trust model
|
||||
description: Configure and validate the Public Key Infrastructure when deploying Windows Hello for Business in a hybrid certificate trust model.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business hybrid certificate trust deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in a hybrid certificate trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business cloud Kerberos trust deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in a cloud Kerberos trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure and enroll in Windows Hello for Business in a hybrid key trust model
|
||||
description: Learn how to configure devices and enroll them in Windows Hello for Business in a hybrid key trust scenario.
|
||||
ms.date: 12/29/2023
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business hybrid key trust deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in a hybrid key trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,8 +1,8 @@
|
||||
---
|
||||
title: Plan a Windows Hello for Business Deployment
|
||||
description: Learn about the role of each component within Windows Hello for Business and how certain deployment decisions affect other aspects of your infrastructure.
|
||||
ms.date: 01/02/2024
|
||||
ms.topic: overview
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: concept-article
|
||||
---
|
||||
|
||||
# Plan a Windows Hello for Business deployment
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure Active Directory Federation Services in an on-premises certificate trust model
|
||||
description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business on-premises certificate trust model.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
title: Configure Windows Hello for Business Policy settings in an on-premises certificate trust
|
||||
description: Configure Windows Hello for Business Policy settings for Windows Hello for Business in an on-premises certificate trust scenario
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business on-premises certificate trust deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in an on-premises, certificate trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure Active Directory Federation Services in an on-premises key trust model
|
||||
description: Learn how to configure Active Directory Federation Services (AD FS) to support the Windows Hello for Business key trust model.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
title: Configure Windows Hello for Business Policy settings in an on-premises key trust
|
||||
description: Configure Windows Hello for Business Policy settings for Windows Hello for Business in an on-premises key trust scenario
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business on-premises key trust deployment guide
|
||||
description: Learn how to deploy Windows Hello for Business in an on-premises, key trust scenario.
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Prepare users to provision and use Windows Hello for Business
|
||||
description: Learn how to prepare users to enroll and to use Windows Hello for Business.
|
||||
ms.date: 01/02/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: end-user-help
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Windows Hello for Business known deployment issues
|
||||
description: This article is a troubleshooting guide for known Windows Hello for Business deployment issues.
|
||||
ms.date: 06/02/2023
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: troubleshooting
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows Hello errors during PIN creation
|
||||
description: Learn about the Windows Hello error codes that might happen during PIN creation.
|
||||
ms.topic: troubleshooting
|
||||
ms.date: 01/26/2024
|
||||
ms.date: 03/12/2024
|
||||
---
|
||||
|
||||
# Windows Hello errors during PIN creation
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
ms.date: 01/03/2024
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: include
|
||||
---
|
||||
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Windows identity protection
|
||||
description: Learn more about identity protection technologies in Windows.
|
||||
ms.topic: overview
|
||||
ms.date: 07/27/2023
|
||||
ms.date: 03/12/2024
|
||||
---
|
||||
|
||||
# Windows identity protection
|
||||
|
@ -3,7 +3,7 @@ title: Windows passwordless experience
|
||||
description: Learn how Windows passwordless experience enables your organization to move away from passwords.
|
||||
ms.collection:
|
||||
- tier1
|
||||
ms.date: 09/27/2023
|
||||
ms.date: 03/12/2024
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
|
@ -2,7 +2,7 @@
|
||||
title: Remote Credential Guard
|
||||
description: Learn how Remote Credential Guard helps to secure Remote Desktop credentials by never sending them to the target device.
|
||||
ms.topic: how-to
|
||||
ms.date: 12/08/2023
|
||||
ms.date: 03/12/2024
|
||||
appliesto:
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Web sign-in for Windows
|
||||
description: Learn how Web sign-in in Windows works, key scenarios, and how to configure it.
|
||||
ms.date: 12/11/2023
|
||||
ms.date: 03/12/2023
|
||||
ms.topic: how-to
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||
@ -11,8 +11,8 @@ ms.collection:
|
||||
|
||||
# Web sign-in for Windows
|
||||
|
||||
Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can enable a web-based sign-in experience on Microsoft Entra joined devices, unlocking new sign-in options and capabilities.
|
||||
This feature is called *Web sign-in*.
|
||||
Starting in Windows 11, version 22H2 with [KB5030310][KB-1], you can enable a web-based sign-in experience on Microsoft Entra joined devices.
|
||||
This feature is called *Web sign-in*, and it unlocks new sign-in options and capabilities.
|
||||
|
||||
Web sign-in is a *credential provider*, and it was initially introduced in Windows 10 with support for Temporary Access Pass (TAP) only. With the release of Windows 11, the supported scenarios and capabilities of Web sign-in are expanded.\
|
||||
For example, you can sign in with the Microsoft Authenticator app or with a SAML-P federated identity.
|
||||
@ -21,11 +21,11 @@ This article describes how to configure Web sign-in and the supported key scenar
|
||||
|
||||
## System requirements
|
||||
|
||||
To use web sign-in, the clients must meet the following prerequisites:
|
||||
Here are the prerequisites for using Web sign-in:
|
||||
|
||||
- Windows 11, version 22H2 with [5030310][KB-1], or later
|
||||
- Must be [Microsoft Entra joined](/entra/identity/devices/concept-directory-join)
|
||||
- Must have Internet connectivity, as the authentication is done over the Internet
|
||||
- [Microsoft Entra joined](/entra/identity/devices/concept-directory-join)
|
||||
- Internet connectivity, as the authentication is done over the Internet
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Web sign-in is not supported for Microsoft Entra hybrid joined or domain joined devices.
|
||||
|
@ -1,167 +1,156 @@
|
||||
### YamlMime:Hub
|
||||
### YamlMime:Landing
|
||||
|
||||
title: Windows client security documentation
|
||||
summary: Learn how to secure Windows clients for your organization.
|
||||
brand: windows
|
||||
title: Windows security documentation
|
||||
summary: Windows is designed with zero-trust principles at its core, offering powerful security from chip to cloud. As organizations embrace hybrid work environments, the need for robust security solutions becomes paramount. Windows integrates advanced hardware and software protection, ensuring data integrity and access control across devices. Learn about the different security features included in Windows.
|
||||
|
||||
metadata:
|
||||
ms.topic: hub-page
|
||||
ms.topic: landing-page
|
||||
ms.collection:
|
||||
- tier1
|
||||
- essentials-navigation
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
manager: aaroncz
|
||||
ms.date: 09/18/2023
|
||||
ms.date: 03/12/2024
|
||||
|
||||
highlightedContent:
|
||||
items:
|
||||
- title: Get started with Windows security
|
||||
itemType: get-started
|
||||
url: introduction.md
|
||||
- title: Windows 11, version 22H2
|
||||
itemType: whats-new
|
||||
url: /windows/whats-new/whats-new-windows-11-version-22H2
|
||||
- title: Advance your security posture with Microsoft Intune from chip to cloud
|
||||
itemType: learn
|
||||
url: https://learn.microsoft.com/training/modules/m365-advance-organization-security-posture/
|
||||
- title: Security features licensing and edition requirements
|
||||
itemType: overview
|
||||
url: /windows/security/licensing-and-edition-requirements
|
||||
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | tutorial | overview | quickstart | reference | sample | tutorial | video | whats-new
|
||||
|
||||
landingContent:
|
||||
|
||||
productDirectory:
|
||||
title: Get started
|
||||
items:
|
||||
|
||||
- title: Hardware security
|
||||
imageSrc: /media/common/i_usb.svg
|
||||
- title: Learn about hardware security
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- url: /windows/security/hardware-security/tpm/trusted-platform-module-overview
|
||||
text: Trusted Platform Module
|
||||
- url: /windows/security/hardware-security/pluton/microsoft-pluton-security-processor
|
||||
text: Microsoft Pluton
|
||||
- url: /windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows
|
||||
text: Windows Defender System Guard
|
||||
- url: /windows-hardware/design/device-experiences/oem-vbs
|
||||
text: Virtualization-based security (VBS)
|
||||
- url: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
||||
text: Secured-core PC
|
||||
- url: /windows/security/hardware-security
|
||||
text: Learn more about hardware security >
|
||||
- text: Trusted Platform Module (TPM)
|
||||
url: /windows/security/hardware-security/tpm/trusted-platform-module-overview
|
||||
- text: Microsoft Pluton
|
||||
url: /windows/security/hardware-security/pluton/microsoft-pluton-security-processor
|
||||
- text: Windows Defender System Guard
|
||||
url: /windows-hardware/design/device-experiences/oem-vbs
|
||||
- text: Virtualization-based security (VBS)
|
||||
url: /windows/security/hardware-security/how-hardware-based-root-of-trust-helps-protect-windows
|
||||
- text: Secured-core PC
|
||||
url: /windows-hardware/design/device-experiences/oem-highly-secure-11
|
||||
|
||||
- title: OS security
|
||||
imageSrc: /media/common/i_threat-protection.svg
|
||||
- title: Learn about OS security
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- url: /windows/security/operating-system-security
|
||||
text: Trusted boot
|
||||
- url: /windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center
|
||||
text: Windows security settings
|
||||
- url: /windows/security/operating-system-security/data-protection/bitlocker/
|
||||
text: BitLocker
|
||||
- url: /windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines
|
||||
text: Windows security baselines
|
||||
- url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/
|
||||
text: Microsoft Defender SmartScreen
|
||||
- url: /windows/security/operating-system-security
|
||||
text: Learn more about OS security >
|
||||
|
||||
- title: Identity protection
|
||||
imageSrc: /media/common/i_identity-protection.svg
|
||||
- text: Trusted boot
|
||||
url: /windows/security/operating-system-security
|
||||
- text: Windows security settings
|
||||
url: /windows/security/operating-system-security/system-security/windows-defender-security-center/windows-defender-security-center
|
||||
- text: BitLocker
|
||||
url: /windows/security/operating-system-security/data-protection/bitlocker/
|
||||
- text: Personal Data Encryption (PDE)
|
||||
url: /windows/security/operating-system-security/data-protection/personal-data-encryption
|
||||
- text: Windows security baselines
|
||||
url: /windows/security/operating-system-security/device-management/windows-security-configuration-framework/windows-security-baselines
|
||||
- text: Microsoft Defender SmartScreen
|
||||
url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/
|
||||
- text: Windows Firewall
|
||||
url: /windows/security/operating-system-security/network-security/windows-firewall/
|
||||
- linkListType: architecture
|
||||
links:
|
||||
- url: /windows/security/identity-protection/hello-for-business
|
||||
text: Windows Hello for Business
|
||||
- url: /windows/security/identity-protection/passwordless-experience
|
||||
text: Windows passwordless experience
|
||||
- url: /windows/security/identity-protection/web-sign-in
|
||||
text: Web sign-in for Windows
|
||||
- url: /windows/security/identity-protection/passkeys
|
||||
text: Support for passkeys in Windows
|
||||
- url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection
|
||||
text: Enhanced phishing protection with SmartScreen
|
||||
- url: /windows/security/identity-protection
|
||||
text: Learn more about identity protection >
|
||||
|
||||
- title: Application security
|
||||
imageSrc: /media/common/i_queries.svg
|
||||
- text: BitLocker planning guide
|
||||
url: /windows/security/operating-system-security/data-protection/bitlocker/planning-guide
|
||||
- linkListType: how-to-guide
|
||||
links:
|
||||
- url: /windows/security/application-security/application-control/windows-defender-application-control/
|
||||
text: Windows Defender Application Control (WDAC)
|
||||
- url: /windows/security/application-security/application-control/user-account-control
|
||||
text: User Account Control (UAC)
|
||||
- url: /windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules
|
||||
text: Microsoft vulnerable driver blocklist
|
||||
- url: /windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview
|
||||
text: Microsoft Defender Application Guard (MDAG)
|
||||
- url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview
|
||||
text: Windows Sandbox
|
||||
- url: /windows/security/application-security
|
||||
text: Learn more about application security >
|
||||
|
||||
- title: Security foundations
|
||||
imageSrc: /media/common/i_build.svg
|
||||
- text: Configure BitLocker
|
||||
url: /windows/security/operating-system-security/data-protection/bitlocker/configure
|
||||
- text: Configure PDE
|
||||
url: /windows/security/operating-system-security/data-protection/personal-data-encryption/configure
|
||||
- linkListType: whats-new
|
||||
links:
|
||||
- url: /windows/security/security-foundations/certification/fips-140-validation
|
||||
text: FIPS 140-2 validation
|
||||
- url: /windows/security/security-foundations/certification/windows-platform-common-criteria
|
||||
text: Common Criteria Certifications
|
||||
- url: /windows/security/security-foundations/msft-security-dev-lifecycle
|
||||
text: Microsoft Security Development Lifecycle (SDL)
|
||||
- url: https://www.microsoft.com/msrc/bounty-windows-insider-preview
|
||||
text: Microsoft Windows Insider Preview bounty program
|
||||
- url: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
|
||||
text: OneFuzz service
|
||||
- url: /windows/security/security-foundations
|
||||
text: Learn more about security foundations >
|
||||
- text: Hyper-V firewall
|
||||
url: /windows/security/operating-system-security/network-security/windows-firewall/hyper-v-firewall
|
||||
|
||||
- title: Cloud security
|
||||
imageSrc: /media/common/i_cloud-security.svg
|
||||
- title: Learn about identity protection
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- url: /mem/intune/protect/security-baselines
|
||||
text: Security baselines with Intune
|
||||
- url: /windows/deployment/windows-autopatch
|
||||
text: Windows Autopatch
|
||||
- url: /windows/deployment/windows-autopilot
|
||||
text: Windows Autopilot
|
||||
- url: /universal-print
|
||||
text: Universal Print
|
||||
- url: /windows/client-management/mdm/remotewipe-csp
|
||||
text: Remote wipe
|
||||
- url: /windows/security/cloud-security
|
||||
text: Learn more about cloud security >
|
||||
|
||||
additionalContent:
|
||||
sections:
|
||||
- title: More Windows resources
|
||||
items:
|
||||
|
||||
- title: Windows Server
|
||||
- text: Passwordless strategy
|
||||
url: /windows/security/identity-protection/passwordless-strategy
|
||||
- text: Windows Hello for Business
|
||||
url: /windows/security/identity-protection/hello-for-business
|
||||
- text: Windows passwordless experience
|
||||
url: /windows/security/identity-protection/passwordless-experience
|
||||
- text: Web sign-in for Windows
|
||||
url: /windows/security/identity-protection/web-sign-in
|
||||
- text: Passkeys
|
||||
url: /windows/security/identity-protection/passkeys
|
||||
- text: FIDO2 security keys
|
||||
url: /azure/active-directory/authentication/howto-authentication-passwordless-security-key
|
||||
- text: Enhanced phishing protection with SmartScreen
|
||||
url: /windows/security/operating-system-security/virus-and-threat-protection/microsoft-defender-smartscreen/enhanced-phishing-protection
|
||||
- linkListType: how-to-guide
|
||||
links:
|
||||
- text: Windows Server documentation
|
||||
url: /windows-server
|
||||
- text: What's new in Windows Server 2022?
|
||||
url: /windows-server/get-started/whats-new-in-windows-server-2022
|
||||
- text: Windows Server blog
|
||||
url: https://cloudblogs.microsoft.com/windowsserver/
|
||||
|
||||
- title: Windows product site and blogs
|
||||
- text: Configure PIN reset
|
||||
url: /windows/security/identity-protection/hello-for-business/pin-reset
|
||||
- text: RDP sign-in with Windows Hello for Business
|
||||
url: /windows/security/identity-protection/hello-for-business/rdp-sign-in
|
||||
- linkListType: architecture
|
||||
links:
|
||||
- text: Find out how Windows enables your business to do more
|
||||
url: https://www.microsoft.com/microsoft-365/windows
|
||||
- text: Windows blogs
|
||||
url: https://blogs.windows.com/
|
||||
- text: Windows IT Pro blog
|
||||
url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog
|
||||
- text: Microsoft Intune blog
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-intune-blog/bg-p/MicrosoftEndpointManagerBlog
|
||||
- text: "Windows help & learning: end-user documentation"
|
||||
url: https://support.microsoft.com/windows
|
||||
|
||||
- title: Participate in the community
|
||||
- text: Plan a Windows Hello for Business deployment
|
||||
url: /windows/security/identity-protection/hello-for-business/deploy/
|
||||
- linkListType: deploy
|
||||
links:
|
||||
- text: Windows community
|
||||
url: https://techcommunity.microsoft.com/t5/windows/ct-p/Windows10
|
||||
- text: Microsoft Intune community
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-intune/bd-p/Microsoft-Intune
|
||||
- text: Microsoft Support community
|
||||
url: https://answers.microsoft.com/windows/forum
|
||||
- text: Cloud Kerberos trust deployment guide
|
||||
url: /windows/security/identity-protection/hello-for-business/deploy/hybrid-cloud-kerberos-trust
|
||||
|
||||
- title: Learn about application security
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- text: Windows Defender Application Control (WDAC)
|
||||
url: /windows/security/application-security/application-control/windows-defender-application-control/
|
||||
- text: User Account Control (UAC)
|
||||
url: /windows/security/application-security/application-control/user-account-control
|
||||
- text: Microsoft vulnerable driver blocklist
|
||||
url: /windows/security/application-security/application-control/windows-defender-application-control/design/microsoft-recommended-driver-block-rules
|
||||
- text: Microsoft Defender Application Guard (MDAG)
|
||||
url: /windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview
|
||||
- text: Windows Sandbox
|
||||
url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-overview
|
||||
- linkListType: how-to-guide
|
||||
links:
|
||||
- text: Configure Windows Sandbox
|
||||
url: /windows/security/application-security/application-isolation/windows-sandbox/windows-sandbox-configure-using-wsb-file
|
||||
|
||||
- title: Learn about security foundations
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- text: Zero trust
|
||||
url: /windows/security/security-foundations/zero-trust-windows-device-health
|
||||
- text: FIPS 140 validation
|
||||
url: /windows/security/security-foundations/certification/fips-140-validation
|
||||
- text: Common Criteria Certifications
|
||||
url: /windows/security/security-foundations/certification/windows-platform-common-criteria
|
||||
- text: Microsoft Security Development Lifecycle (SDL)
|
||||
url: /windows/security/security-foundations/msft-security-dev-lifecycle
|
||||
- text: Microsoft Windows Insider Preview bounty program
|
||||
url: https://www.microsoft.com/msrc/bounty-windows-insider-preview
|
||||
- text: OneFuzz service
|
||||
url: https://www.microsoft.com/security/blog/2020/09/15/microsoft-onefuzz-framework-open-source-developer-tool-fix-bugs/
|
||||
- linkListType: whats-new
|
||||
links:
|
||||
- text: Completed FIPS validations - Windows 11
|
||||
url: /windows/security/security-foundations/certification/validations/fips-140-windows11
|
||||
- text: Completed CC certifications - Windows 11
|
||||
url: /windows/security/security-foundations/certification/validations/cc-windows11
|
||||
|
||||
- title: Learn about cloud security
|
||||
linkLists:
|
||||
- linkListType: overview
|
||||
links:
|
||||
- text: Security baselines with Intune
|
||||
url: /mem/intune/protect/security-baselines
|
||||
- text: Windows Autopatch
|
||||
url: /windows/deployment/windows-autopatch
|
||||
- text: Windows Autopilot
|
||||
url: /windows/deployment/windows-autopilot
|
||||
- text: Universal Print
|
||||
url: /universal-print
|
||||
- text: Remote wipe
|
||||
url: /windows/client-management/mdm/remotewipe-csp
|
Loading…
x
Reference in New Issue
Block a user