Merged PR 13286: New RIP, early publish

This commit is contained in:
Liza Poggemeyer 2018-12-10 17:57:52 +00:00
parent 620f7ce1d9
commit 402c83a90c
21 changed files with 62 additions and 34 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 43 KiB

View File

@ -1,5 +1,6 @@
# [Windows 10 and Windows 10 Mobile](index.md) # [Windows 10 and Windows 10 Mobile](index.md)
## [What's new](/windows/whats-new) ## [What's new](/windows/whats-new)
## [Release information](release-information.md)
## [Deployment](/windows/deployment) ## [Deployment](/windows/deployment)
## [Configuration](/windows/configuration) ## [Configuration](/windows/configuration)
## [Client management](/windows/client-management) ## [Client management](/windows/client-management)

View File

@ -38,7 +38,6 @@
"ms.technology": "windows", "ms.technology": "windows",
"ms.topic": "article", "ms.topic": "article",
"ms.author": "brianlic", "ms.author": "brianlic",
"ms.date": "04/05/2017",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",

View File

@ -0,0 +1,37 @@
---
title: Windows 10 - release information
description: Learn release information for Windows 10 releases
keywords: ["Windows 10", "Windows 10 October 2018 Update"]
ms.prod: w10
layout: LandingPage
ms.topic: landing-page
ms.mktglfcycl: deploy
ms.sitesec: library
author: lizap
ms.author: elizapo
ms.localizationpriority: high
---
# Windows 10 - Release information
>[!IMPORTANT]
> The URL for the release information page has changed - update your bookmark!
Microsoft has updated its servicing model. The Semi-Annual Channel (SAC) offers twice-per-year feature updates that release around March and September, with an 18-month servicing period for each release. Starting with Windows 10, version 1809, feature updates for Windows 10 Enterprise and Education editions with a targeted release month of September will be serviced for 30 months from their release date (more information can be found [here](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop/)).
If you are not using Windows Update for Business today, “Semi-Annual Channel (Targeted)” (SAC-T) has no impact on your devices (more information can be found [here](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-and-the-disappearing-SAC-T/ba-p/199747)), and we recommend you begin deployment of each Semi-Annual Channel release right away to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible.
If you are using Windows Update for Business today, refer to the table below to understand when your device will be updated, based on which deferral period you have configured, SAC -T or SAC.
**Notice: November 13, 2018:** All editions of Windows 10 October 2018 Update, version 1809, for Windows client and server have resumed. Customers currently running Windows 10, version 1809, will receive build 17763.134 as part of our regularly scheduled Update Tuesday servicing in November. If you update to the Window 10, version 1809, feature update you will receive build 17763.107. On the next automatic scan for updates, youll be taken to the latest cumulative update (build 17763.134 or higher).
November 13 marks the revised start of the servicing timeline for the Semi-Annual Channel ("Targeted") and Long-Term Servicing Channel (LTSC) release for Windows 10, version 1809, Windows Server 2019, and Windows Server, version 1809.
For information about the re-release and updates to the support lifecycle, refer to [John Cable's blog](https://blogs.windows.com/windowsexperience/2018/10/09/updated-version-of-windows-10-october-2018-update-released-to-windows-insiders/), [Windows 10 Update History](https://support.microsoft.com/help/4464619), and the [Windows lifecycle fact sheet](https://support.microsoft.com/help/13853).
<div class="m-rich-content-block" data-grid="col-12">
<div id="winrelinfo" xmlns="http://www.w3.org/1999/xhtml"><iframe width="100%" height="866px" id="winrelinfo_iframe" src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/en-US.html" frameborder="0" marginwidth="0" marginheight="0" scrolling="auto"></iframe></div>
<script src="https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/iframe.js" xmlns="http://www.w3.org/1999/xhtml"></script>
<script xmlns="http://www.w3.org/1999/xhtml">/*<![CDATA[*/winrelinfo_setup("https://winreleaseinfoprod.blob.core.windows.net/winreleaseinfoprod/en-US.html")/*]]>*/</script>
</div>

Binary file not shown.

After

Width:  |  Height:  |  Size: 142 KiB

View File

@ -6,7 +6,7 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: aadake author: aadake
ms.date: 10/03/2018 ms.date: 12/08/2018
--- ---
# Kernel DMA Protection for Thunderbolt™ 3 # Kernel DMA Protection for Thunderbolt™ 3
@ -65,11 +65,17 @@ Systems released prior to Windows 10 version 1803 do not support Kernel DMA Prot
Systems running Windows 10 version 1803 that do support Kernel DMA Protection do have this security feature enabled automatically by the OS with no user or IT admin configuration required. Systems running Windows 10 version 1803 that do support Kernel DMA Protection do have this security feature enabled automatically by the OS with no user or IT admin configuration required.
**To check if a device supports Kernel DMA Protection** ### Using Security Center
Beginning with Wndows 10 version 1809, you can use Security Center to check if Kernel DMA Protection is enabled. Click **Start** > **Settings** > **Update & Security** > **Windows Security** > **Open Windows Security** > **Device security** > **Core isolation details** > **Memory access protection**.
![Kernel DMA protection in Security Center](bitlocker/images/kernel-dma-protection-security-center.png)
### Using System information
1. Launch MSINFO32.exe in a command prompt, or in the Windows search bar. 1. Launch MSINFO32.exe in a command prompt, or in the Windows search bar.
2. Check the value of **Kernel DMA Protection**. 2. Check the value of **Kernel DMA Protection**.
![Kernel DMA protection](bitlocker/images/kernel-dma-protection.png) ![Kernel DMA protection in System Information](bitlocker/images/kernel-dma-protection.png)
3. If the current state of **Kernel DMA Protection** is OFF and **Virtualization Technology in Firmware** is NO: 3. If the current state of **Kernel DMA Protection** is OFF and **Virtualization Technology in Firmware** is NO:
- Reboot into BIOS settings - Reboot into BIOS settings
- Turn on Intel Virtualization Technology. - Turn on Intel Virtualization Technology.

Binary file not shown.

After

Width:  |  Height:  |  Size: 58 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 64 KiB

View File

@ -50,7 +50,6 @@ detectionSource | string | Detection source.
threatFamilyName | string | Threat family. threatFamilyName | string | Threat family.
title | string | Alert title. title | string | Alert title.
description | String | Description of the threat, identified by the alert. description | String | Description of the threat, identified by the alert.
recommendedAction | String | Action recommended for handling the suspected threat.
alertCreationTime | DateTimeOffset | The date and time (in UTC) the alert was created. alertCreationTime | DateTimeOffset | The date and time (in UTC) the alert was created.
lastEventTime | DateTimeOffset | The last occurance of the event that triggered the alert on the same machine. lastEventTime | DateTimeOffset | The last occurance of the event that triggered the alert on the same machine.
firstEventTime | DateTimeOffset | The first occurance of the event that triggered the alert on that machine. firstEventTime | DateTimeOffset | The first occurance of the event that triggered the alert on that machine.
@ -74,7 +73,6 @@ machineId | String | ID of a [machine](machine-windows-defender-advanced-threat-
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description"
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-26T16:19:21.8409809Z", "alertCreationTime": "2018-11-26T16:19:21.8409809Z",
"firstEventTime": "2018-11-26T16:17:50.0948658Z", "firstEventTime": "2018-11-26T16:17:50.0948658Z",
"lastEventTime": "2018-11-26T16:18:01.809871Z", "lastEventTime": "2018-11-26T16:18:01.809871Z",

View File

@ -84,8 +84,8 @@ Content-Length: application/json
"machineId": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07", "machineId": "1e5bc9d7e413ddd7902c2932e418702b84d0cc07",
"severity": "Low", "severity": "Low",
"title": "test alert", "title": "test alert",
"description": "redalert", "description": "test alert",
"recommendedAction": "white alert", "recommendedAction": "test alert",
"eventTime": "2018-08-03T16:45:21.7115183Z", "eventTime": "2018-08-03T16:45:21.7115183Z",
"reportId": "20776", "reportId": "20776",
"category": "None" "category": "None"

View File

@ -100,8 +100,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-26T16:19:21.8409809Z", "alertCreationTime": "2018-11-26T16:19:21.8409809Z",
"firstEventTime": "2018-11-26T16:17:50.0948658Z", "firstEventTime": "2018-11-26T16:17:50.0948658Z",
"lastEventTime": "2018-11-26T16:18:01.809871Z", "lastEventTime": "2018-11-26T16:18:01.809871Z",

View File

@ -87,8 +87,7 @@ Here is an example of the response.
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",

View File

@ -100,8 +100,7 @@ Here is an example of the response.
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-26T16:19:21.8409809Z", "alertCreationTime": "2018-11-26T16:19:21.8409809Z",
"firstEventTime": "2018-11-26T16:17:50.0948658Z", "firstEventTime": "2018-11-26T16:17:50.0948658Z",
"lastEventTime": "2018-11-26T16:18:01.809871Z", "lastEventTime": "2018-11-26T16:18:01.809871Z",
@ -121,8 +120,7 @@ Here is an example of the response.
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",

View File

@ -96,8 +96,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",
@ -117,8 +116,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-24T16:19:21.8409809Z", "alertCreationTime": "2018-11-24T16:19:21.8409809Z",
"firstEventTime": "2018-11-24T16:17:50.0948658Z", "firstEventTime": "2018-11-24T16:17:50.0948658Z",
"lastEventTime": "2018-11-24T16:18:01.809871Z", "lastEventTime": "2018-11-24T16:18:01.809871Z",

View File

@ -94,8 +94,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-26T16:19:21.8409809Z", "alertCreationTime": "2018-11-26T16:19:21.8409809Z",
"firstEventTime": "2018-11-26T16:17:50.0948658Z", "firstEventTime": "2018-11-26T16:17:50.0948658Z",
"lastEventTime": "2018-11-26T16:18:01.809871Z", "lastEventTime": "2018-11-26T16:18:01.809871Z",

View File

@ -93,8 +93,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",

View File

@ -93,8 +93,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",

View File

@ -93,8 +93,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-25T16:19:21.8409809Z", "alertCreationTime": "2018-11-25T16:19:21.8409809Z",
"firstEventTime": "2018-11-25T16:17:50.0948658Z", "firstEventTime": "2018-11-25T16:17:50.0948658Z",
"lastEventTime": "2018-11-25T16:18:01.809871Z", "lastEventTime": "2018-11-25T16:18:01.809871Z",
@ -114,8 +113,7 @@ Content-type: application/json
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-24T16:19:21.8409809Z", "alertCreationTime": "2018-11-24T16:19:21.8409809Z",
"firstEventTime": "2018-11-24T16:17:50.0948658Z", "firstEventTime": "2018-11-24T16:17:50.0948658Z",
"lastEventTime": "2018-11-24T16:18:01.809871Z", "lastEventTime": "2018-11-24T16:18:01.809871Z",

View File

@ -40,7 +40,7 @@ id | Guid | Identity of the [Machine Action](machineaction-windows-defender-adva
type | Enum | Type of the action. Possible values are: "RunAntiVirusScan", "Offboard", "CollectInvestigationPackage", "Isolate", "Unisolate", "StopAndQuarantineFile", "RestrictCodeExecution" and "UnrestrictCodeExecution" type | Enum | Type of the action. Possible values are: "RunAntiVirusScan", "Offboard", "CollectInvestigationPackage", "Isolate", "Unisolate", "StopAndQuarantineFile", "RestrictCodeExecution" and "UnrestrictCodeExecution"
requestor | String | Identity of the person that executed the action. requestor | String | Identity of the person that executed the action.
requestorComment | String | Comment that was written when issuing the action. requestorComment | String | Comment that was written when issuing the action.
status | Enum | Current status of the command. Possible values are: "InProgress", "Succeeded", "Failed", "TimeOut" and "Cancelled". status | Enum | Current status of the command. Possible values are: "Pending", "InProgress", "Succeeded", "Failed", "TimeOut" and "Cancelled".
machineId | String | Id of the machine on which the action was executed. machineId | String | Id of the machine on which the action was executed.
creationDateTimeUtc | DateTimeOffset | The date and time when the action was created. creationDateTimeUtc | DateTimeOffset | The date and time when the action was created.
lastUpdateTimeUtc | DateTimeOffset | The last date and time when the action status was updated. lastUpdateTimeUtc | DateTimeOffset | The last date and time when the action status was updated.

View File

@ -98,8 +98,7 @@ Here is an example of the response.
"detectionSource": "WindowsDefenderAv", "detectionSource": "WindowsDefenderAv",
"threatFamilyName": "Mikatz", "threatFamilyName": "Mikatz",
"title": "Windows Defender AV detected 'Mikatz', high-severity malware", "title": "Windows Defender AV detected 'Mikatz', high-severity malware",
"description": "Some description" "description": "Some description",
"recommendedAction": "Some recommended action"
"alertCreationTime": "2018-11-26T16:19:21.8409809Z", "alertCreationTime": "2018-11-26T16:19:21.8409809Z",
"firstEventTime": "2018-11-26T16:17:50.0948658Z", "firstEventTime": "2018-11-26T16:17:50.0948658Z",
"lastEventTime": "2018-11-26T16:18:01.809871Z", "lastEventTime": "2018-11-26T16:18:01.809871Z",

View File

@ -36,7 +36,6 @@
"ms.technology": "windows", "ms.technology": "windows",
"ms.topic": "article", "ms.topic": "article",
"ms.author": "trudyha", "ms.author": "trudyha",
"ms.date": "04/05/2017",
"feedback_system": "GitHub", "feedback_system": "GitHub",
"feedback_github_repo": "MicrosoftDocs/windows-itpro-docs", "feedback_github_repo": "MicrosoftDocs/windows-itpro-docs",
"feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app", "feedback_product_url": "https://support.microsoft.com/help/4021566/windows-10-send-feedback-to-microsoft-with-feedback-hub-app",