mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Merged PR 5025: Rolling out automation of supported values.
This commit is contained in:
parent
e53c9ca666
commit
46b159c32c
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - AboveLock
|
||||
@ -72,14 +72,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether to allow Action Center notifications above the device lock screen.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 (default) - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -120,12 +122,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 (default) - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -166,14 +170,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether to allow toast notifications above the device lock screen.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 (default) - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Accounts
|
||||
@ -72,17 +72,19 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether user is allowed to add non-MSA email accounts.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 (default) - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -123,14 +125,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not allowed.
|
||||
- 1 (default) - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -171,12 +175,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled.
|
||||
- 1 (default) – Manual start.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Disabled.
|
||||
- 1 (default) - Manual start.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - ApplicationManagement
|
||||
@ -93,15 +93,17 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether non Microsoft Store apps are allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Explicit deny.
|
||||
- 1 – Explicit allow unlock.
|
||||
- 65535 (default) – Not configured.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Explicit deny.
|
||||
- 1 - Explicit allow unlock.
|
||||
- 65535 (default) - Not configured.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -190,15 +192,17 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether developer unlock is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Explicit deny.
|
||||
- 1 – Explicit allow unlock.
|
||||
- 65535 (default) – Not configured.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Explicit deny.
|
||||
- 1 - Explicit allow unlock.
|
||||
- 65535 (default) - Not configured.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -242,14 +246,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether DVR and broadcasting is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -290,14 +296,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether multiple users of the same app can share data.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -338,14 +346,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether app store is allowed at the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -449,12 +459,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Enable launch of apps.
|
||||
- 1 – Disable launch of apps.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -500,8 +512,6 @@ ms.date: 11/01/2017
|
||||
- 0 (default) – Allow both public and Private store.
|
||||
- 1 – Only Private store is enabled.
|
||||
|
||||
<p style="margin-left: 20px">This is a per user policy.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
@ -545,14 +555,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether application data is restricted to the system drive.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not restricted.
|
||||
- 1 – Restricted.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -593,14 +605,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether the installation of applications is restricted to the system drive.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not restricted.
|
||||
- 1 – Restricted.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Authentication
|
||||
@ -75,12 +75,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -121,12 +123,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -167,14 +171,16 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows EAP Fast Reconnect from being attempted for EAP Method TLS.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -219,12 +225,14 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Here is an example scenario: At Contoso, there are a lot of shared devices and kiosks that employees throughout the day using as many as 20 different devices. To minimize the loss in productivity when employees have to login with username and password everytime they pick up a device, the IT admin deploys SharePC CSP and Authentication/AllowFidoDeviceSignon policy to shared devices. The IT admin provisions and distributes FIDO 2.0 devices to employees, which allows them to authenticate to various shared devices and PCs.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Do not allow. The FIDO device credential provider disabled.
|
||||
- 1 - Allow. The FIDO device credential provider is enabled and allows usage of FIDO devices to sign into an Windows.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -265,14 +273,16 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Bitlocker
|
||||
@ -66,13 +66,6 @@ ms.date: 11/01/2017
|
||||
> [!NOTE]
|
||||
> XTS-AES 128-bit and XTS-AES 256-bit values are only supported on Windows 10 for desktop.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 3 - AES-CBC 128-bit
|
||||
- 4 - AES-CBC 256-bit
|
||||
- 6 - XTS-AES 128-bit (Desktop only)
|
||||
- 7 - XTS-AES 256-bit (Desktop only)
|
||||
|
||||
<p style="margin-left: 20px">You can find the following policies in BitLocker CSP:
|
||||
<dl>
|
||||
<dd>
|
||||
@ -102,6 +95,15 @@ ms.date: 11/01/2017
|
||||
</dl>
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 3 - AES-CBC 128-bit
|
||||
- 4 - AES-CBC 256-bit
|
||||
- 6 - XTS-AES 128-bit (Desktop only)
|
||||
- 7 - XTS-AES 256-bit (Desktop only)
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Bluetooth
|
||||
@ -75,16 +75,18 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether the device can send out Bluetooth advertisements.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral.
|
||||
- 1 (default) – Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral.
|
||||
|
||||
<p style="margin-left: 20px">If this is not set or it is deleted, the default value of 1 (Allow) is used.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed. When set to 0, the device will not send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is not received by the peripheral.
|
||||
- 1 (default) – Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -125,16 +127,18 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether other Bluetooth-enabled devices can discover the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device.
|
||||
- 1 (default) – Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it.
|
||||
|
||||
<p style="margin-left: 20px">If this is not set or it is deleted, the default value of 1 (Allow) is used.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed. When set to 0, other devices will not be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that you cannot see the name of the device.
|
||||
- 1 (default) – Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -175,12 +179,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default)– Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Browser
|
||||
@ -172,14 +172,16 @@ ms.date: 11/01/2017
|
||||
> [!NOTE]
|
||||
> Disabling this setting turns off the address bar drop-down functionality. Because search suggestions are shown in the drop-down list, this setting takes precedence over the Browser/AllowSearchSuggestionsinAddressBar setting.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."
|
||||
- 1 (default) – Allowed. Address bar drop-down is enabled.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -221,11 +223,6 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether autofill on websites is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowAutofill is set to 0 (not allowed):
|
||||
@ -236,6 +233,13 @@ ms.date: 11/01/2017
|
||||
4. Verify the setting **Save form entries** is greyed out.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -281,16 +285,18 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether the browser is allowed on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<p style="margin-left: 20px">When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -392,14 +398,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -441,11 +449,6 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether Do Not Track headers are allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowDoNotTrack is set to 0 (not allowed):
|
||||
@ -456,6 +459,13 @@ ms.date: 11/01/2017
|
||||
4. Verify the setting **Send Do Not Track requests** is greyed out.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -497,12 +507,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -544,12 +556,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -591,12 +605,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Adobe Flash content is automatically loaded and run by Microsoft Edge.
|
||||
- 1 (default) – Users must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -638,14 +654,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether InPrivate browsing is allowed on corporate networks.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -690,14 +708,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
|
||||
<p style="margin-left: 20px">If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the compatibility list from Microsoft, applying the updates during browser navigation. Visiting any site on the compatibility list prompts the employee to use Internet Explorer 11 (or enables/disables certain browser features on mobile), where the site is automatically rendered as though it’s run in the version of Internet Explorer necessary for it to display properly. If you disable this setting, the compatibility list isn’t used during browser navigation.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not enabled.
|
||||
- 1 (default) – Enabled.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -739,11 +759,6 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether saving and managing passwords locally on the device is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowPasswordManager is set to 0 (not allowed):
|
||||
@ -754,6 +769,13 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -795,11 +817,6 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether pop-up blocker is allowed or enabled.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Pop-up blocker is not allowed. It means that pop-up browser windows are allowed.
|
||||
- 1 – Pop-up blocker is allowed or enabled. It means that pop-up browser windows are blocked.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowPopups is set to 0 (not allowed):
|
||||
@ -810,6 +827,13 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
4. Verify the setting **Block pop-ups** is greyed out.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Pop-up blocker is not allowed. It means that pop-up browser windows are allowed.
|
||||
- 1 – Pop-up blocker is allowed or enabled. It means that pop-up browser windows are blocked.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -853,14 +877,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
|
||||
<p style="margin-left: 20px">If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -902,14 +928,16 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether search suggestions are allowed in the address bar.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -951,11 +979,6 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether Windows Defender SmartScreen is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<p style="margin-left: 20px">To verify AllowSmartScreen is set to 0 (not allowed):
|
||||
@ -966,6 +989,13 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -987,6 +1017,13 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<p style="margin-left: 20px">This is only a placeholder.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - TBD.
|
||||
- 1 - TBD.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1028,11 +1065,6 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – (default) Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings.
|
||||
- 1 – Browsing data is cleared on exit.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<p style="margin-left: 20px">To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1):
|
||||
@ -1042,6 +1074,13 @@ By default, the Microsoft compatibility list is enabled and can be viewed by vis
|
||||
3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – (default) Browsing data is not cleared on exit. The type of browsing data to clear can be configured by the employee in the Clear browsing data options under Settings.
|
||||
- 1 – Browsing data is cleared on exit.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1146,14 +1185,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
> [!IMPORTANT]
|
||||
> This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy).
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages.
|
||||
- 1 – Disable lockdown of the Start pages and allow users to modify them.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1396,16 +1437,18 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
> [!Important]
|
||||
> Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge.
|
||||
|
||||
<ul>
|
||||
<li> 0 - Disabled. Do not lockdown Favorites.</li>
|
||||
<li> 1 - Enabled. Lockdown Favorites.</li>
|
||||
</ul>
|
||||
|
||||
<p style="margin-left: 20px">If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list.
|
||||
|
||||
<p style="margin-left: 20px">Data type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Disabled. Do not lockdown Favorites.
|
||||
- 1 - Enabled. Lockdown Favorites.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1447,12 +1490,14 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Users can access the about:flags page in Microsoft Edge.
|
||||
- 1 – Users can't access the about:flags page in Microsoft Edge.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1494,14 +1539,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Employees see the First Run webpage.
|
||||
- 1 – Employees don't see the First Run webpage.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1543,14 +1590,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Microsoft servers will be contacted if a site is pinned to Start from Microsoft Edge.
|
||||
- 1 – Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 1.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1592,14 +1641,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Off.
|
||||
- 1 – On.
|
||||
|
||||
<p style="margin-left: 20px">Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1641,12 +1692,14 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Off.
|
||||
- 1 – On.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1692,12 +1745,14 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an <p style="margin-left: 20px">user’s localhost IP address while making phone calls using WebRTC.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – The localhost IP address is shown.
|
||||
- 1 – The localhost IP address is hidden.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1798,14 +1853,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether to send intranet traffic over to Internet Explorer.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Intranet traffic is sent to Internet Explorer.
|
||||
- 1 – Intranet traffic is sent to Microsoft Edge.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1907,14 +1964,16 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Specifies whether users should see a full interstitial page in Microsoft Edge when opening sites that are configured to open in Internet Explorer using the Enterprise Site List.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Interstitial pages are not shown.
|
||||
- 1 – Interstitial pages are shown.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1961,11 +2020,6 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
>
|
||||
> Enabling this setting stops Microsoft Edge favorites from syncing between connected Windows 10 devices.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Synchronization is off.
|
||||
- 1 – Synchronization is on.
|
||||
|
||||
<p style="margin-left: 20px">To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge:
|
||||
|
||||
<ol>
|
||||
@ -1975,6 +2029,13 @@ Employees cannot remove these search engines, but they can set any one as the de
|
||||
</ol>
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Synchronization is off.
|
||||
- 1 – Synchronization is on.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Camera
|
||||
@ -63,14 +63,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Disables or enables the camera.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Connectivity
|
||||
@ -102,11 +102,6 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows the user to enable Bluetooth or restrict access.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be greyed out and the user will not be able to turn Bluetooth on.
|
||||
- 1 – Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on.
|
||||
|
||||
> [!NOTE]
|
||||
> This value is not supported in Windows Phone 8.1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile.
|
||||
|
||||
@ -117,6 +112,13 @@ ms.date: 12/13/2017
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disallow Bluetooth. If this is set to 0, the radio in the Bluetooth control panel will be greyed out and the user will not be able to turn Bluetooth on.
|
||||
- 1 – Reserved. If this is set to 1, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -264,12 +266,14 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 1 (default) - Allow (CDP service available).
|
||||
- 0 - Disable (CDP service not available).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -314,14 +318,16 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows or disallows near field communication (NFC) on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Do not allow NFC capabilities.
|
||||
- 1 (default) – Allow NFC capabilities.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -368,14 +374,16 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -416,14 +424,16 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies what type of underlying connections VPN is allowed to use.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – VPN is not allowed over cellular.
|
||||
- 1 (default) – VPN can use any connection, including cellular.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -464,14 +474,16 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Prevents the device from connecting to VPN when the device roams over cellular networks.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -510,6 +522,7 @@ ms.date: 12/13/2017
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<!--EndDescription-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
@ -564,6 +577,7 @@ ADMX Info:
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<!--EndDescription-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
@ -618,6 +632,7 @@ ADMX Info:
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<!--EndDescription-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
@ -773,6 +788,7 @@ ADMX Info:
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<!--EndDescription-->
|
||||
> [!TIP]
|
||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - CredentialProviders
|
||||
@ -197,10 +197,14 @@ Added in Windows 10, version 1709. Boolean policy to disable the visibility of t
|
||||
|
||||
The Windows 10 Automatic ReDeployment feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the automatic redeployment is triggered the devices are for ready for use by information workers or students.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Enable the visibility of the credentials for Windows 10 Automatic ReDeployment
|
||||
- 1 - Disable visibility of the credentials for Windows 10 Automatic ReDeployment
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - DataProtection
|
||||
@ -66,14 +66,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - DeliveryOptimization
|
||||
@ -159,9 +159,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network.
|
||||
|
||||
<p style="margin-left: 20px">The default value is 0 (FALSE).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Not allowed.
|
||||
- 1 - Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -206,7 +211,9 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – HTTP only, no peering.
|
||||
- 1 (default) – HTTP blended with peering behind the same NAT.
|
||||
@ -215,7 +222,7 @@ ms.date: 11/01/2017
|
||||
- 99 - Simple download mode with no peering. Delivery Optimization downloads using HTTP only and does not attempt to contact the Delivery Optimization cloud services. Added in Windows 10, version 1607.
|
||||
- 100 - Bypass mode. Do not use Delivery Optimization and use BITS instead. Added in Windows 10, version 1607.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,12 +6,13 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - DeviceGuard
|
||||
|
||||
|
||||
|
||||
<hr/>
|
||||
|
||||
<!--StartPolicies-->
|
||||
@ -67,13 +68,16 @@ ms.date: 11/01/2017
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. Supported values:
|
||||
<ul>
|
||||
<li>0 (default) - disable virtualization based security</li>
|
||||
<li>1 - enable virtualization based security</li>
|
||||
</ul>
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - disable virtualization based security.
|
||||
- 1 - enable virtualization based security.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -113,15 +117,17 @@ ms.date: 11/01/2017
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. Supported values:
|
||||
<ul>
|
||||
<li>0 (default) - (Disabled) Turns off Credential Guard remotely if configured previously without UEFI Lock</li>
|
||||
<li>1 - (Enabled with UEFI lock) Turns on Credential Guard with UEFI lock</li>
|
||||
<li>2 - (Enabled without lock) Turns on Credential Guard without UEFI lock</li>
|
||||
|
||||
</ul>
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - (Disabled) Turns off Credential Guard remotely if configured previously without UEFI Lock.
|
||||
- 1 - (Enabled with UEFI lock) Turns on Credential Guard with UEFI lock.
|
||||
- 2 - (Enabled without lock) Turns on Credential Guard without UEFI lock.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -160,15 +166,18 @@ ms.date: 11/01/2017
|
||||
|
||||
<!--EndScope-->
|
||||
<!--StartDescription-->
|
||||
Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. Supported values:
|
||||
<ul>
|
||||
<li>1 (default) - Turns on VBS with Secure Boot. </li>
|
||||
<li>3 - Turns on VBS with Secure Boot and direct memory access (DMA). DMA requires hardware support.</li>
|
||||
</ul>
|
||||
Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer.
|
||||
|
||||
<p style="margin-left: 20px">
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 1 (default) - Turns on VBS with Secure Boot.
|
||||
- 3 - Turns on VBS with Secure Boot and direct memory access (DMA). DMA requires hardware support.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - DeviceLock
|
||||
@ -115,13 +115,15 @@ ms.date: 11/13/2017
|
||||
> [!NOTE]
|
||||
> This policy must be wrapped in an Atomic command.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Education
|
||||
@ -112,12 +112,14 @@ The policy value is expected to be the name (network host name) of an installed
|
||||
<!--StartDescription-->
|
||||
Added in Windows 10, version 1709. Allows IT Admins to prevent user installation of additional printers from the printers settings.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Allow user installation.
|
||||
- 1 – Prevent user installation.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/17/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Experience
|
||||
@ -120,14 +120,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether copy and paste is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -168,14 +170,16 @@ ms.date: 11/17/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -216,16 +220,18 @@ ms.date: 11/17/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows users to turn on/off device discovery UX.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -270,12 +276,14 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work. In Windows 10, version 1709 the user will not be able to view the location of the last use of their active digitizer on their device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -320,14 +328,16 @@ ms.date: 11/17/2017
|
||||
> The MDM server can always remotely delete the account.
|
||||
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -372,12 +382,14 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether to display dialog prompt when no SIM card is detected.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – SIM card dialog prompt is not displayed.
|
||||
- 1 (default) – SIM card dialog prompt is displayed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -422,14 +434,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether screen capture is allowed.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -470,12 +484,14 @@ ms.date: 11/17/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices).
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Sync settings is not allowed.
|
||||
- 1 (default) – Sync settings allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -523,14 +539,16 @@ ms.date: 11/17/2017
|
||||
|
||||
> **Note** This setting does not control Cortana cutomized experiences because there are separate policies to configure it.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -575,12 +593,14 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows or disallows task switching on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Task switching not allowed.
|
||||
- 1 (default) – Task switching allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -625,12 +645,14 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Third-party suggestions not allowed.
|
||||
- 1 (default) – Third-party suggestions allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -675,14 +697,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether voice recording is allowed for apps.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -727,14 +751,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -779,14 +805,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -830,14 +858,16 @@ ms.date: 11/17/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -882,14 +912,16 @@ ms.date: 11/17/2017
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy setting lets you turn off the Windows spotlight Windows welcome experience feature.
|
||||
The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -930,12 +962,14 @@ The Windows welcome experience feature introduces onboard users to Windows; for
|
||||
<!--StartDescription-->
|
||||
Enables or disables Windows Tips / soft landing.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled.
|
||||
- 1 (default) – Enabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Games
|
||||
@ -63,12 +63,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. Value type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Not Allowed
|
||||
- 1 (default) - Allowed
|
||||
|
||||
<p style="margin-left: 20px">This policy can only be turned off in Windows 10 Education and Enterprise editions.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Handwriting
|
||||
@ -69,12 +69,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way.
|
||||
|
||||
<ul>
|
||||
<li>0 - Disabled (default)</li>
|
||||
<li>1 - Enabled</li>
|
||||
</ul>
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Disabled.
|
||||
- 1 - Enabled.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Licensing
|
||||
@ -66,12 +66,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disable Windows license reactivation on managed devices.
|
||||
- 1 (default) – Enable Windows license reactivation on managed devices.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -112,12 +114,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Disabled.
|
||||
- 1 – Enabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - LocalPoliciesSecurityOptions
|
||||
@ -138,12 +138,16 @@ If you select the "Users cannot add or log on with Microsoft accounts" option, e
|
||||
|
||||
If you disable or do not configure this policy (recommended), users will be able to use Microsoft accounts with Windows.
|
||||
|
||||
Valid values:
|
||||
- 0 - disabled (users will be able to use Microsoft accounts with Windows)
|
||||
- 1 - enabled (users cannot add Microsoft accounts)
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - disabled (users will be able to use Microsoft accounts with Windows).
|
||||
- 1 - enabled (users cannot add Microsoft accounts).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1054,17 +1058,17 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
User Account Control: Behavior of the elevation prompt for standard users
|
||||
This policy setting controls the behavior of the elevation prompt for standard users.
|
||||
|
||||
The options are:
|
||||
|
||||
- 3 - Prompt for credentials: (Default) When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
- 0 - Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
|
||||
|
||||
- 1 - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Automatically deny elevation requests: When an operation requires elevation of privilege, a configurable access denied error message is displayed. An enterprise that is running desktops as standard user may choose this setting to reduce help desk calls.
|
||||
- 1 - Prompt for credentials on the secure desktop: When an operation requires elevation of privilege, the user is prompted on the secure desktop to enter a different user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
- 3 (Default) - Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - LockDown
|
||||
@ -63,14 +63,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - disallow edge swipe.
|
||||
- 1 (default, not configured) - allow edge swipe.
|
||||
|
||||
<p style="margin-left: 20px">The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Maps
|
||||
@ -66,15 +66,17 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Allows the download and update of map data over metered connections.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 65535 (default) – Not configured. User's choice.
|
||||
- 0 – Disabled. Force disable auto-update over metered connection.
|
||||
- 1 – Enabled. Force enable auto-update over metered connection.
|
||||
|
||||
<p style="margin-left: 20px">After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled. Force disable auto-update over metered connection.
|
||||
- 1 – Enabled. Force enable auto-update over metered connection.
|
||||
- 65535 (default) – Not configured. User's choice.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -115,15 +117,17 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Disables the automatic download and update of map data.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 65535 (default) – Not configured. User's choice.
|
||||
- 0 – Disabled. Force off auto-update.
|
||||
- 1 – Enabled. Force on auto-update.
|
||||
|
||||
<p style="margin-left: 20px">After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled. Force off auto-update.
|
||||
- 1 – Enabled. Force on auto-update.
|
||||
- 65535 (default) – Not configured. User's choice.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Notifications
|
||||
@ -67,12 +67,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">No reboot or service restart is required for this policy to take effect.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – enable notification mirroring.
|
||||
- 1 – disable notification mirroring.
|
||||
- 1 - disable notification mirroring.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Privacy
|
||||
@ -294,14 +294,17 @@ ms.date: 11/01/2017
|
||||
> [!Note]
|
||||
> There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default)– Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default)– Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -342,15 +345,18 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -391,15 +397,17 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Enables or disables the Advertising ID.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled.
|
||||
- 1 – Enabled.
|
||||
- 65535 (default)- Not configured.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -440,12 +448,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled. Apps/OS can't publish the activities and roaming is disabled. (not published to the cloud).
|
||||
- 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -3576,12 +3586,14 @@ The following list shows the supported values:
|
||||
<!--StartDescription-->
|
||||
Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled. Apps/OS can't publish the *user activities*.
|
||||
- 1 – (default) Enabled. Apps/OS can publish the *user activities*.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Search
|
||||
@ -146,14 +146,16 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">When the policy is disabled, the WIP protected items are not indexed and do not show up in the results in Cortana or file explorer. There may also be a performance impact on photos and Groove apps if there are a lot of WIP protected media files on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -194,14 +196,16 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether search can leverage location information.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Security
|
||||
@ -90,12 +90,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether to allow the runtime configuration agent to install provisioning packages.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -186,14 +188,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Specifies whether the user is allowed to manually install root and intermediate CA certificates.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -234,12 +238,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether to allow the runtime configuration agent to remove provisioning packages.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -284,12 +290,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows or disallow Anti Theft Mode on the device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Don't allow Anti Theft Mode.
|
||||
- 1 (default) – Anti Theft Mode will follow the default device configuration (region-dependent).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -333,12 +341,14 @@ ms.date: 11/01/2017
|
||||
|
||||
Added in Windows 10, version 1709. Admin access is required. The prompt will appear on first admin logon after a reboot when the TPM is in a non-ready state that can be remediated with a TPM Clear. The prompt will have a description of what clearing the TPM does and that it requires a reboot. The user can dismiss it, but it will appear on next admin logon after restart.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Will not force recovery from a non-ready TPM state.
|
||||
- 1 – Will prompt to clear the TPM if the TPM is in a non-ready state (or reduced functionality) which can be remediated with a TPM Clear.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Settings
|
||||
@ -103,15 +103,17 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to change Auto Play settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
> [!NOTE]
|
||||
> Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -152,12 +154,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows the user to change Data Sense settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -198,12 +202,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows the user to change date and time settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -244,12 +250,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows editing of the device name.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -294,12 +302,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to change the language settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -344,12 +354,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to change power and sleep settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -394,12 +406,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to change the region settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -444,12 +458,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to change sign-in options.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -490,12 +506,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows the user to change VPN settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -540,12 +558,14 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows user to change workplace settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -586,12 +606,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows user to change account settings.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - SmartScreen
|
||||
@ -69,12 +69,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Turns off Application Installation Control, allowing users to download and install files from anywhere on the web.
|
||||
- 1 – Turns on Application Installation Control, allowing users to only install apps from the Store.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -115,12 +117,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Turns off SmartScreen in Windows.
|
||||
- 1 – Turns on SmartScreen in Windows.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -161,12 +165,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Employees can ignore SmartScreen warnings and run malicious files.
|
||||
- 1 – Employees cannot ignore SmartScreen warnings and run malicious files.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Speech
|
||||
@ -63,12 +63,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS).
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Start
|
||||
@ -147,13 +147,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -194,13 +196,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -241,13 +245,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -288,13 +294,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -335,13 +343,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -382,13 +392,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -429,13 +441,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -476,13 +490,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -523,13 +539,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -570,13 +588,15 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – The shortcut is hidden and disables the setting in the Settings app.
|
||||
- 1 – The shortcut is visible and disables the setting in the Settings app.
|
||||
- 65535 (default) - There is no enforced configuration and the setting can be changed by the user.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -731,17 +751,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the user tile, and verify that "Change account settings" is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -785,11 +807,6 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable "Show most used apps" in the Settings app.
|
||||
@ -800,6 +817,13 @@ ms.date: 12/13/2017
|
||||
6. Check that most used apps do not appear in Start.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -840,11 +864,6 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Laptop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
@ -854,6 +873,13 @@ ms.date: 12/13/2017
|
||||
> This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -894,17 +920,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the user tile, and verify "Lock" is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -991,17 +1019,19 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, and verify the power button is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1045,11 +1075,6 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings.
|
||||
@ -1063,6 +1088,13 @@ ms.date: 12/13/2017
|
||||
9. Right Click pinned photos app and verify that there is no jumplist of recent items.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1106,11 +1138,6 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable "Show recently added apps" in the Settings app.
|
||||
@ -1121,6 +1148,13 @@ ms.date: 12/13/2017
|
||||
6. Check that recently added apps do not appear in Start.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1161,17 +1195,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1212,17 +1248,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1263,17 +1301,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the user tile, and verify "Sign out" is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1314,17 +1354,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the Power button, and verify that "Sleep" is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1365,17 +1407,19 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Open Start, click on the user tile, and verify that "Switch account" is not available.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1419,11 +1463,6 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
@ -1431,6 +1470,13 @@ ms.date: 12/13/2017
|
||||
3. Log in, and verify that the user tile is gone from Start.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (do not hide).
|
||||
- 1 - True (hide).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1527,11 +1573,6 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (pinning enabled).
|
||||
- 1 - True (pinning disabled).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
@ -1541,6 +1582,13 @@ ms.date: 12/13/2017
|
||||
5. Verify that More->Pin to taskbar menu does not show.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (pinning enabled).
|
||||
- 1 - True (pinning disabled).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/03/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - System
|
||||
@ -152,14 +152,16 @@ ms.date: 11/03/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether set general purpose device to be in embedded mode.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Not allowed.
|
||||
- 1 – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -252,11 +254,6 @@ ms.date: 11/03/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts.
|
||||
|
||||
<p style="margin-left: 20px">Supported values:
|
||||
|
||||
- false - No traffic to fs.microsoft.com and only locally-installed fonts are available.
|
||||
- true (default) - There may be network traffic to fs.microsoft.com and downloadable fonts are available to apps that support them.
|
||||
|
||||
<p style="margin-left: 20px">This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled).
|
||||
|
||||
<p style="margin-left: 20px">This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content.
|
||||
@ -269,6 +266,13 @@ ms.date: 11/03/2017
|
||||
- After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - false - No traffic to fs.microsoft.com and only locally-installed fonts are available.
|
||||
- 1 - true (default) - There may be network traffic to fs.microsoft.com and downloadable fonts are available to apps that support them.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -364,14 +368,16 @@ ms.date: 11/03/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – SD card use is not allowed and USB drives are disabled. This setting does not prevent programmatic access to the storage card.
|
||||
- 1 (default) – Allow a storage card.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -529,14 +535,17 @@ Windows 10 Values:
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
orted values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed to reset to factory default settings.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -639,11 +648,6 @@ ADMX Info:
|
||||
|
||||
<p style="margin-left: 20px">If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (sync enabled).
|
||||
- 1 – True (sync disabled).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
@ -651,6 +655,13 @@ ADMX Info:
|
||||
3. Verify that OneDrive.exe is not running in Task Manager.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – False (sync enabled).
|
||||
- 1 – True (sync disabled).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - TextInput
|
||||
@ -103,14 +103,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to turn on and off the logging for incorrect conversion and saving auto-tuning result to a file and history-based predictive input.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -155,14 +157,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -207,14 +211,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the IT admin to disable the touch/handwriting keyboard on Windows.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -311,14 +317,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows Japanese Ideographic Variation Sequence (IVS) characters.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -363,14 +371,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the Japanese non-publishing standard glyph.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -415,14 +425,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the Japanese user dictionary.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -466,11 +478,6 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled.
|
||||
- 1 (default) – Enabled.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<p style="margin-left: 20px">To validate that text prediction is disabled on Windows 10 for desktop, do the following:
|
||||
@ -480,6 +487,13 @@ ms.date: 11/01/2017
|
||||
3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Disabled.
|
||||
- 1 (default) – Enabled.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -533,14 +547,16 @@ ms.date: 11/01/2017
|
||||
|
||||
<p style="margin-left: 20px">Allows the uninstall of language features, such as spell checkers, on a device.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - TimeLanguageSettings
|
||||
@ -63,12 +63,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Locale default setting.
|
||||
- 1 (default) – Set 24 hour clock.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Update
|
||||
@ -493,14 +493,16 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
|
||||
<p style="margin-left: 20px">Supported operations are Get and Replace.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed or not configured. Updates from an intranet Microsoft update service location must be signed by Microsoft.
|
||||
- 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer.
|
||||
|
||||
<p style="margin-left: 20px">This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -545,15 +547,17 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
|
||||
<p style="margin-left: 20px">Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft Store to stop working.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – Update service is not allowed.
|
||||
- 1 (default) – Update service is allowed.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Update service is not allowed.
|
||||
- 1 (default) – Update service is allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -639,11 +643,13 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications.
|
||||
|
||||
<p style="margin-left: 20px">Supported values are 15, 30, 60, 120, and 240 (minutes).
|
||||
|
||||
<p style="margin-left: 20px">The default value is 15 (minutes).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
Supported values are 15, 30, 60, 120, and 240 (minutes).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -730,7 +736,9 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 2 {0x2} - Windows Insider build - Fast (added in Windows 10, version 1709)
|
||||
- 4 {0x4} - Windows Insider build - Slow (added in Windows 10, version 1709)
|
||||
@ -738,7 +746,7 @@ This policy is accessible through the Update setting in the user interface or Gr
|
||||
- 16 {0x10} - (default) Semi-annual Channel (Targeted). Device gets all applicable feature updates from Semi-annual Channel (Targeted).
|
||||
- 32 {0x20} - Semi-annual Channel. Device gets feature updates from Semi-annual Channel.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1384,10 +1392,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
> [!WARNING]
|
||||
> Setting this policy might cause devices to incur costs from MO operators.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Do not ignore MO download limit for apps and their updates.
|
||||
- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates.
|
||||
|
||||
<p style="margin-left: 20px">To validate this policy:
|
||||
|
||||
@ -1400,6 +1404,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
3. Verify that any downloads that are above the download size limit will complete without being paused.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Do not ignore MO download limit for apps and their updates.
|
||||
- 1 – Ignore MO download limit (allow unlimited downloading) for apps and their updates.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1443,10 +1454,6 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
> [!WARNING]
|
||||
> Setting this policy might cause devices to incur costs from MO operators.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Do not ignore MO download limit for OS updates.
|
||||
- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates.
|
||||
|
||||
<p style="margin-left: 20px">To validate this policy:
|
||||
|
||||
@ -1457,6 +1464,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
3. Verify that any downloads that are above the download size limit will complete without being paused.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) – Do not ignore MO download limit for OS updates.
|
||||
- 1 – Ignore MO download limit (allow unlimited downloading) for OS updates.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1881,11 +1895,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications.
|
||||
|
||||
<p style="margin-left: 20px">Supported values are 15, 30, or 60 (minutes).
|
||||
|
||||
<p style="margin-left: 20px">The default value is 15 (minutes).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
Supported values are 15, 30, or 60 (minutes).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -1930,11 +1946,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
|
||||
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications.
|
||||
|
||||
<p style="margin-left: 20px">Supported values are 2, 4, 8, 12, or 24 (hours).
|
||||
|
||||
<p style="margin-left: 20px">The default value is 4 (hours).
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
Supported values are 2, 4, 8, 12, or 24 (hours).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - Wifi
|
||||
@ -90,14 +90,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allow or disallow the device to automatically connect to Wi-Fi hotspots.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Not allowed.
|
||||
- 1 (default) – Allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -138,14 +140,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allow or disallow internet sharing.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – Do not allow the use of Internet Sharing.
|
||||
- 1 (default) – Allow the use of Internet Sharing.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -186,17 +190,19 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
|
||||
- 0 – No Wi-Fi connection outside of MDM provisioned network is allowed.
|
||||
- 1 (default) – Adding new network SSIDs beyond the already MDM provisioned ones is allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
> [!NOTE]
|
||||
> Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – No Wi-Fi connection outside of MDM provisioned network is allowed.
|
||||
- 1 (default) – Adding new network SSIDs beyond the already MDM provisioned ones is allowed.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -237,14 +243,16 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Allow or disallow WiFi connection.
|
||||
|
||||
<p style="margin-left: 20px">The following list shows the supported values:
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 – WiFi connection is not allowed.
|
||||
- 1 (default) – WiFi connection is allowed.
|
||||
|
||||
<p style="margin-left: 20px">Most restricted value is 0.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -285,10 +293,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Allow WiFi Direct connection..
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - WiFi Direct connection is not allowed.
|
||||
- 1 - WiFi Direct connection is allowed.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/01/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - WindowsInkWorkspace
|
||||
@ -66,12 +66,14 @@ ms.date: 11/01/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace.
|
||||
|
||||
<p style="margin-left: 20px">Value type is bool. The following list shows the supported values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - app suggestions are not allowed.
|
||||
- 1 (default) -allow app suggestions.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 11/29/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - WindowsLogon
|
||||
@ -189,17 +189,19 @@ ADMX Info:
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations.
|
||||
|
||||
<p style="margin-left: 20px">Value type is int. The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Disabled (visible).
|
||||
- 1 - Enabled (hidden).
|
||||
|
||||
<p style="margin-left: 20px">To validate on Desktop, do the following:
|
||||
|
||||
1. Enable policy.
|
||||
2. Verify that the Switch account button in Start is hidden.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - Disabled (visible).
|
||||
- 1 - Enabled (hidden).
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: nickbrower
|
||||
ms.date: 12/13/2017
|
||||
ms.date: 12/14/2017
|
||||
---
|
||||
|
||||
# Policy CSP - WirelessDisplay
|
||||
@ -84,10 +84,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Do not allow
|
||||
- 1 - Allow
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -128,10 +132,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Do not allow
|
||||
- 1 - Allow
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -172,10 +180,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - your PC cannot discover or project to other devices.
|
||||
- 1 - your PC can discover and project to other devices
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -216,10 +228,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - your PC cannot discover or project to other infrastructure devices, although it is possible to discover and project over WiFi Direct.
|
||||
- 1 - your PC can discover and project to other devices over infrastructure.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -262,12 +278,16 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**.
|
||||
|
||||
<p style="margin-left: 20px">Value type is integer. Valid value:
|
||||
<p style="margin-left: 20px">Value type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - projection to PC is not allowed. Always off and the user cannot enable it.
|
||||
- 1 (default) - projection to PC is allowed. Enabled only above the lock screen.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -308,10 +328,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - your PC is not discoverable and other devices cannot project to it over infrastructure, although it is possible to project to it over WiFi Direct.
|
||||
- 1 - your PC is discoverable and other devices can project to it over infrastructure.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -329,12 +353,14 @@ ms.date: 12/13/2017
|
||||
<!--StartDescription-->
|
||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Setting this policy controls whether or not the wireless display can send input—keyboard, mouse, pen, and touch input if the display supports it—back to the source device.
|
||||
|
||||
<p style="margin-left: 20px">Allowed values:
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 - Wireless display input disabled.
|
||||
- 1 (default) - Wireless display input enabled.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
<!--StartPolicy-->
|
||||
@ -377,12 +403,16 @@ ms.date: 12/13/2017
|
||||
|
||||
<p style="margin-left: 20px">If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**.
|
||||
|
||||
<p style="margin-left: 20px">Value type is integer. Valid value:
|
||||
<p style="margin-left: 20px">Value type is integer.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--SupportedValues-->
|
||||
The following list shows the supported values:
|
||||
|
||||
- 0 (default) - PIN is not required.
|
||||
- 1 - PIN is required.
|
||||
|
||||
<!--EndDescription-->
|
||||
<!--/SupportedValues-->
|
||||
<!--EndPolicy-->
|
||||
<hr/>
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user