mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-29 05:37:22 +00:00
validated the image path
This commit is contained in:
parent
4581a1c3fc
commit
49fc40e36d
@ -1,15 +1,14 @@
|
||||
---
|
||||
description: Microsoft Edge now has new Group Policies and MDM Settings for IT administrators to configure Microsoft Edge. The new policies allow you to enable/disabled full-screen mode, printing, favorites bar, saving history. You can also prevent certificate error overrides, and configure New tab page, Home button and startup options, as well as manage extensions.
|
||||
ms.assetid:
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.prod: edge
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
title: New Microsoft Edge Group Policies and MDM settings
|
||||
ms.localizationpriority:
|
||||
ms.date: 07/25/2018
|
||||
ms.localizationpriority: medium
|
||||
author: shortpatti
|
||||
ms.author: pashort
|
||||
ms.date: 07/25/2018
|
||||
---
|
||||
|
||||
# New Microsoft Edge Group Policies and MDM settings (Preview)
|
||||
@ -27,7 +26,7 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis
|
||||
>>
|
||||
>> **_Computer Configuration\\Administrative Templates\\Windows Components\\Microsoft Edge\\_**
|
||||
<p>
|
||||
<!-- add links to the below policies -->
|
||||
<!-- links to the policies -->
|
||||
|
||||
|
||||
| **Group Policy** | **New/update?** | **MDM Setting** | **New/update?** |
|
||||
@ -76,7 +75,6 @@ We are discontinuing the **Configure Favorites** group policy. Use the **[Provis
|
||||
## Allow sideloading of Extensions
|
||||
[!INCLUDE [allow-sideloading-extensions-include.md](includes/allow-sideloading-extensions-include.md)]
|
||||
|
||||
|
||||
## Configure collection of browsing data for Microsoft 365 Analytics
|
||||
[!INCLUDE [configure-browser-telemetry-for-m365-analytics-include](includes/configure-browser-telemetry-for-m365-analytics-include.md)]
|
||||
|
||||
|
@ -48,5 +48,5 @@ While Windows Defender System Guard provides advanced protection that will help
|
||||
|
||||
As Windows 10 boots, a series of integrity measurements are taken by Windows Defender System Guard using the device’s Trusted Platform Module 2.0 (TPM 2.0). This process and data are hardware-isolated away from Windows to help ensure that the measurement data is not subject to the type of tampering that could happen if the platform was compromised. From here, the measurements can be used to determine the integrity of the device’s firmware, hardware configuration state, and Windows boot-related components, just to name a few. After the system boots, Windows Defender System Guard signs and seals these measurements using the TPM. Upon request, a management system like Intune or System Center Configuration Manager can acquire them for remote analysis. If Windows Defender System Guard indicates that the device lacks integrity, the management system can take a series of actions, such as denying the device access to resources.
|
||||
|
||||

|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user