mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into msfb-12117503
This commit is contained in:
commit
4bc34a3af5
@ -1,6 +1,11 @@
|
|||||||
{
|
{
|
||||||
"redirections": [
|
"redirections": [
|
||||||
{
|
{
|
||||||
|
"source_path": "windows/device-security/windows-security-baselines.md",
|
||||||
|
"redirect_url": "https://www.microsoft.com/download/details.aspx?id=55319",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
"source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md",
|
"source_path": "education/windows/windows-10-pro-to-pro-edu-upgrade.md",
|
||||||
"redirect_url": "/education/windows/switch-to-pro-education",
|
"redirect_url": "/education/windows/switch-to-pro-education",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
@ -207,6 +207,25 @@ author: CelesteDG
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="/education/windows/education-pro-usb">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="/media/hubs/education/education-pro-usb.svg" alt="Set up School PCs" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Set up School PCs</h3>
|
||||||
|
<p>Use the app to create a provisioning package that you can use to quickly set up one or more Windows 10 devices.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
@ -331,6 +350,25 @@ author: CelesteDG
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="/education/windows/education-pro-usb">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="/media/hubs/education/education-pro-usb.svg" alt="Set up School PCs" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Set up School PCs</h3>
|
||||||
|
<p>Use the app to create a provisioning package that you can use to quickly set up one or more Windows 10 devices.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
@ -64,7 +64,7 @@ You can configure Windows through provisioning or management tools including ind
|
|||||||
|
|
||||||
You can set all the education compliance areas through both provisioning and management tools. Additionally, these Microsoft education tools will ensure PCs that you set up are education ready:
|
You can set all the education compliance areas through both provisioning and management tools. Additionally, these Microsoft education tools will ensure PCs that you set up are education ready:
|
||||||
- [Set up School PCs](use-set-up-school-pcs-app.md)
|
- [Set up School PCs](use-set-up-school-pcs-app.md)
|
||||||
- Intune for Education (coming soon)
|
- [Intune for Education](https://docs.microsoft.com/en-us/intune-education/available-settings)
|
||||||
|
|
||||||
## AllowCortana
|
## AllowCortana
|
||||||
**AllowCortana** is a policy that enables or disables Cortana. It is a policy node in the Policy configuration service provider, [AllowCortana](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowcortana).
|
**AllowCortana** is a policy that enables or disables Cortana. It is a policy node in the Policy configuration service provider, [AllowCortana](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#experience-allowcortana).
|
||||||
@ -145,7 +145,7 @@ Provide an ad-free experience that is a safer, more private search option for K
|
|||||||
### Configurations
|
### Configurations
|
||||||
|
|
||||||
#### IP registration for entire school network using Microsoft Edge
|
#### IP registration for entire school network using Microsoft Edge
|
||||||
Ad-free searching with Bing in Microsoft Edge can be configured at the network level. To configure this, email bicteam@microsoft.com with the subject "New Windows 10, version 1703 (Creators Update) Registration: [School District Name]" and the include the following information in the body of the email.
|
Ad-free searching with Bing in Microsoft Edge can be configured at the network level. To configure this, email bingintheclassroom@microsoft.com with the subject "New Windows 10, version 1703 (Creators Update) Registration: [School District Name]" and the include the following information in the body of the email.
|
||||||
|
|
||||||
**District information**
|
**District information**
|
||||||
- **District or School Name:**
|
- **District or School Name:**
|
||||||
|
@ -198,6 +198,8 @@
|
|||||||
#### [SUPL DDF file](supl-ddf-file.md)
|
#### [SUPL DDF file](supl-ddf-file.md)
|
||||||
### [SurfaceHub CSP](surfacehub-csp.md)
|
### [SurfaceHub CSP](surfacehub-csp.md)
|
||||||
#### [SurfaceHub DDF file](surfacehub-ddf-file.md)
|
#### [SurfaceHub DDF file](surfacehub-ddf-file.md)
|
||||||
|
### [TPMPolicy CSP](tpmpolicy-csp.md)
|
||||||
|
#### [TPMPolicy DDF file](tpmpolicy-ddf-file.md)
|
||||||
### [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
### [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
||||||
#### [UnifiedWriteFilter DDF file](unifiedwritefilter-ddf.md)
|
#### [UnifiedWriteFilter DDF file](unifiedwritefilter-ddf.md)
|
||||||
### [Update CSP](update-csp.md)
|
### [Update CSP](update-csp.md)
|
||||||
|
@ -11,6 +11,9 @@ author: nickbrower
|
|||||||
|
|
||||||
# Configuration service provider reference
|
# Configuration service provider reference
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot.
|
A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot.
|
||||||
|
|
||||||
For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/hardware/dn905224).
|
For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/hardware/dn905224).
|
||||||
@ -1164,10 +1167,10 @@ The following tables show the configuration service providers support in Windows
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
</tr>
|
</tr>
|
||||||
@ -2044,6 +2047,34 @@ The following tables show the configuration service providers support in Windows
|
|||||||
<!--EndSKU-->
|
<!--EndSKU-->
|
||||||
<!--EndCSP-->
|
<!--EndCSP-->
|
||||||
|
|
||||||
|
<!--StartCSP-->
|
||||||
|
[TPMPolicy CSP](tpmpolicy-csp.md)
|
||||||
|
|
||||||
|
<!--StartSKU-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--EndSKU-->
|
||||||
|
<!--EndCSP-->
|
||||||
|
|
||||||
<!--StartCSP-->
|
<!--StartCSP-->
|
||||||
[UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
[UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
||||||
|
|
||||||
@ -2358,7 +2389,8 @@ The following tables show the configuration service providers support in Windows
|
|||||||
|
|
||||||
Footnotes:
|
Footnotes:
|
||||||
- 1 - Added in Windows 10, version 1607
|
- 1 - Added in Windows 10, version 1607
|
||||||
- 2 - Added in Windows 10, version 1703
|
- 2 - Added in Windows 10, version 1703
|
||||||
|
- 3 - Added in the next major update to Windows 10
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> You can download the Windows 10 version 1607 DDF files from [here](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip).
|
> You can download the Windows 10 version 1607 DDF files from [here](http://download.microsoft.com/download/2/3/E/23E27D6B-6E23-4833-B143-915EDA3BDD44/Windows10_1607_DDF.zip).
|
||||||
|
@ -13,10 +13,12 @@ author: nickbrower
|
|||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage both domain joined and non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP is new in the next major update to Windows 10.
|
The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP is new in the next major update to Windows 10.
|
||||||
|
|
||||||
Firewall configuration commands must be wrapped in an Atomic block in SyncML.
|
Firewall configuration commands must be wrapped in an Atomic block in SyncML.
|
||||||
|
|
||||||
|
For detailed information on some of the fields below see [[MS-FASP]: Firewall and Advanced Security Protocol documentation](https://msdn.microsoft.com/en-us/library/mt620101.aspx).
|
||||||
|
|
||||||
The following diagram shows the Firewall configuration service provider in tree format.
|
The following diagram shows the Firewall configuration service provider in tree format.
|
||||||
|
|
||||||

|

|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 3.2 KiB |
@ -14,6 +14,8 @@ author: nickbrower
|
|||||||
|
|
||||||
# What's new in MDM enrollment and management
|
# What's new in MDM enrollment and management
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
This topic provides information about what's new and breaking changes in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices.
|
This topic provides information about what's new and breaking changes in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices.
|
||||||
|
|
||||||
@ -892,6 +894,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
<li>[Policy CSP](policy-configuration-service-provider.md)</li>
|
<li>[Policy CSP](policy-configuration-service-provider.md)</li>
|
||||||
</ul>
|
</ul>
|
||||||
</td></tr>
|
</td></tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td style="vertical-align:top">[TPMPolicy CSP](tpmpolicy-csp.md)</td>
|
||||||
|
<td style="vertical-align:top">New CSP added in Windows 10, version 1703.</td>
|
||||||
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
@ -1180,7 +1186,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
<td style="vertical-align:top">[Win32 and Desktop Bridge app policy configuration](win32-and-centennial-app-policy-configuration.md)</td>
|
<td style="vertical-align:top">[Win32 and Desktop Bridge app policy configuration](win32-and-centennial-app-policy-configuration.md)</td>
|
||||||
<td style="vertical-align:top">Added a list of registry locations that ingested policies are allowed to write to.</td>
|
<td style="vertical-align:top">Added a list of registry locations that ingested policies are allowed to write to.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td style="vertical-align:top">[Firewall CSP](firewall-csp.md)</td>
|
<td style="vertical-align:top">[Firewall CSP](firewall-csp.md)</td>
|
||||||
<td style="vertical-align:top">Added the following nodes:
|
<td style="vertical-align:top">Added the following nodes:
|
||||||
<ul>
|
<ul>
|
||||||
@ -1191,6 +1197,10 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
<li>Status</li>
|
<li>Status</li>
|
||||||
</ul>
|
</ul>
|
||||||
Also Added [Firewall DDF file](firewall-ddf-file.md).</td></tr>
|
Also Added [Firewall DDF file](firewall-ddf-file.md).</td></tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td style="vertical-align:top">[TPMPolicy CSP](tpmpolicy-csp.md)</td>
|
||||||
|
<td style="vertical-align:top">New CSP added in Windows 10, version 1703.</td>
|
||||||
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
File diff suppressed because it is too large
Load Diff
55
windows/client-management/mdm/tpmpolicy-csp.md
Normal file
55
windows/client-management/mdm/tpmpolicy-csp.md
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
---
|
||||||
|
title: TPMPolicy CSP
|
||||||
|
description: TPMPolicy CSP
|
||||||
|
ms.author: maricia
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w10
|
||||||
|
ms.technology: windows
|
||||||
|
author: nickbrower
|
||||||
|
---
|
||||||
|
|
||||||
|
# TPMPolicy CSP
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
The TPMPolicy configuration service provider (CSP) provides a mechanism to enable zero exhaust configuration on a Windows device for TPM software components. Zero exhaust is defined as no network traffic (telemetry or otherwise, such as downloading background images, Windows Updates, etc.) from Windows and inbox applications to public IP addresses unless directly intended by the user. This allows the enterprise admin to configure devices where no network communication is initiated by the system without explicit approval.
|
||||||
|
|
||||||
|
The TPMPolicy CSP was added in Windows 10, version 1703.
|
||||||
|
|
||||||
|
The following diagram shows the TPMPolicy configuration service provider in tree format.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
<a href="" id="--device-vendor-msft-tpmpolicy"></a>**./Device/Vendor/MSFT/TPMPolicy**
|
||||||
|
<p style="margin-left: 20px">Defines the root node.</p>
|
||||||
|
|
||||||
|
<a href="" id="isactivezeroexhaust"></a>**IsActiveZeroExhaust**
|
||||||
|
<p style="margin-left: 20px">Boolean value that indicates whether network traffic from the device to public IP addresses are not allowed unless directly intended by the user (zero exhaust). Default value is false. Some examples when zero exhaust is configured:</p>
|
||||||
|
|
||||||
|
<ul>
|
||||||
|
<li>There should be no traffic when machine is on idle. When the user is not interacting with the system/device, no traffic is expected. </li>
|
||||||
|
<li>There should be no traffic during installation of Windows and first logon when local ID is used.</li>
|
||||||
|
<li>Launching and using a local app (Notepad, Paint, etc.) should not send any traffic. Similarly, performing common tasks (clicking on start menu, browsing folders, etc.) should not send any traffic.</li>
|
||||||
|
<li>Launching and using Internet enabled apps should not send any unexpected traffic (for maintenance, diagnostic, telemetry, etc.) to Microsoft.</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
Here is an example:
|
||||||
|
|
||||||
|
``` syntax
|
||||||
|
<Replace>
|
||||||
|
<CmdID>101</CmdID>
|
||||||
|
<Item>
|
||||||
|
<Target>
|
||||||
|
<LocURI>
|
||||||
|
./Vendor/MSFT/TpmPolicy/IsActiveZeroExhaust
|
||||||
|
</LocURI>
|
||||||
|
</Target>
|
||||||
|
<Meta>
|
||||||
|
<Format>bool</Format>
|
||||||
|
<Type>text/plain</Type>
|
||||||
|
</Meta>
|
||||||
|
<Data>true</Data>
|
||||||
|
</Item>
|
||||||
|
</Replace>
|
||||||
|
```
|
71
windows/client-management/mdm/tpmpolicy-ddf-file.md
Normal file
71
windows/client-management/mdm/tpmpolicy-ddf-file.md
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
---
|
||||||
|
title: TPMPolicy DDF file
|
||||||
|
description: TPMPolicy DDF file
|
||||||
|
ms.author: maricia
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w10
|
||||||
|
ms.technology: windows
|
||||||
|
author: nickbrower
|
||||||
|
---
|
||||||
|
|
||||||
|
# TPMPolicy DDF file
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||||
|
|
||||||
|
This topic shows the OMA DM device description framework (DDF) for the **TPMPolicy** configuration service provider. The TPMPolicy CSP was added in Windows 10, version 1703.
|
||||||
|
|
||||||
|
The XML below is the current version for this CSP.
|
||||||
|
|
||||||
|
``` syntax
|
||||||
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
|
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN"
|
||||||
|
"http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd"
|
||||||
|
[<?oma-dm-ddf-ver supported-versions="1.2"?>]>
|
||||||
|
<MgmtTree xmlns:MSFT="http://schemas.microsoft.com/MobileDevice/DM">
|
||||||
|
<VerDTD>1.2</VerDTD>
|
||||||
|
<Node>
|
||||||
|
<NodeName>TPMPolicy</NodeName>
|
||||||
|
<Path>./Vendor/MSFT</Path>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
</AccessType>
|
||||||
|
<DFFormat>
|
||||||
|
<node />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>com.microsoft/1.0/MDM/TPMPolicy</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
<Node>
|
||||||
|
<NodeName>IsActiveZeroExhaust</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<DefaultValue>False</DefaultValue>
|
||||||
|
<DFFormat>
|
||||||
|
<bool />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Permanent />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
</Node>
|
||||||
|
</MgmtTree>
|
||||||
|
```
|
@ -1,74 +0,0 @@
|
|||||||
---
|
|
||||||
title: Windows security baselines (Windows 10)
|
|
||||||
description: Use this topic to learn what security baselines are and how you can use them in your organization to help keep your devices secure.
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: deploy
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
localizationpriority: high
|
|
||||||
author: brianlic-msft
|
|
||||||
---
|
|
||||||
|
|
||||||
# Windows security baselines
|
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows Server 2016
|
|
||||||
- Windows Server 2012 R2
|
|
||||||
|
|
||||||
Microsoft is dedicated to provide our customers with a secure operating system, such as Windows 10 and Windows Server, as well as secure apps, such as Microsoft Edge. In addition to the security assurance of its products, Microsoft also enables you to have fine control of your environments by providing various configuration capabilities. Even though Windows and Windows Server are designed to be secure out-of-the-box, a large number of organizations still want more granular control of their security configurations. To navigate these large number of controls, organizations need guidance for configuring various security features. Microsoft provides this guidance in the form of security baselines.
|
|
||||||
|
|
||||||
We recommend implementing an industry-standard configuration that is broadly known and well-tested, such as a Microsoft security baseline, as opposed to creating one yourself. This helps increase flexibility and reduce costs.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Microsoft Security Compliance Manager 4.0 is available from the [Microsoft Download Center](https://www.microsoft.com/en-us/download/details.aspx?id=53353).
|
|
||||||
|
|
||||||
## What are security baselines?
|
|
||||||
|
|
||||||
Every organization faces security threats. However, the types of security threats that are of most concern to one organization can be completely different from another organization. For example, an e-commerce company may focus on protecting their Internet-facing web apps, while a hospital may focus on protecting confidential patient information. The one thing that all organizations have in common is a need to keep their apps and devices secure. These devices must be compliant with the security standards (or security baselines) defined by the organization.
|
|
||||||
|
|
||||||
A security baseline is a collection of settings that have a security impact and include Microsoft’s recommended value for configuring those settings along with guidance on the security impact of those settings. These settings are based on feedback from Microsoft security engineering teams, product groups, partners, and
|
|
||||||
customers.
|
|
||||||
|
|
||||||
## Why are security baselines needed?
|
|
||||||
|
|
||||||
Security baselines are an essential benefit to customers because they bring together expert knowlege from Microsoft, partners, and customers.
|
|
||||||
|
|
||||||
For example, there are over 3,000 Group Policy settings for Windows 10, which does not include over 1,800 Internet Explorer 11 settings. Of those 4,800 settings, only some of them are security-related. While Microsoft provides extensive guidance on different security features, going through each of them can take a long time. You would have to determine the security impact of each setting on your own. After you've done that, you still need to determine what values each of these settings should be.
|
|
||||||
|
|
||||||
In modern organizations, the security threat landscape is constantly evolving. IT pros and policy makers must keep current with security threats and changes to Windows security settings to help mitigate these threats.
|
|
||||||
|
|
||||||
To help faster deployments and increase the ease of managing Windows, Microsoft provides customers with security baselines that are available in formats that can be consumed, such as Group Policy Objects backups.
|
|
||||||
|
|
||||||
## How can you use security baselines?
|
|
||||||
|
|
||||||
You can use security baselines to:
|
|
||||||
|
|
||||||
- Ensure that user and device configuration settings are compliant with the baseline.
|
|
||||||
- Set configuration settings. For example, you can use Group Policy, System Center Configuration Manager, or Microsoft Intune to configure a device with the setting values specified in the baseline.
|
|
||||||
|
|
||||||
## Where can I get the security baselines?
|
|
||||||
|
|
||||||
Here's a list of security baselines that are currently available.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If you want to know what has changed with each security baseline, or if you want to stay up-to-date on what’s happening with them, check out the [Microsoft Security Guidance](http://blogs.technet.microsoft.com/secguide) blog.
|
|
||||||
|
|
||||||
### Windows 10 security baselines
|
|
||||||
|
|
||||||
- [Windows 10, version 1607 and Windows Server 2016 security baseline](https://go.microsoft.com/fwlink/?linkid=831663)
|
|
||||||
- [Windows 10, Version 1511 security baseline](https://go.microsoft.com/fwlink/p/?LinkID=799381)
|
|
||||||
- [Windows 10, Version 1507 security baseline](https://go.microsoft.com/fwlink/p/?LinkID=799380)
|
|
||||||
|
|
||||||
### Windows Server security baselines
|
|
||||||
|
|
||||||
- [Windows 10, version 1607 and Windows Server 2016 security baseline](https://go.microsoft.com/fwlink/?linkid=831663)
|
|
||||||
- [Windows Server 2012 R2 security baseline](https://go.microsoft.com/fwlink/p/?LinkID=799382)
|
|
||||||
|
|
||||||
## How can I monitor security baseline deployments?
|
|
||||||
|
|
||||||
Microsoft’s Operation Management Services (OMS) helps you monitor security baseline deployments across your servers. To find out more, check out [Operations Management Suite](https://aka.ms/omssecscm).
|
|
||||||
|
|
||||||
You can use [System Center Configuration Manager](https://www.microsoft.com/cloud-platform/system-center-configuration-manager) to monitor security baseline deployments on client devices within your organization.
|
|
||||||
|
|
Loading…
x
Reference in New Issue
Block a user