fix: MD019/no-multiple-space-atx

Multiple spaces after hash on atx style heading
This commit is contained in:
Nick Schonning 2019-08-06 00:44:21 -04:00
parent d7f3203284
commit 4cc0773fe8
37 changed files with 1655 additions and 1655 deletions

View File

@ -6,7 +6,7 @@ author: lomayor
ms.prod: ie11 ms.prod: ie11
ms.assetid: b2dfc08c-78af-4c22-8867-7be3b92b1616 ms.assetid: b2dfc08c-78af-4c22-8867-7be3b92b1616
ms.reviewer: ms.reviewer:
audience: itpro manager: dansimp manager: dansimp
ms.author: lomayor ms.author: lomayor
title: Install Internet Explorer 11 (IE11) using Microsoft Intune (Internet Explorer 11 for IT Pros) title: Install Internet Explorer 11 (IE11) using Microsoft Intune (Internet Explorer 11 for IT Pros)
ms.sitesec: library ms.sitesec: library
@ -14,7 +14,7 @@ ms.date: 07/27/2017
--- ---
# Install Internet Explorer 11 (IE11) using Microsoft Intune # Install Internet Explorer 11 (IE11) using Microsoft Intune
Internet Explorer 11 is available as an update in Microsoft Intune. Microsoft Intune uses Windows cloud services to help you manage updates, monitor and protect your computers, provide remote assistance, track hardware and software inventory, and set security policies. For more information, see the [Documentation Library for Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=301805). Internet Explorer 11 is available as an update in Microsoft Intune. Microsoft Intune uses Windows cloud services to help you manage updates, monitor and protect your computers, provide remote assistance, track hardware and software inventory, and set security policies. For more information, see the [Documentation Library for Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=301805).
## Adding and deploying the IE11 package ## Adding and deploying the IE11 package

View File

@ -6,7 +6,7 @@ author: lomayor
ms.prod: ie11 ms.prod: ie11
ms.assetid: 9cbf5abd-86f7-42b6-9810-0b606bbe8218 ms.assetid: 9cbf5abd-86f7-42b6-9810-0b606bbe8218
ms.reviewer: ms.reviewer:
audience: itpro manager: dansimp manager: dansimp
ms.author: lomayor ms.author: lomayor
title: Use the Platform Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) title: Use the Platform Selection page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library ms.sitesec: library
@ -14,7 +14,7 @@ ms.date: 07/27/2017
--- ---
# Use the Platform Selection page in the IEAK 11 Wizard # Use the Platform Selection page in the IEAK 11 Wizard
The **Platform Selection** page of the Internet Explorer Customization Wizard 11 lets you pick the operating system and architecture (32-bit or 64-bit) for the devices on which youre going to install the custom installation package. The **Platform Selection** page of the Internet Explorer Customization Wizard 11 lets you pick the operating system and architecture (32-bit or 64-bit) for the devices on which youre going to install the custom installation package.
**To use the Platform Selection page** **To use the Platform Selection page**

View File

@ -6,7 +6,7 @@ author: lomayor
ms.prod: ie11 ms.prod: ie11
ms.assetid: f715668f-a50d-4db0-b578-e6526fbfa1fc ms.assetid: f715668f-a50d-4db0-b578-e6526fbfa1fc
ms.reviewer: ms.reviewer:
audience: itpro manager: dansimp manager: dansimp
ms.author: lomayor ms.author: lomayor
title: Use the Programs page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros) title: Use the Programs page in the IEAK 11 Wizard (Internet Explorer Administration Kit 11 for IT Pros)
ms.sitesec: library ms.sitesec: library
@ -14,7 +14,7 @@ ms.date: 07/27/2017
--- ---
# Use the Programs page in the IEAK 11 Wizard # Use the Programs page in the IEAK 11 Wizard
The **Programs** page of the Internet Explorer Customization Wizard 11 lets you pick the default programs to use for Internet services, like email, contact lists, and newsgroups, by importing settings from your computer. The **Programs** page of the Internet Explorer Customization Wizard 11 lets you pick the default programs to use for Internet services, like email, contact lists, and newsgroups, by importing settings from your computer.
**Important**<br>The customizations you make on this page only apply to Internet Explorer for the desktop. **Important**<br>The customizations you make on this page only apply to Internet Explorer for the desktop.

View File

@ -14,7 +14,7 @@ ms.reviewer:
manager: dansimp manager: dansimp
--- ---
# Upgrade Surface devices to Windows 10 with Microsoft Deployment Toolkit # Upgrade Surface devices to Windows 10 with Microsoft Deployment Toolkit
#### Applies to #### Applies to
* Surface Pro 3 * Surface Pro 3

View File

@ -42,7 +42,7 @@ S mode is an enhanced security mode of Windows 10 streamlined for security a
|Credential Guard | | | | X | |Credential Guard | | | | X |
|Device Guard | | | | X | |Device Guard | | | | X |
### Windows 10 in S mode is safe, secure, and fast. ### Windows 10 in S mode is safe, secure, and fast.
However, in some limited scenarios, you might need to switch to Windows 10 Education. You can switch devices running Windows 10, version 1709 or later. Use the following information to switch to Windows 10 Pro through the Microsoft Store. However, in some limited scenarios, you might need to switch to Windows 10 Education. You can switch devices running Windows 10, version 1709 or later. Use the following information to switch to Windows 10 Pro through the Microsoft Store.
## How to switch ## How to switch

View File

@ -19,7 +19,7 @@ ms.date: 06/16/2016
If you plan to use a server-based deployment scenario for your Microsoft Application Virtualization environment, it is important to understand the differences between the *Application Virtualization Management Server* and the *Application Virtualization Streaming Server*. This topic describes those differences and also provides information about package delivery methods, transmission protocols, and external components that you will need to consider as you proceed with your deployment. If you plan to use a server-based deployment scenario for your Microsoft Application Virtualization environment, it is important to understand the differences between the *Application Virtualization Management Server* and the *Application Virtualization Streaming Server*. This topic describes those differences and also provides information about package delivery methods, transmission protocols, and external components that you will need to consider as you proceed with your deployment.
## Application Virtualization Management Server ## Application Virtualization Management Server
The Application Virtualization Management Server performs both the publishing function and the streaming function. The server publishes application icons, shortcuts, and file type associations to the App-V clients for authorized users. When user requests for applications are received the server streams that data on-demand to authorized users using RTSP or RTSPS protocols. In most configurations using this server, one or more Management Servers share a common data store for configuration and package information. The Application Virtualization Management Server performs both the publishing function and the streaming function. The server publishes application icons, shortcuts, and file type associations to the App-V clients for authorized users. When user requests for applications are received the server streams that data on-demand to authorized users using RTSP or RTSPS protocols. In most configurations using this server, one or more Management Servers share a common data store for configuration and package information.
@ -28,7 +28,7 @@ The Application Virtualization Management Servers use Active Directory groups to
Because the Application Virtualization Management Servers stream applications to end-users on demand, these servers are ideally suited for system configurations that have reliable, high-bandwidth LANs. Because the Application Virtualization Management Servers stream applications to end-users on demand, these servers are ideally suited for system configurations that have reliable, high-bandwidth LANs.
## Application Virtualization Streaming Server ## Application Virtualization Streaming Server
The Application Virtualization Streaming Server delivers the same streaming and package upgrade capabilities provided by the Management Server, but without its Active Directory or SQL Server requirements. However, the Streaming Server does not have a publishing service, nor does it have licensing or metering capabilities. The publishing service of a separate App-V Management Server is used in conjunction with the App-V Streaming Server. The App-V Streaming Server addresses the needs of businesses that want to use Application Virtualization in multiple locations with the streaming capabilities of the classic server configuration but might not have the infrastructure to support App-V Management Servers in every location. The Application Virtualization Streaming Server delivers the same streaming and package upgrade capabilities provided by the Management Server, but without its Active Directory or SQL Server requirements. However, the Streaming Server does not have a publishing service, nor does it have licensing or metering capabilities. The publishing service of a separate App-V Management Server is used in conjunction with the App-V Streaming Server. The App-V Streaming Server addresses the needs of businesses that want to use Application Virtualization in multiple locations with the streaming capabilities of the classic server configuration but might not have the infrastructure to support App-V Management Servers in every location.

View File

@ -31,7 +31,7 @@ The content directory contains all of the packages that are to be streamed to cl
Keep the number of users with administrative privileges to a minimum to reduce possible threats to the data in the data store and to avoid publishing malicious applications into the infrastructure. Keep the number of users with administrative privileges to a minimum to reduce possible threats to the data in the data store and to avoid publishing malicious applications into the infrastructure.
## Application Virtualization Security ## Application Virtualization Security
App-V uses several methods of communication between the various components of the infrastructure. When you plan your App-V infrastructure, securing the communications between servers can reduce the security risks that might already be present on the existing network. App-V uses several methods of communication between the various components of the infrastructure. When you plan your App-V infrastructure, securing the communications between servers can reduce the security risks that might already be present on the existing network.

View File

@ -19,7 +19,7 @@ ms.date: 06/16/2016
This topic includes and describes the administrator roles that are available in Microsoft BitLocker Administration and Monitoring (MBAM), as well as the server locations where the local groups are created. This topic includes and describes the administrator roles that are available in Microsoft BitLocker Administration and Monitoring (MBAM), as well as the server locations where the local groups are created.
## MBAM Administrator roles ## MBAM Administrator roles
<a href="" id="---------------mbam-system-administrators"></a> **MBAM System Administrators** <a href="" id="---------------mbam-system-administrators"></a> **MBAM System Administrators**

View File

@ -141,7 +141,7 @@ This section describes the Client Management policy definitions for MBAM, found
## Fixed Drive policy definitions ## Fixed Drive policy definitions
This section describes the Fixed Drive policy definitions for MBAM, which can be found at the following GPO node: **Computer Configuration**\\**Administrative Templates**\\**Windows Components**\\**MDOP MBAM (BitLocker Management)** \\ **Fixed Drive**. This section describes the Fixed Drive policy definitions for MBAM, which can be found at the following GPO node: **Computer Configuration**\\**Administrative Templates**\\**Windows Components**\\**MDOP MBAM (BitLocker Management)** \\ **Fixed Drive**.

View File

@ -19,7 +19,7 @@ ms.date: 06/16/2016
This topic lists and describes the available administrator roles that are available in Microsoft BitLocker Administration and Monitoring (MBAM) as well as the server locations where the local groups are created. This topic lists and describes the available administrator roles that are available in Microsoft BitLocker Administration and Monitoring (MBAM) as well as the server locations where the local groups are created.
## MBAM Administrator Roles ## MBAM Administrator Roles
<a href="" id="---------------mbam-system-administrators"></a> **MBAM System Administrators** <a href="" id="---------------mbam-system-administrators"></a> **MBAM System Administrators**

View File

@ -142,7 +142,7 @@ This section describes Client Management policy definitions for Microsoft BitLoc
## Fixed Drive Policy Definitions ## Fixed Drive Policy Definitions
This section describes Fixed Drive policy definitions for Microsoft BitLocker Administration and Monitoring found at the following GPO node: **Computer Configuration**\\**Policies**\\**Administrative Templates**\\**Windows Components**\\**MDOP MBAM (BitLocker Management)**\\**Fixed Drive**. This section describes Fixed Drive policy definitions for Microsoft BitLocker Administration and Monitoring found at the following GPO node: **Computer Configuration**\\**Policies**\\**Administrative Templates**\\**Windows Components**\\**MDOP MBAM (BitLocker Management)**\\**Fixed Drive**.

View File

@ -17,7 +17,7 @@ ms.date: 08/30/2016
# Sharing Settings Location Templates with the UE-V Template Gallery # Sharing Settings Location Templates with the UE-V Template Gallery
## Share location templates with the template gallery ## Share location templates with the template gallery
The Microsoft User Experience Virtualization (UE-V) template gallery allows administrators to share their UE-V settings location templates. In the gallery, you can upload your settings location templates for other people to use, and you can download templates that other people have created. The UE-V template gallery is located on Microsoft TechNet here: <https://go.microsoft.com/fwlink/p/?LinkID=246589>. The Microsoft User Experience Virtualization (UE-V) template gallery allows administrators to share their UE-V settings location templates. In the gallery, you can upload your settings location templates for other people to use, and you can download templates that other people have created. The UE-V template gallery is located on Microsoft TechNet here: <https://go.microsoft.com/fwlink/p/?LinkID=246589>.

View File

@ -19,7 +19,7 @@ ms.date: 08/30/2016
Troubleshooting content is not included in the Administrator's Guide for this product. Instead, you can find troubleshooting information for this product on the [TechNet Wiki](https://go.microsoft.com/fwlink/p/?LinkId=224905). Troubleshooting content is not included in the Administrator's Guide for this product. Instead, you can find troubleshooting information for this product on the [TechNet Wiki](https://go.microsoft.com/fwlink/p/?LinkId=224905).
## Find troubleshooting information ## Find troubleshooting information
You can use the following information to find troubleshooting content or additional technical content for this product. You can use the following information to find troubleshooting content or additional technical content for this product.
@ -44,7 +44,7 @@ The first step to find help content in the Administrators Guide is to search
3. Review the search results for assistance. 3. Review the search results for assistance.
## Create a troubleshooting article ## Create a troubleshooting article
If you have a troubleshooting tip or a best practice to share that is not already included in the MDOP Online Help or TechNet Wiki, you can create your own TechNet Wiki article. If you have a troubleshooting tip or a best practice to share that is not already included in the MDOP Online Help or TechNet Wiki, you can create your own TechNet Wiki article.

View File

@ -19,7 +19,7 @@ ms.date: 08/30/2016
Troubleshooting content is not included in the Administrator's Guide for this product. Instead, you can find troubleshooting information for this product on the [TechNet Wiki](https://go.microsoft.com/fwlink/p/?LinkId=224905). Troubleshooting content is not included in the Administrator's Guide for this product. Instead, you can find troubleshooting information for this product on the [TechNet Wiki](https://go.microsoft.com/fwlink/p/?LinkId=224905).
## Find troubleshooting information ## Find troubleshooting information
You can use the following information to find troubleshooting content or additional technical content for this product. You can use the following information to find troubleshooting content or additional technical content for this product.
@ -44,7 +44,7 @@ The first step to find help content in the Administrators Guide is to search
3. Review the search results for assistance. 3. Review the search results for assistance.
## Create a troubleshooting article ## Create a troubleshooting article
If you have a troubleshooting tip or a best practice to share that is not already included in the MDOP Online Help or TechNet Wiki, you can create your own TechNet Wiki article. If you have a troubleshooting tip or a best practice to share that is not already included in the MDOP Online Help or TechNet Wiki, you can create your own TechNet Wiki article.

View File

@ -51,7 +51,7 @@ Catalog and policy files have required files types.
| catalog files | .cat | | catalog files | .cat |
| policy files | .bin | | policy files | .bin |
## Store for Business roles and permissions ## Store for Business roles and permissions
Signing code integrity policies and access to Device Guard portal requires the Device Guard signer role. Signing code integrity policies and access to Device Guard portal requires the Device Guard signer role.
## Device Guard signing certificates ## Device Guard signing certificates

View File

@ -38,7 +38,7 @@ There are several ways that a solution provider can work with you. Solution prov
| OEM PC partner | Solution providers can upload device IDs for PCs that you're [managing with Autopilot](https://docs.microsoft.com/microsoft-store/add-profile-to-devices). | | OEM PC partner | Solution providers can upload device IDs for PCs that you're [managing with Autopilot](https://docs.microsoft.com/microsoft-store/add-profile-to-devices). |
| Line-of-business (LOB) partner | Solution providers can develop, submit, and manage LOB apps specific for your organization or school. | | Line-of-business (LOB) partner | Solution providers can develop, submit, and manage LOB apps specific for your organization or school. |
## Find a solution provider ## Find a solution provider
You can find partner in Microsoft Store for Business and Education. You can find partner in Microsoft Store for Business and Education.

View File

@ -11,7 +11,7 @@ ms.reviewer:
manager: dansimp manager: dansimp
--- ---
# Win32CompatibilityAppraiser CSP # Win32CompatibilityAppraiser CSP
> [!WARNING] > [!WARNING]
> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. > Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

View File

@ -66,7 +66,7 @@ To perform a "wipe and persist" reset, preserving the provisioning applied to th
</SyncML> </SyncML>
``` ```
## Reset using the UI ## Reset using the UI
1. On your mobile device, go to **Settings** > **System** > **About** > **Reset your Phone** 1. On your mobile device, go to **Settings** > **System** > **About** > **Reset your Phone**

View File

@ -17,7 +17,7 @@ manager: dansimp
This article provides steps to troubleshoot **Stop error 7B: Inaccessible_Boot_Device**. This error may occur after some changes are made to the computer, or immediately after you deploy Windows on the computer. This article provides steps to troubleshoot **Stop error 7B: Inaccessible_Boot_Device**. This error may occur after some changes are made to the computer, or immediately after you deploy Windows on the computer.
## Causes of the Inaccessible_Boot_Device Stop error ## Causes of the Inaccessible_Boot_Device Stop error
Any one of the following factors may cause the stop error: Any one of the following factors may cause the stop error:
@ -37,7 +37,7 @@ Any one of the following factors may cause the stop error:
* Corrupted files in the **Boot** partition (for example, corruption in the volume that is labeled **SYSTEM** when you run the `diskpart` > `list vol` command) * Corrupted files in the **Boot** partition (for example, corruption in the volume that is labeled **SYSTEM** when you run the `diskpart` > `list vol` command)
## Troubleshoot this error ## Troubleshoot this error
Start the computer in [Windows Recovery Mode (WinRE)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference#span-identrypointsintowinrespanspan-identrypointsintowinrespanspan-identrypointsintowinrespanentry-points-into-winre). To do this, follow these steps. Start the computer in [Windows Recovery Mode (WinRE)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference#span-identrypointsintowinrespanspan-identrypointsintowinrespanspan-identrypointsintowinrespanentry-points-into-winre). To do this, follow these steps.
@ -47,9 +47,9 @@ Start the computer in [Windows Recovery Mode (WinRE)](https://docs.microsoft.com
3. On the **System Recovery Options** screen, select **Next** > **Command Prompt** . 3. On the **System Recovery Options** screen, select **Next** > **Command Prompt** .
### Verify that the boot disk is connected and accessible ### Verify that the boot disk is connected and accessible
#### Step 1 #### Step 1
At the WinRE Command prompt, run `diskpart`, and then run `list disk`. At the WinRE Command prompt, run `diskpart`, and then run `list disk`.
@ -67,7 +67,7 @@ If the computer uses a Unified Extensible Firmware Interface (UEFI) startup inte
If the computer uses a basic input/output system (BIOS) interface, there will not be an asterisk in the **Dyn** column. If the computer uses a basic input/output system (BIOS) interface, there will not be an asterisk in the **Dyn** column.
#### Step 2 #### Step 2
If the `list disk` command lists the OS disks correctly, run the `list vol` command in `diskpart`. If the `list disk` command lists the OS disks correctly, run the `list vol` command in `diskpart`.
@ -88,7 +88,7 @@ If the `list disk` command lists the OS disks correctly, run the `list vol` comm
>[!NOTE] >[!NOTE]
>If the disk that contains the OS is not listed in the output, you will have to engage the OEM or virtualization manufacturer. >If the disk that contains the OS is not listed in the output, you will have to engage the OEM or virtualization manufacturer.
### Verify the integrity of Boot Configuration Database ### Verify the integrity of Boot Configuration Database
Check whether the Boot Configuration Database (BCD) has all the correct entries. To do this, run `bcdedit` at the WinRE command prompt. Check whether the Boot Configuration Database (BCD) has all the correct entries. To do this, run `bcdedit` at the WinRE command prompt.
@ -163,7 +163,7 @@ If you do not have a Windows 10 ISO, you must format the partition and copy **bo
4. Right-click the partition, and then format it. 4. Right-click the partition, and then format it.
### Troubleshooting if this issue occurs after a Windows Update installation ### Troubleshooting if this issue occurs after a Windows Update installation
Run the following command to verify the Windows update installation and dates: Run the following command to verify the Windows update installation and dates:
@ -203,9 +203,9 @@ After you run this command, you will see the **Install pending** and **Uninstall
11. Expand **Control\Session Manager**. Check whether the **PendingFileRenameOperations** key exists. If it does, back up the **SessionManager** key, and then delete the **PendingFileRenameOperations** key. 11. Expand **Control\Session Manager**. Check whether the **PendingFileRenameOperations** key exists. If it does, back up the **SessionManager** key, and then delete the **PendingFileRenameOperations** key.
### Verifying boot critical drivers and services ### Verifying boot critical drivers and services
#### Check services #### Check services
1. Follow steps 1-10 in the "Troubleshooting if this issue occurs after an Windows Update installation" section. (Step 11 does not apply to this procedure.) 1. Follow steps 1-10 in the "Troubleshooting if this issue occurs after an Windows Update installation" section. (Step 11 does not apply to this procedure.)
@ -235,7 +235,7 @@ ren SYSTEM SYSTEM.old
copy OSdrive:\Windows\System32\config\RegBack\SYSTEM OSdrive:\Windows\System32\config\ copy OSdrive:\Windows\System32\config\RegBack\SYSTEM OSdrive:\Windows\System32\config\
``` ```
#### Check upper and lower filter drivers #### Check upper and lower filter drivers
Check whether there are any non-Microsoft upper and lower filter drivers on the computer and that they do not exist on another, similar working computer. if they do exist, remove the upper and lower filter drivers: Check whether there are any non-Microsoft upper and lower filter drivers on the computer and that they do not exist on another, similar working computer. if they do exist, remove the upper and lower filter drivers:
@ -268,7 +268,7 @@ The reason that these entries may affect us is because there may be an entry in
>[!NOTE] >[!NOTE]
>If there actually is a service that is set to **0** or **1** that corresponds to an **UpperFilters** or **LowerFilters** entry, setting the service to disabled in the **Services** registry (as discussed in steps 2 and 3 of the Check services section) without removing the **Filter Driver** entry causes the computer to crash and generate a 0x7b Stop error. >If there actually is a service that is set to **0** or **1** that corresponds to an **UpperFilters** or **LowerFilters** entry, setting the service to disabled in the **Services** registry (as discussed in steps 2 and 3 of the Check services section) without removing the **Filter Driver** entry causes the computer to crash and generate a 0x7b Stop error.
### Running SFC and Chkdsk ### Running SFC and Chkdsk
If the computer still does not start, you can try to run a **chkdisk** process on the system drive, and also run System File Checker. To do this, run the following commands at a WinRE command prompt: If the computer still does not start, you can try to run a **chkdisk** process on the system drive, and also run System File Checker. To do this, run the following commands at a WinRE command prompt:

View File

@ -16,7 +16,7 @@ ms.author: dansimp
ms.topic: article ms.topic: article
--- ---
# Assigned Access configuration (kiosk) XML reference # Assigned Access configuration (kiosk) XML reference
**Applies to** **Applies to**

View File

@ -9,7 +9,7 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
audience: itpro author: greg-lindsay author: greg-lindsay
ms.author: greglin ms.author: greglin
ms.collection: M365-modern-desktop ms.collection: M365-modern-desktop
ms.topic: article ms.topic: article
@ -153,7 +153,7 @@ The output of this command should be the name of the network interface you use t
For example, if the command above displays Ethernet but you wish to use Ethernet2, then the first command below would be New-VMSwitch -Name AutopilotExternal -AllowManagementOS $true -NetAdapterName **Ethernet2**. For example, if the command above displays Ethernet but you wish to use Ethernet2, then the first command below would be New-VMSwitch -Name AutopilotExternal -AllowManagementOS $true -NetAdapterName **Ethernet2**.
### Use Windows PowerShell to create the demo VM ### Use Windows PowerShell to create the demo VM
All VM data will be created under the current path in your PowerShell prompt. Consider navigating into a new folder before running the following commands. All VM data will be created under the current path in your PowerShell prompt. Consider navigating into a new folder before running the following commands.

View File

@ -159,7 +159,7 @@ The following table lists in what GDPR mode controller or processor Wind
*/*Depending on which application/feature this is referring to.* */*Depending on which application/feature this is referring to.*
## Windows diagnostic data and Windows 10 ## Windows diagnostic data and Windows 10
### Recommended Windows 10 settings ### Recommended Windows 10 settings

View File

@ -16,7 +16,7 @@ ms.date: 08/17/2017
ms.reviewer: ms.reviewer:
--- ---
# Windows Defender Credential Guard: Known issues # Windows Defender Credential Guard: Known issues
**Applies to** **Applies to**
- Windows 10 - Windows 10

View File

@ -38,7 +38,7 @@ A new Active Directory Federation Services farm should have a minimum of two fed
Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server 2016 Servers. Ensure the update listed below is applied to each server before continuing. Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server 2016 Servers. Ensure the update listed below is applied to each server before continuing.
## Update Windows Server 2016 ## Update Windows Server 2016
Sign-in the federation server with _local admin_ equivalent credentials. Sign-in the federation server with _local admin_ equivalent credentials.
1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If youre not using Windows Update for updates, please advise the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed. 1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If youre not using Windows Update for updates, please advise the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed.

View File

@ -38,7 +38,7 @@ A new Active Directory Federation Services farm should have a minimum of two fed
Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server 2016 Servers. Ensure the update listed below is applied to each server before continuing. Prepare the Active Directory Federation Services deployment by installing and updating two Windows Server 2016 Servers. Ensure the update listed below is applied to each server before continuing.
## Update Windows Server 2016 ## Update Windows Server 2016
Sign-in the federation server with _local admin_ equivalent credentials. Sign-in the federation server with _local admin_ equivalent credentials.
1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If youre not using Windows Update for updates, please review the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed. 1. Ensure Windows Server 2016 is current by running **Windows Update** from **Settings**. Continue this process until no further updates are needed. If youre not using Windows Update for updates, please review the [Windows Server 2016 update history page](https://support.microsoft.com/help/4000825/windows-10-windows-server-2016-update-history) to make sure you have the latest updates available installed.

View File

@ -15,7 +15,7 @@ ms.localizationpriority: medium
ms.date: 01/12/2018 ms.date: 01/12/2018
ms.reviewer: ms.reviewer:
--- ---
# Protect Remote Desktop credentials with Windows Defender Remote Credential Guard # Protect Remote Desktop credentials with Windows Defender Remote Credential Guard
**Applies to** **Applies to**
- Windows 10 - Windows 10

View File

@ -48,7 +48,7 @@ This is applicable to Azure Hybrid AD as well.
For Windows PCs and Windows Phones that enroll using **Connect to work or school account**, BitLocker Device Encryption is managed over MDM, the same as devices joined to Azure AD. For Windows PCs and Windows Phones that enroll using **Connect to work or school account**, BitLocker Device Encryption is managed over MDM, the same as devices joined to Azure AD.
## Managing servers ## Managing servers
Servers are often installed, configured, and deployed using PowerShell, so the recommendation is to also use [PowerShell to enable BitLocker on a server](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#bitlocker-cmdlets-for-windows-powershell), ideally as part of the initial setup. BitLocker is an Optional Component (OC) in Windows Server, so follow the directions in [BitLocker: How to deploy on Windows Server 2012 and later](bitlocker-how-to-deploy-on-windows-server.md) to add the BitLocker OC. Servers are often installed, configured, and deployed using PowerShell, so the recommendation is to also use [PowerShell to enable BitLocker on a server](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#bitlocker-cmdlets-for-windows-powershell), ideally as part of the initial setup. BitLocker is an Optional Component (OC) in Windows Server, so follow the directions in [BitLocker: How to deploy on Windows Server 2012 and later](bitlocker-how-to-deploy-on-windows-server.md) to add the BitLocker OC.

View File

@ -133,7 +133,7 @@
#### [Integrations]() #### [Integrations]()
##### [Microsoft Defender ATP integrations](microsoft-defender-atp/threat-protection-integration.md) ##### [Microsoft Defender ATP integrations](microsoft-defender-atp/threat-protection-integration.md)
##### [Protect users, data, and devices with conditional access](microsoft-defender-atp/conditional-access.md) ##### [Protect users, data, and devices with conditional access](microsoft-defender-atp/conditional-access.md)
##### [Microsoft Cloud App Security integration overview](microsoft-defender-atp/microsoft-cloud-app-security-integration.md) ##### [Microsoft Cloud App Security integration overview](microsoft-defender-atp/microsoft-cloud-app-security-integration.md)
#### [Information protection in Windows overview]() #### [Information protection in Windows overview]()
@ -1049,7 +1049,7 @@
###### [Network access: Remotely accessible registry paths](security-policy-settings/network-access-remotely-accessible-registry-paths.md) ###### [Network access: Remotely accessible registry paths](security-policy-settings/network-access-remotely-accessible-registry-paths.md)
###### [Network access: Remotely accessible registry paths and subpaths](security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md) ###### [Network access: Remotely accessible registry paths and subpaths](security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md)
###### [Network access: Restrict anonymous access to Named Pipes and Shares](security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md) ###### [Network access: Restrict anonymous access to Named Pipes and Shares](security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md)
###### [Network access: Restrict clients allowed to make remote calls to SAM](security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md) ###### [Network access: Restrict clients allowed to make remote calls to SAM](security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md)
###### [Network access: Shares that can be accessed anonymously](security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md) ###### [Network access: Shares that can be accessed anonymously](security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md)
###### [Network access: Sharing and security model for local accounts](security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md) ###### [Network access: Sharing and security model for local accounts](security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md)
###### [Network security: Allow Local System to use computer identity for NTLM](security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md) ###### [Network security: Allow Local System to use computer identity for NTLM](security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md)

View File

@ -38,7 +38,7 @@ On the top navigation you can:
![Image of alerts queue](images/alerts-queue-list.png) ![Image of alerts queue](images/alerts-queue-list.png)
## Sort, filter, and group the alerts queue ## Sort, filter, and group the alerts queue
You can apply the following filters to limit the list of alerts and get a more focused view the alerts. You can apply the following filters to limit the list of alerts and get a more focused view the alerts.
### Severity ### Severity

View File

@ -28,7 +28,7 @@ ms.date: 10/16/2017
Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center. Understand what data fields are exposed as part of the alerts API and how they map to Microsoft Defender Security Center.
## Alert API fields and portal mapping ## Alert API fields and portal mapping
The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal. The following table lists the available fields exposed in the alerts API payload. It shows examples for the populated values and a reference on how data is reflected on the portal.
The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md). The ArcSight field column contains the default mapping between the Microsoft Defender ATP fields and the built-in fields in ArcSight. You can download the mapping file from the portal when you enable the SIEM integration feature and you can modify it to match the needs of your organization. For more information, see [Enable SIEM integration in Microsoft Defender ATP](enable-siem-integration.md).

View File

@ -108,7 +108,7 @@ It is recommended that groups are created for MSSPs to make authorization access
As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups. As a MSSP customer, you can always remove or modify the permissions granted to the MSSP by updating the Azure AD user groups.
## Access the Windows Defender Security Center MSSP customer portal ## Access the Windows Defender Security Center MSSP customer portal
>[!NOTE] >[!NOTE]
>These set of steps are directed towards the MSSP. >These set of steps are directed towards the MSSP.

View File

@ -17,7 +17,7 @@ ms.collection: M365-security-compliance
ms.topic: article ms.topic: article
--- ---
# Run a detection test on a newly onboarded Microsoft Defender ATP machine # Run a detection test on a newly onboarded Microsoft Defender ATP machine
**Applies to:** **Applies to:**
- Supported Windows 10 versions - Supported Windows 10 versions

View File

@ -17,7 +17,7 @@ ms.collection: M365-security-compliance
ms.topic: troubleshooting ms.topic: troubleshooting
--- ---
# Troubleshoot Microsoft Defender Advanced Threat Protection # Troubleshoot Microsoft Defender Advanced Threat Protection
Troubleshoot issues that might arise as you use Microsoft Defender ATP capabilities. Troubleshoot issues that might arise as you use Microsoft Defender ATP capabilities.

View File

@ -65,7 +65,7 @@ This section describes features and tools that are available to help you manage
None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy. None. Changes to this policy become effective without a device restart when they are saved locally or distributed through Group Policy.
### Policy dependencies ### Policy dependencies
The settings for this security policy are dependent on the [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md) setting value. The settings for this security policy are dependent on the [Network security: LAN Manager authentication level](network-security-lan-manager-authentication-level.md) setting value.

View File

@ -15,7 +15,7 @@ manager: dansimp
ms.author: dolmont ms.author: dolmont
--- ---
# WannaCrypt ransomware worm targets out-of-date systems # WannaCrypt ransomware worm targets out-of-date systems
On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches. Unfortunately, the ransomware, known as [WannaCrypt](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Ransom:Win32/WannaCrypt), appears to have affected computers that have not applied the patch for these vulnerabilities. While the attack is unfolding, we remind users to install [MS17-010](https://technet.microsoft.com/library/security/ms17-010.aspx) if they have not already done so. On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches. Unfortunately, the ransomware, known as [WannaCrypt](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Ransom:Win32/WannaCrypt), appears to have affected computers that have not applied the patch for these vulnerabilities. While the attack is unfolding, we remind users to install [MS17-010](https://technet.microsoft.com/library/security/ms17-010.aspx) if they have not already done so.

View File

@ -8,7 +8,7 @@ keywords: ["What's new in Windows 10", "Windows 10", "Windows 10 Enterprise 2019
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: deploy ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
audience: itpro author: greg-lindsay author: greg-lindsay
ms.localizationpriority: low ms.localizationpriority: low
ms.topic: article ms.topic: article
--- ---
@ -167,7 +167,7 @@ This is an update to the [BitLocker CSP](https://docs.microsoft.com/windows/clie
This feature will soon be enabled on Olympia Corp as an optional feature. This feature will soon be enabled on Olympia Corp as an optional feature.
#### Delivering BitLocker policy to AutoPilot devices during OOBE #### Delivering BitLocker policy to AutoPilot devices during OOBE
You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins. You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins.

View File

@ -67,7 +67,7 @@ This is an update to the [BitLocker CSP](https://docs.microsoft.com/windows/clie
This feature will soon be enabled on Olympia Corp as an optional feature. This feature will soon be enabled on Olympia Corp as an optional feature.
#### Delivering BitLocker policy to AutoPilot devices during OOBE #### Delivering BitLocker policy to AutoPilot devices during OOBE
You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins. You can choose which encryption algorithm to apply to BitLocker encryption capable devices, rather than automatically having those devices encrypt themselves with the default algorithm. This allows the encryption algorithm (and other BitLocker policies that must be applied prior to encryption), to be delivered before BitLocker encryption begins.