Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client into DHupdatesRS3
40
bcs/index.md
@ -420,6 +420,25 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://support.office.com/article/aad21b1a-c775-469a-b89c-c5d1d59d27db" target="_blank">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="images/bcs-partner-advanced-management-intune-1.svg" alt="Mapping Microsoft 365 Business protection features to Intune settings" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Microsoft 365 Business protection features to Intune settings mapping</h3>
|
||||||
|
<p>Find out how the Android and iOS app policy settings map to Intune settings.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
<li>
|
<li>
|
||||||
<a href="https://support.office.com/article/6b70fa27-d171-4593-8ecf-f78bb4ed2e99" target="_blank">
|
<a href="https://support.office.com/article/6b70fa27-d171-4593-8ecf-f78bb4ed2e99" target="_blank">
|
||||||
<div class="cardSize">
|
<div class="cardSize">
|
||||||
@ -480,7 +499,7 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
<div class="cardText">
|
<div class="cardText">
|
||||||
<h3>Identity migration with Azure AD Connect</h3>
|
<h3>Identity migration with Azure AD Connect</h3>
|
||||||
<p>Got on-premises AD and plan to move your organization’s identity management to the cloud? Do a one-time sync using Azure AD Connect.<a href="https://support.office.com/article/FDECCEED-0702-4AF3-85BE-F2A0013937EF">Minimal hybrid migration</a>.</p>
|
<p>Got on-premises AD and plan to move your organization’s identity management to the cloud? Do a one-time sync using Azure AD Connect.</p>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
@ -702,6 +721,25 @@ description: Learn about the product documentation and resources available for M
|
|||||||
</div>
|
</div>
|
||||||
</a>
|
</a>
|
||||||
</li>
|
</li>
|
||||||
|
<li>
|
||||||
|
<a href="https://support.office.com/article/aad21b1a-c775-469a-b89c-c5d1d59d27db" target="_blank">
|
||||||
|
<div class="cardSize">
|
||||||
|
<div class="cardPadding">
|
||||||
|
<div class="card">
|
||||||
|
<div class="cardImageOuter">
|
||||||
|
<div class="cardImage bgdAccent1">
|
||||||
|
<img src="images/bcs-partner-advanced-management-intune-1.svg" alt="Mapping Microsoft 365 Business protection features to Intune settings" />
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
<div class="cardText">
|
||||||
|
<h3>Microsoft 365 Business protection features to Intune settings mapping</h3>
|
||||||
|
<p>Find out how the Android and iOS app policy settings map to Intune settings.</p>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</div>
|
||||||
|
</a>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
</li>
|
</li>
|
||||||
<li>
|
<li>
|
||||||
|
@ -458,6 +458,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-browser.md#browser-allowsmartscreen" id="browser-allowsmartscreen">Browser/AllowSmartScreen</a>
|
<a href="./policy-csp-browser.md#browser-allowsmartscreen" id="browser-allowsmartscreen">Browser/AllowSmartScreen</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<!--<dd>
|
||||||
|
<a href="./policy-csp-browser.md#browser-alwaysenablebookslibrary" id="browser-alwaysenablebookslibrary">Browser/AlwaysEnableBooksLibrary</a>
|
||||||
|
</dd>-->
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-browser.md#browser-clearbrowsingdataonexit" id="browser-clearbrowsingdataonexit">Browser/ClearBrowsingDataOnExit</a>
|
<a href="./policy-csp-browser.md#browser-clearbrowsingdataonexit" id="browser-clearbrowsingdataonexit">Browser/ClearBrowsingDataOnExit</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -692,6 +695,12 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-defender.md#defender-cloudextendedtimeout" id="defender-cloudextendedtimeout">Defender/CloudExtendedTimeout</a>
|
<a href="./policy-csp-defender.md#defender-cloudextendedtimeout" id="defender-cloudextendedtimeout">Defender/CloudExtendedTimeout</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-defender.md#defender-controlledfolderaccessallowedapplications" id="defender-controlledfolderaccessallowedapplications">Defender/ControlledFolderAccessAllowedApplications</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-defender.md#defender-controlledfolderaccessprotectedfolders" id="defender-controlledfolderaccessprotectedfolders">Defender/ControlledFolderAccessProtectedFolders</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-defender.md#defender-daystoretaincleanedmalware" id="defender-daystoretaincleanedmalware">Defender/DaysToRetainCleanedMalware</a>
|
<a href="./policy-csp-defender.md#defender-daystoretaincleanedmalware" id="defender-daystoretaincleanedmalware">Defender/DaysToRetainCleanedMalware</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -710,12 +719,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-defender.md#defender-excludedprocesses" id="defender-excludedprocesses">Defender/ExcludedProcesses</a>
|
<a href="./policy-csp-defender.md#defender-excludedprocesses" id="defender-excludedprocesses">Defender/ExcludedProcesses</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-defender.md#defender-controlledfolderaccessallowedapplications" id="defender-controlledfolderaccessallowedapplications">Defender/ControlledFolderAccessAllowedApplications</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-defender.md#defender-controlledfolderaccessprotectedfolders" id="defender-controlledfolderaccessprotectedfolders">Defender/ControlledFolderAccessProtectedFolders</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-defender.md#defender-puaprotection" id="defender-puaprotection">Defender/PUAProtection</a>
|
<a href="./policy-csp-defender.md#defender-puaprotection" id="defender-puaprotection">Defender/PUAProtection</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1148,9 +1151,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash" id="internetexplorer-disableadobeflash">InternetExplorer/DisableAdobeFlash</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash" id="internetexplorer-disableadobeflash">InternetExplorer/DisableAdobeFlash</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-disableblockingofoutdatedactivexcontrols" id="internetexplorer-disableblockingofoutdatedactivexcontrols">InternetExplorer/DisableBlockingOfOutdatedActiveXControls</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings" id="internetexplorer-disablebypassofsmartscreenwarnings">InternetExplorer/DisableBypassOfSmartScreenWarnings</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings" id="internetexplorer-disablebypassofsmartscreenwarnings">InternetExplorer/DisableBypassOfSmartScreenWarnings</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1325,9 +1325,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes" id="internetexplorer-internetzonenavigatewindowsandframes">InternetExplorer/InternetZoneNavigateWindowsAndFrames</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes" id="internetexplorer-internetzonenavigatewindowsandframes">InternetExplorer/InternetZoneNavigateWindowsAndFrames</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentsnotsignedwithauthenticode" id="internetexplorer-internetzonerunnetframeworkreliantcomponentsnotsignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode" id="internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode" id="internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1337,9 +1334,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker" id="internetexplorer-internetzoneusepopupblocker">InternetExplorer/InternetZoneUsePopupBlocker</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker" id="internetexplorer-internetzoneusepopupblocker">InternetExplorer/InternetZoneUsePopupBlocker</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-internetzonewebsitesinlessprivilegedzonescannavigateintothiszone" id="internetexplorer-internetzonewebsitesinlessprivilegedzonescannavigateintothiszone">InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources" id="internetexplorer-intranetzoneallowaccesstodatasources">InternetExplorer/IntranetZoneAllowAccessToDataSources</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources" id="internetexplorer-intranetzoneallowaccesstodatasources">InternetExplorer/IntranetZoneAllowAccessToDataSources</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1373,9 +1367,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols" id="internetexplorer-intranetzoneinitializeandscriptactivexcontrols">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols" id="internetexplorer-intranetzoneinitializeandscriptactivexcontrols">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrolsnotmarkedsafe" id="internetexplorer-intranetzoneinitializeandscriptactivexcontrolsnotmarkedsafe">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions" id="internetexplorer-intranetzonejavapermissions">InternetExplorer/IntranetZoneJavaPermissions</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions" id="internetexplorer-intranetzonejavapermissions">InternetExplorer/IntranetZoneJavaPermissions</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1727,9 +1718,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes" id="internetexplorer-restrictedsiteszonenavigatewindowsandframes">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes" id="internetexplorer-restrictedsiteszonenavigatewindowsandframes">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframesacrossdomains" id="internetexplorer-restrictedsiteszonenavigatewindowsandframesacrossdomains">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins" id="internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins">InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins" id="internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins">InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1745,9 +1733,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles" id="internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles">InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles" id="internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles">InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnoncrosssitescriptingfilter" id="internetexplorer-restrictedsiteszoneturnoncrosssitescriptingfilter">InternetExplorer/RestrictedSitesZoneTurnOnCrossSiteScriptingFilter</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode" id="internetexplorer-restrictedsiteszoneturnonprotectedmode">InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode" id="internetexplorer-restrictedsiteszoneturnonprotectedmode">InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1796,18 +1781,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols" id="internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols" id="internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedontrunantimalwareprogramsagainstactivexcontrols" id="internetexplorer-trustedsiteszonedontrunantimalwareprogramsagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedassafe" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedassafe">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedsafe" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedsafe">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions" id="internetexplorer-trustedsiteszonejavapermissions">InternetExplorer/TrustedSitesZoneJavaPermissions</a>
|
<a href="./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions" id="internetexplorer-trustedsiteszonejavapermissions">InternetExplorer/TrustedSitesZoneJavaPermissions</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1898,9 +1874,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-runalladministratorsinadminapprovalmode" id="localpoliciessecurityoptions-useraccountcontrol-runalladministratorsinadminapprovalmode">LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -1916,6 +1889,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations" id="localpoliciessecurityoptions-useraccountcontrol-onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations">LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations" id="localpoliciessecurityoptions-useraccountcontrol-onlyelevateuiaccessapplicationsthatareinstalledinsecurelocations">LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-runalladministratorsinadminapprovalmode" id="localpoliciessecurityoptions-useraccountcontrol-runalladministratorsinadminapprovalmode">LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-switchtothesecuredesktopwhenpromptingforelevation" id="localpoliciessecurityoptions-useraccountcontrol-switchtothesecuredesktopwhenpromptingforelevation">LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-switchtothesecuredesktopwhenpromptingforelevation" id="localpoliciessecurityoptions-useraccountcontrol-switchtothesecuredesktopwhenpromptingforelevation">LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -2681,7 +2657,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<a href="./policy-csp-system.md#system-disablesystemrestore" id="system-disablesystemrestore">System/DisableSystemRestore</a>
|
<a href="./policy-csp-system.md#system-disablesystemrestore" id="system-disablesystemrestore">System/DisableSystemRestore</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-system.md#system-limitenhanceddiagnosticdatawindowsanalytics" id="limitenhanceddiagnosticdatawindowsanalytics">System/LimitEnhancedDiagnosticDataWindowsAnalytics</a>
|
<a href="./policy-csp-system.md#system-limitenhanceddiagnosticdatawindowsanalytics" id="system-limitenhanceddiagnosticdatawindowsanalytics">System/LimitEnhancedDiagnosticDataWindowsAnalytics</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-system.md#system-telemetryproxy" id="system-telemetryproxy">System/TelemetryProxy</a>
|
<a href="./policy-csp-system.md#system-telemetryproxy" id="system-telemetryproxy">System/TelemetryProxy</a>
|
||||||
@ -3094,7 +3070,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [InternetExplorer/CheckSignaturesOnDownloadedPrograms](./policy-csp-internetexplorer.md#internetexplorer-checksignaturesondownloadedprograms)
|
- [InternetExplorer/CheckSignaturesOnDownloadedPrograms](./policy-csp-internetexplorer.md#internetexplorer-checksignaturesondownloadedprograms)
|
||||||
- [InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-consistentmimehandlinginternetexplorerprocesses)
|
- [InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-consistentmimehandlinginternetexplorerprocesses)
|
||||||
- [InternetExplorer/DisableAdobeFlash](./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash)
|
- [InternetExplorer/DisableAdobeFlash](./policy-csp-internetexplorer.md#internetexplorer-disableadobeflash)
|
||||||
- [InternetExplorer/DisableBlockingOfOutdatedActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-disableblockingofoutdatedactivexcontrols)
|
|
||||||
- [InternetExplorer/DisableBypassOfSmartScreenWarnings](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings)
|
- [InternetExplorer/DisableBypassOfSmartScreenWarnings](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarnings)
|
||||||
- [InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarningsaboutuncommonfiles)
|
- [InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles](./policy-csp-internetexplorer.md#internetexplorer-disablebypassofsmartscreenwarningsaboutuncommonfiles)
|
||||||
- [InternetExplorer/DisableConfiguringHistory](./policy-csp-internetexplorer.md#internetexplorer-disableconfiguringhistory)
|
- [InternetExplorer/DisableConfiguringHistory](./policy-csp-internetexplorer.md#internetexplorer-disableconfiguringhistory)
|
||||||
@ -3152,11 +3127,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-internetzonelaunchingapplicationsandfilesiniframe)
|
- [InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-internetzonelaunchingapplicationsandfilesiniframe)
|
||||||
- [InternetExplorer/InternetZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-internetzonelogonoptions)
|
- [InternetExplorer/InternetZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-internetzonelogonoptions)
|
||||||
- [InternetExplorer/InternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes)
|
- [InternetExplorer/InternetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-internetzonenavigatewindowsandframes)
|
||||||
- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentsnotsignedwithauthenticode)
|
|
||||||
- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode)
|
- [InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode)
|
||||||
- [InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneshowsecuritywarningforpotentiallyunsafefiles)
|
- [InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-internetzoneshowsecuritywarningforpotentiallyunsafefiles)
|
||||||
- [InternetExplorer/InternetZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker)
|
- [InternetExplorer/InternetZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-internetzoneusepopupblocker)
|
||||||
- [InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone](./policy-csp-internetexplorer.md#internetexplorer-internetzonewebsitesinlessprivilegedzonescannavigateintothiszone)
|
|
||||||
- [InternetExplorer/IntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources)
|
- [InternetExplorer/IntranetZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowaccesstodatasources)
|
||||||
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforactivexcontrols)
|
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforactivexcontrols)
|
||||||
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforfiledownloads)
|
- [InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowautomaticpromptingforfiledownloads)
|
||||||
@ -3168,7 +3141,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [InternetExplorer/IntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowuserdatapersistence)
|
- [InternetExplorer/IntranetZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneallowuserdatapersistence)
|
||||||
- [InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzonedonotrunantimalwareagainstactivexcontrols)
|
- [InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzonedonotrunantimalwareagainstactivexcontrols)
|
||||||
- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols)
|
- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrols)
|
||||||
- [InternetExplorer/IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe](./policy-csp-internetexplorer.md#internetexplorer-intranetzoneinitializeandscriptactivexcontrolsnotmarkedsafe)
|
|
||||||
- [InternetExplorer/IntranetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions)
|
- [InternetExplorer/IntranetZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-intranetzonejavapermissions)
|
||||||
- [InternetExplorer/IntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-intranetzonenavigatewindowsandframes)
|
- [InternetExplorer/IntranetZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-intranetzonenavigatewindowsandframes)
|
||||||
- [InternetExplorer/LocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowaccesstodatasources)
|
- [InternetExplorer/LocalMachineZoneAllowAccessToDataSources](./policy-csp-internetexplorer.md#internetexplorer-localmachinezoneallowaccesstodatasources)
|
||||||
@ -3286,13 +3258,11 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelaunchingapplicationsandfilesiniframe)
|
- [InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelaunchingapplicationsandfilesiniframe)
|
||||||
- [InternetExplorer/RestrictedSitesZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelogonoptions)
|
- [InternetExplorer/RestrictedSitesZoneLogonOptions](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonelogonoptions)
|
||||||
- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes)
|
- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframes)
|
||||||
- [InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonenavigatewindowsandframesacrossdomains)
|
|
||||||
- [InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins)
|
- [InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins)
|
||||||
- [InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunnetframeworkreliantcomponentssignedwithauthenticode)
|
- [InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonerunnetframeworkreliantcomponentssignedwithauthenticode)
|
||||||
- [InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptactivexcontrolsmarkedsafeforscripting)
|
- [InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptactivexcontrolsmarkedsafeforscripting)
|
||||||
- [InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptingofjavaapplets)
|
- [InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszonescriptingofjavaapplets)
|
||||||
- [InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles)
|
- [InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles)
|
||||||
- [InternetExplorer/RestrictedSitesZoneTurnOnCrossSiteScriptingFilter](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnoncrosssitescriptingfilter)
|
|
||||||
- [InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode)
|
- [InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneturnonprotectedmode)
|
||||||
- [InternetExplorer/RestrictedSitesZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneusepopupblocker)
|
- [InternetExplorer/RestrictedSitesZoneUsePopupBlocker](./policy-csp-internetexplorer.md#internetexplorer-restrictedsiteszoneusepopupblocker)
|
||||||
- [InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-scriptedwindowsecurityrestrictionsinternetexplorerprocesses)
|
- [InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses](./policy-csp-internetexplorer.md#internetexplorer-scriptedwindowsecurityrestrictionsinternetexplorerprocesses)
|
||||||
@ -3309,10 +3279,7 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
- [InternetExplorer/TrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowsmartscreenie)
|
- [InternetExplorer/TrustedSitesZoneAllowSmartScreenIE](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowsmartscreenie)
|
||||||
- [InternetExplorer/TrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowuserdatapersistence)
|
- [InternetExplorer/TrustedSitesZoneAllowUserDataPersistence](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneallowuserdatapersistence)
|
||||||
- [InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols)
|
- [InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols)
|
||||||
- [InternetExplorer/TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonedontrunantimalwareprogramsagainstactivexcontrols)
|
|
||||||
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols)
|
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols)
|
||||||
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedassafe)
|
|
||||||
- [InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedsafe)
|
|
||||||
- [InternetExplorer/TrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions)
|
- [InternetExplorer/TrustedSitesZoneJavaPermissions](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonejavapermissions)
|
||||||
- [InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonenavigatewindowsandframes)
|
- [InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames](./policy-csp-internetexplorer.md#internetexplorer-trustedsiteszonenavigatewindowsandframes)
|
||||||
- [Kerberos/AllowForestSearchOrder](./policy-csp-kerberos.md#kerberos-allowforestsearchorder)
|
- [Kerberos/AllowForestSearchOrder](./policy-csp-kerberos.md#kerberos-allowforestsearchorder)
|
||||||
|
@ -110,9 +110,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-disableadobeflash">InternetExplorer/DisableAdobeFlash</a>
|
<a href="#internetexplorer-disableadobeflash">InternetExplorer/DisableAdobeFlash</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-disableblockingofoutdatedactivexcontrols">InternetExplorer/DisableBlockingOfOutdatedActiveXControls</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-disablebypassofsmartscreenwarnings">InternetExplorer/DisableBypassOfSmartScreenWarnings</a>
|
<a href="#internetexplorer-disablebypassofsmartscreenwarnings">InternetExplorer/DisableBypassOfSmartScreenWarnings</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -287,9 +284,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-internetzonenavigatewindowsandframes">InternetExplorer/InternetZoneNavigateWindowsAndFrames</a>
|
<a href="#internetexplorer-internetzonenavigatewindowsandframes">InternetExplorer/InternetZoneNavigateWindowsAndFrames</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-internetzonerunnetframeworkreliantcomponentsnotsignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode</a>
|
<a href="#internetexplorer-internetzonerunnetframeworkreliantcomponentssignedwithauthenticode">InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -299,9 +293,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-internetzoneusepopupblocker">InternetExplorer/InternetZoneUsePopupBlocker</a>
|
<a href="#internetexplorer-internetzoneusepopupblocker">InternetExplorer/InternetZoneUsePopupBlocker</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-internetzonewebsitesinlessprivilegedzonescannavigateintothiszone">InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-intranetzoneallowaccesstodatasources">InternetExplorer/IntranetZoneAllowAccessToDataSources</a>
|
<a href="#internetexplorer-intranetzoneallowaccesstodatasources">InternetExplorer/IntranetZoneAllowAccessToDataSources</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -335,9 +326,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-intranetzoneinitializeandscriptactivexcontrols">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls</a>
|
<a href="#internetexplorer-intranetzoneinitializeandscriptactivexcontrols">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-intranetzoneinitializeandscriptactivexcontrolsnotmarkedsafe">InternetExplorer/IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-intranetzonejavapermissions">InternetExplorer/IntranetZoneJavaPermissions</a>
|
<a href="#internetexplorer-intranetzonejavapermissions">InternetExplorer/IntranetZoneJavaPermissions</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -689,9 +677,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-restrictedsiteszonenavigatewindowsandframes">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames</a>
|
<a href="#internetexplorer-restrictedsiteszonenavigatewindowsandframes">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-restrictedsiteszonenavigatewindowsandframesacrossdomains">InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins">InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins</a>
|
<a href="#internetexplorer-restrictedsiteszonerunactivexcontrolsandplugins">InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -707,9 +692,6 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles">InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles</a>
|
<a href="#internetexplorer-restrictedsiteszoneshowsecuritywarningforpotentiallyunsafefiles">InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-restrictedsiteszoneturnoncrosssitescriptingfilter">InternetExplorer/RestrictedSitesZoneTurnOnCrossSiteScriptingFilter</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-restrictedsiteszoneturnonprotectedmode">InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode</a>
|
<a href="#internetexplorer-restrictedsiteszoneturnonprotectedmode">InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -758,18 +740,9 @@ ms.date: 09/29/2017
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
<a href="#internetexplorer-trustedsiteszonedonotrunantimalwareagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-trustedsiteszonedontrunantimalwareprogramsagainstactivexcontrols">InternetExplorer/TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls</a>
|
<a href="#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrols">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedassafe">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="#internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedsafe">InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#internetexplorer-trustedsiteszonejavapermissions">InternetExplorer/TrustedSitesZoneJavaPermissions</a>
|
<a href="#internetexplorer-trustedsiteszonejavapermissions">InternetExplorer/TrustedSitesZoneJavaPermissions</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -2636,61 +2609,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
|
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-disableblockingofoutdatedactivexcontrols"></a>**InternetExplorer/DisableBlockingOfOutdatedActiveXControls**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer*
|
|
||||||
- GP name: *VerMgmtDisable*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -6090,61 +6008,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-internetzonerunnetframeworkreliantcomponentsnotsignedwithauthenticode"></a>**InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsNotSignedWithAuthenticode**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Run .NET Framework-reliant components not signed with Authenticode*
|
|
||||||
- GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -6310,61 +6173,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-internetzonewebsitesinlessprivilegedzonescannavigateintothiszone"></a>**InternetExplorer/InternetZoneWebsitesInLessPrivilegedZonesCanNavigateIntoThisZone**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Web sites in less privileged Web content zones can navigate into this zone*
|
|
||||||
- GP name: *IZ_PolicyZoneElevationURLaction_1*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -7052,61 +6860,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-intranetzoneinitializeandscriptactivexcontrolsnotmarkedsafe"></a>**InternetExplorer/IntranetZoneInitializeAndScriptActiveXControlsNotMarkedSafe**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Initialize and script ActiveX controls not marked as safe*
|
|
||||||
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -14180,61 +13933,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-restrictedsiteszonenavigatewindowsandframesacrossdomains"></a>**InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFramesAcrossDomains**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Navigate windows and frames across different domains*
|
|
||||||
- GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -14510,61 +14208,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-restrictedsiteszoneturnoncrosssitescriptingfilter"></a>**InternetExplorer/RestrictedSitesZoneTurnOnCrossSiteScriptingFilter**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Turn on Cross-Site Scripting Filter*
|
|
||||||
- GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -15522,61 +15165,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-trustedsiteszonedontrunantimalwareprogramsagainstactivexcontrols"></a>**InternetExplorer/TrustedSitesZoneDontRunAntimalwareProgramsAgainstActiveXControls**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Don't run antimalware programs against ActiveX controls*
|
|
||||||
- GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
@ -15642,116 +15230,6 @@ ADMX Info:
|
|||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
||||||
- GP ADMX file name: *inetres.admx*
|
- GP ADMX file name: *inetres.admx*
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedassafe"></a>**InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedAsSafe**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Initialize and script ActiveX controls not marked as safe*
|
|
||||||
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
|
||||||
<!--EndPolicy-->
|
|
||||||
<hr/>
|
|
||||||
<!--StartPolicy-->
|
|
||||||
<a href="" id="internetexplorer-trustedsiteszoneinitializeandscriptactivexcontrolsnotmarkedsafe"></a>**InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControlsNotMarkedSafe**
|
|
||||||
|
|
||||||
<!--StartSKU-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Home</th>
|
|
||||||
<th>Pro</th>
|
|
||||||
<th>Business</th>
|
|
||||||
<th>Enterprise</th>
|
|
||||||
<th>Education</th>
|
|
||||||
<th>Mobile</th>
|
|
||||||
<th>Mobile Enterprise</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--EndSKU-->
|
|
||||||
<!--StartScope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * User
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--EndScope-->
|
|
||||||
<!--StartDescription-->
|
|
||||||
<!--EndDescription-->
|
|
||||||
> [!TIP]
|
|
||||||
> This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md).
|
|
||||||
|
|
||||||
> You must specify the data type in the SyncML as <Format>chr</Format>. For an example SyncML, refer to [Enabling a policy](./understanding-admx-backed-policies.md#enabling-a-policy).
|
|
||||||
|
|
||||||
> The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect).
|
|
||||||
|
|
||||||
<!--StartADMX-->
|
|
||||||
ADMX Info:
|
|
||||||
- GP English name: *Initialize and script ActiveX controls not marked as safe*
|
|
||||||
- GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5*
|
|
||||||
- GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone*
|
|
||||||
- GP ADMX file name: *inetres.admx*
|
|
||||||
|
|
||||||
<!--EndADMX-->
|
<!--EndADMX-->
|
||||||
<!--EndPolicy-->
|
<!--EndPolicy-->
|
||||||
<hr/>
|
<hr/>
|
||||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: mdt
|
ms.pagetype: mdt
|
||||||
ms.date: 08/23/2017
|
ms.date: 10/10/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -74,9 +74,9 @@ The following methods are available to assign licenses:
|
|||||||
|
|
||||||
Now that your subscription has been established and Windows 10 Enterprise E3 or E5 licenses have been assigned to users, the users are ready to upgrade their devices running Windows 10 Pro, version 1703 edition to Windows 10 Enterprise edition. So what will the users experience? How will they upgrade their devices?
|
Now that your subscription has been established and Windows 10 Enterprise E3 or E5 licenses have been assigned to users, the users are ready to upgrade their devices running Windows 10 Pro, version 1703 edition to Windows 10 Enterprise edition. So what will the users experience? How will they upgrade their devices?
|
||||||
|
|
||||||
### Step 1: Join users’ devices to Azure AD
|
### Step 1: Join Windows 10 Pro devices to Azure AD
|
||||||
|
|
||||||
Users can join a device to Azure AD the first time they start the device (during setup), or they can join a device that they already use running Windows 10 Pro, version 1703.
|
Users can join a Windows 10 Pro device to Azure AD the first time they start the device (during setup), or they can join a device that they already use running Windows 10 Pro, version 1703.
|
||||||
|
|
||||||
**To join a device to Azure AD the first time the device is started**
|
**To join a device to Azure AD the first time the device is started**
|
||||||
|
|
||||||
@ -125,7 +125,18 @@ Now the device is Azure AD joined to the company’s subscription.
|
|||||||
|
|
||||||
Now the device is Azure AD joined to the company’s subscription.
|
Now the device is Azure AD joined to the company’s subscription.
|
||||||
|
|
||||||
### Step 2: Sign in using Azure AD account
|
### Step 2: Verify that Pro edition is activated
|
||||||
|
|
||||||
|
Windows 10 Pro must be successfully activated in **Settings > Update & Security > Activation**, as illustrated in **Figure 7a**.
|
||||||
|
|
||||||
|
<span id="win-10-pro-activated"/>
|
||||||
|
<img src="images/sa-pro-activation.png" alt="Windows 10 Pro activated" width="710" height="440" />
|
||||||
|
<BR>**Figure 7a - Windows 10 Pro activation in Settings** <BR>
|
||||||
|
|
||||||
|
Windows 10 Pro activation is required before Enterprise E3 or E5 can be enabled.
|
||||||
|
|
||||||
|
|
||||||
|
### Step 3: Sign in using Azure AD account
|
||||||
|
|
||||||
Once the device is joined to your Azure AD subscription, the user will sign in by using his or her Azure AD account, as illustrated in **Figure 8**. The Windows 10 Enterprise E3 or E5 license associated with the user will enable Windows 10 Enterprise edition capabilities on the device.
|
Once the device is joined to your Azure AD subscription, the user will sign in by using his or her Azure AD account, as illustrated in **Figure 8**. The Windows 10 Enterprise E3 or E5 license associated with the user will enable Windows 10 Enterprise edition capabilities on the device.
|
||||||
|
|
||||||
@ -133,7 +144,7 @@ Once the device is joined to your Azure AD subscription, the user will sign in b
|
|||||||
|
|
||||||
**Figure 8. Sign in by using Azure AD account**
|
**Figure 8. Sign in by using Azure AD account**
|
||||||
|
|
||||||
### Step 3: Verify that Enterprise edition is enabled
|
### Step 4: Verify that Enterprise edition is enabled
|
||||||
|
|
||||||
You can verify the Windows 10 Enterprise E3 or E5 subscription in **Settings > Update & Security > Activation**, as illustrated in **Figure 9**.
|
You can verify the Windows 10 Enterprise E3 or E5 subscription in **Settings > Update & Security > Activation**, as illustrated in **Figure 9**.
|
||||||
|
|
||||||
|
BIN
windows/deployment/images/sa-pro-activation.png
Normal file
After Width: | Height: | Size: 44 KiB |
@ -6,7 +6,7 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: DaniHalfin
|
author: DaniHalfin
|
||||||
ms.author: daniha
|
ms.author: daniha
|
||||||
ms.date: 07/27/2017
|
ms.date: 10/10/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Change history for Update Windows 10
|
# Change history for Update Windows 10
|
||||||
@ -15,6 +15,12 @@ This topic lists new and updated topics in the [Update Windows 10](index.md) doc
|
|||||||
|
|
||||||
>If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history).
|
>If you're looking for **update history** for Windows 10, see [Windows 10 and Windows Server 2016 update history](https://support.microsoft.com/help/12387/windows-10-update-history).
|
||||||
|
|
||||||
|
## September 2017
|
||||||
|
|
||||||
|
| New or changed topic | Description |
|
||||||
|
| --- | --- |
|
||||||
|
| [Olympia Corp](olympia/olympia-enrollment-guidelines.md) | New |
|
||||||
|
|
||||||
## July 2017
|
## July 2017
|
||||||
|
|
||||||
All topics were updated to reflect the new [naming changes](waas-overview.md#naming-changes).
|
All topics were updated to reflect the new [naming changes](waas-overview.md#naming-changes).
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: nickbrower
|
author: nickbrower
|
||||||
ms.date: 09/15/2017
|
ms.date: 10/10/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
# Olympia Corp
|
# Olympia Corp
|
||||||
|
@ -73,7 +73,7 @@ The deployment script displays the following exit codes to let you know if it wa
|
|||||||
<div font-size='7pt;'>
|
<div font-size='7pt;'>
|
||||||
<table border='1' cellspacing='0' cellpadding='0'>
|
<table border='1' cellspacing='0' cellpadding='0'>
|
||||||
<tr>
|
<tr>
|
||||||
<td BGCOLOR="#a0e4fa" width=5>Exit code and meaning</td>
|
<td BGCOLOR="#a0e4fa" width="5">Exit code and meaning</td>
|
||||||
<td BGCOLOR="#a0e4fa">Suggested fix</td>
|
<td BGCOLOR="#a0e4fa">Suggested fix</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr><td>0 - Success</td>
|
<tr><td>0 - Success</td>
|
||||||
|
@ -32,7 +32,7 @@ D = Edition downgrade; personal data is maintained, applications and settings ar
|
|||||||
<td></td>
|
<td></td>
|
||||||
<td>Windows 10 Home</td>
|
<td>Windows 10 Home</td>
|
||||||
<td>Windows 10 Pro</td>
|
<td>Windows 10 Pro</td>
|
||||||
<td>Windows 10 Pro for Education</td>
|
<td>Windows 10 Pro Education</td>
|
||||||
<td>Windows 10 Education</td>
|
<td>Windows 10 Education</td>
|
||||||
<td>Windows 10 Enterprise</td>
|
<td>Windows 10 Enterprise</td>
|
||||||
<td>Windows 10 Mobile</td>
|
<td>Windows 10 Mobile</td>
|
||||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
|
|||||||
localizationpriority: high
|
localizationpriority: high
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: mdt
|
ms.pagetype: mdt
|
||||||
ms.date: 08/23/2017
|
ms.date: 10/10/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -34,7 +34,7 @@ For information on how to deploy Windows 10 Enterprise licenses, see [Deploy Win
|
|||||||
|
|
||||||
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following:
|
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following:
|
||||||
|
|
||||||
- Windows 10 (Pro or Enterprise) version 1703 or later installed on the devices to be upgraded
|
- Windows 10 (Pro or Enterprise) version 1703 or later installed and **activated** on the devices to be upgraded
|
||||||
- Azure Active Directory (Azure AD) available for identity management
|
- Azure Active Directory (Azure AD) available for identity management
|
||||||
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
keywords: deployment, automate, tools, configure, mdt
|
keywords: deployment, automate, tools, configure, mdt
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 08/23/2017
|
ms.date: 10/10/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -37,18 +37,20 @@ This guide provides instructions to install and configure the Microsoft Deployme
|
|||||||
|
|
||||||
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border="1" cellspacing="0" cellpadding="0">
|
||||||
<TR><TD BGCOLOR="#a0e4fa"><B>Topic</B><TD BGCOLOR="#a0e4fa"><B>Description</B><TD BGCOLOR="#a0e4fa"><B>Time</B>
|
<tr><td BGCOLOR="#a0e4fa"><B>Topic</B><td BGCOLOR="#a0e4fa"><B>Description</B><td BGCOLOR="#a0e4fa"><B>Time</B>
|
||||||
|
|
||||||
<TR><TD>[About MDT](#about-mdt)<TD>A high-level overview of the Microsoft Deployment Toolkit (MDT).<TD>Informational
|
<tr><td>[About MDT](#about-mdt)<td>A high-level overview of the Microsoft Deployment Toolkit (MDT).<td>Informational
|
||||||
<TR><TD>[Install MDT](#install-mdt)<TD>Download and install MDT.<TD>40 minutes
|
<tr><td>[Install MDT](#install-mdt)<td>Download and install MDT.<td>40 minutes
|
||||||
<TR><TD>[Create a deployment share and reference image](#create-a-deployment-share-and-reference-image)<TD>A reference image is created to serve as the template for deploying new images.<TD>90 minutes
|
<tr><td>[Create a deployment share and reference image](#create-a-deployment-share-and-reference-image)<td>A reference image is created to serve as the template for deploying new images.<td>90 minutes
|
||||||
<TR><TD>[Deploy a Windows 10 image using MDT](#deploy-a-windows-10-image-using-mdt)<TD>The reference image is deployed in the PoC environment.<TD>60 minutes
|
<tr><td>[Deploy a Windows 10 image using MDT](#deploy-a-windows-10-image-using-mdt)<td>The reference image is deployed in the PoC environment.<td>60 minutes
|
||||||
<TR><TD>[Refresh a computer with Windows 10](#refresh-a-computer-with-windows-10)<TD>Export user data from an existing client computer, wipe the computer, install a new operating system, and then restore user data and settings.<TD>60 minutes
|
<tr><td>[Refresh a computer with Windows 10](#refresh-a-computer-with-windows-10)<td>Export user data from an existing client computer, wipe the computer, install a new operating system, and then restore user data and settings.<td>60 minutes
|
||||||
<TR><TD>[Replace a computer with Windows 10](#replace-a-computer-with-windows-10)<TD>Back up an existing client computer, then restore this backup to a new computer.<TD>60 minutes
|
<tr><td>[Replace a computer with Windows 10](#replace-a-computer-with-windows-10)<td>Back up an existing client computer, then restore this backup to a new computer.<td>60 minutes
|
||||||
<TR><TD>[Troubleshooting logs, events, and utilities](#troubleshooting-logs-events-and-utilities)<TD>Log locations and troubleshooting hints.<TD>Informational
|
<tr><td>[Troubleshooting logs, events, and utilities](#troubleshooting-logs-events-and-utilities)<td>Log locations and troubleshooting hints.<td>Informational
|
||||||
</TABLE>
|
</TABLE>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
@ -7,7 +7,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
keywords: deployment, automate, tools, configure, sccm
|
keywords: deployment, automate, tools, configure, sccm
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 08/23/2017
|
ms.date: 10/10/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -37,23 +37,25 @@ This guide provides end-to-end instructions to install and configure System Cent
|
|||||||
|
|
||||||
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border="1" cellspacing="0" cellpadding="0">
|
||||||
<TR><TD BGCOLOR="#a0e4fa"><B>Topic</B><TD BGCOLOR="#a0e4fa"><B>Description</B><TD BGCOLOR="#a0e4fa"><B>Time</B>
|
<tr><td BGCOLOR="#a0e4fa"><b>Topic</b><td BGCOLOR="#a0e4fa"><b>Description</b><td BGCOLOR="#a0e4fa"><b>Time</b>
|
||||||
|
|
||||||
<TR><TD>[Install prerequisites](#install-prerequisites)<TD>Install prerequisite Windows Server roles and features, download, install and configure SQL Server, configure firewall rules, and install the Windows ADK.<TD>60 minutes
|
<tr><td>[Install prerequisites](#install-prerequisites)<td>Install prerequisite Windows Server roles and features, download, install and configure SQL Server, configure firewall rules, and install the Windows ADK.<td>60 minutes
|
||||||
<TR><TD>[Install System Center Configuration Manager](#install-system-center-configuration-manager)<TD>Download System Center Configuration Manager, configure prerequisites, and install the package.<TD>45 minutes
|
<tr><td>[Install System Center Configuration Manager](#install-system-center-configuration-manager)<td>Download System Center Configuration Manager, configure prerequisites, and install the package.<td>45 minutes
|
||||||
<TR><TD>[Download MDOP and install DaRT](#download-mdop-and-install-dart)<TD>Download the Microsoft Desktop Optimization Pack 2015 and install DaRT 10.<TD>15 minutes
|
<tr><td>[Download MDOP and install DaRT](#download-mdop-and-install-dart)<td>Download the Microsoft Desktop Optimization Pack 2015 and install DaRT 10.<td>15 minutes
|
||||||
<TR><TD>[Prepare for Zero Touch installation](#prepare-for-zero-touch-installation)<TD>Prerequisite procedures to support Zero Touch installation.<TD>60 minutes
|
<tr><td>[Prepare for Zero Touch installation](#prepare-for-zero-touch-installation)<td>Prerequisite procedures to support Zero Touch installation.<td>60 minutes
|
||||||
<TR><TD>[Create a boot image for Configuration Manager](#create-a-boot-image-for-configuration-manager)<TD>Use the MDT wizard to create the boot image in Configuration Manager.<TD>20 minutes
|
<tr><td>[Create a boot image for Configuration Manager](#create-a-boot-image-for-configuration-manager)<td>Use the MDT wizard to create the boot image in Configuration Manager.<td>20 minutes
|
||||||
<TR><TD>[Create a Windows 10 reference image](#create-a-windows-10-reference-image)<TD>This procedure can be skipped if it was done previously, otherwise instructions are provided to create a reference image.<TD>0-60 minutes
|
<tr><td>[Create a Windows 10 reference image](#create-a-windows-10-reference-image)<td>This procedure can be skipped if it was done previously, otherwise instructions are provided to create a reference image.<td>0-60 minutes
|
||||||
<TR><TD>[Add a Windows 10 operating system image](#add-a-windows-10-operating-system-image)<TD>Add a Windows 10 operating system image and distribute it.<TD>10 minutes<TR><TD>[Create a task sequence](#create-a-task-sequence)<TD>Create a Configuration Manager task sequence with MDT integration using the MDT wizard<TD>15 minutes
|
<tr><td>[Add a Windows 10 operating system image](#add-a-windows-10-operating-system-image)<td>Add a Windows 10 operating system image and distribute it.<td>10 minutes<tr><td>[Create a task sequence](#create-a-task-sequence)<td>Create a Configuration Manager task sequence with MDT integration using the MDT wizard<td>15 minutes
|
||||||
<TR><TD>[Finalize the operating system configuration](#finalize-the-operating-system-configuration)<TD>Enable monitoring, configure rules, and distribute content.<TD>30 minutes
|
<tr><td>[Finalize the operating system configuration](#finalize-the-operating-system-configuration)<td>Enable monitoring, configure rules, and distribute content.<td>30 minutes
|
||||||
<TR><TD>[Deploy Windows 10 using PXE and Configuration Manager](#deploy-windows-10-using-pxe-and-configuration-manager)<TD>Deploy Windows 10 using Configuration Manager deployment packages and task sequences.<TD>60 minutes
|
<tr><td>[Deploy Windows 10 using PXE and Configuration Manager](#deploy-windows-10-using-pxe-and-configuration-manager)<td>Deploy Windows 10 using Configuration Manager deployment packages and task sequences.<td>60 minutes
|
||||||
<TR><TD>[Replace a client with Windows 10 using Configuration Manager](#replace-a-client-with-windows-10-using-configuration-manager)<TD>Replace a client computer with Windows 10 using Configuration Manager.<TD>90 minutes
|
<tr><td>[Replace a client with Windows 10 using Configuration Manager](#replace-a-client-with-windows-10-using-configuration-manager)<td>Replace a client computer with Windows 10 using Configuration Manager.<td>90 minutes
|
||||||
<TR><TD>[Refresh a client with Windows 10 using Configuration Manager](#refresh-a-client-with-windows-10-using-configuration-manager)<TD>Use a task sequence to refresh a client with Windows 10 using Configuration Manager and MDT<TD>90 minutes
|
<tr><td>[Refresh a client with Windows 10 using Configuration Manager](#refresh-a-client-with-windows-10-using-configuration-manager)<td>Use a task sequence to refresh a client with Windows 10 using Configuration Manager and MDT<td>90 minutes
|
||||||
|
|
||||||
</TABLE>
|
</table>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
@ -417,12 +419,12 @@ If you have already completed steps in [Deploy Windows 10 in a test lab using Mi
|
|||||||
4. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
4. In the Deployment Workbench console, right-click **Deployment Shares** and select **New Deployment Share**.
|
||||||
|
|
||||||
5. Use the following settings for the New Deployment Share Wizard:
|
5. Use the following settings for the New Deployment Share Wizard:
|
||||||
- Deployment share path: **C:\MDTBuildLab**<BR>
|
- Deployment share path: **C:\MDTBuildLab**<br>
|
||||||
- Share name: **MDTBuildLab$**<BR>
|
- Share name: **MDTBuildLab$**<br>
|
||||||
- Deployment share description: **MDT build lab**<BR>
|
- Deployment share description: **MDT build lab**<br>
|
||||||
- Options: click **Next** to accept the default<BR>
|
- Options: click **Next** to accept the default<br>
|
||||||
- Summary: click **Next**<BR>
|
- Summary: click **Next**<br>
|
||||||
- Progress: settings will be applied<BR>
|
- Progress: settings will be applied<br>
|
||||||
- Confirmation: click **Finish**
|
- Confirmation: click **Finish**
|
||||||
|
|
||||||
6. Expand the **Deployment Shares** node, and then expand **MDT build lab**.
|
6. Expand the **Deployment Shares** node, and then expand **MDT build lab**.
|
||||||
@ -432,18 +434,18 @@ If you have already completed steps in [Deploy Windows 10 in a test lab using Mi
|
|||||||
7. Right-click the **Windows 10** folder created in the previous step, and then click **Import Operating System**.
|
7. Right-click the **Windows 10** folder created in the previous step, and then click **Import Operating System**.
|
||||||
|
|
||||||
8. Use the following settings for the Import Operating System Wizard:
|
8. Use the following settings for the Import Operating System Wizard:
|
||||||
- OS Type: **Full set of source files**<BR>
|
- OS Type: **Full set of source files**<br>
|
||||||
- Source: **D:\\** <BR>
|
- Source: **D:\\** <br>
|
||||||
- Destination: **W10Ent_x64**<BR>
|
- Destination: **W10Ent_x64**<br>
|
||||||
- Summary: click **Next**
|
- Summary: click **Next**
|
||||||
- Confirmation: click **Finish**
|
- Confirmation: click **Finish**
|
||||||
|
|
||||||
9. For purposes of this test lab, we will not add applications, such as Microsoft Office, to the deployment share. For information about adding applications, see the [Add applications](deploy-windows-mdt/create-a-windows-10-reference-image.md#sec03) section of the [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md) topic in the TechNet library.
|
9. For purposes of this test lab, we will not add applications, such as Microsoft Office, to the deployment share. For information about adding applications, see the [Add applications](deploy-windows-mdt/create-a-windows-10-reference-image.md#sec03) section of the [Create a Windows 10 reference image](deploy-windows-mdt/create-a-windows-10-reference-image.md) topic in the TechNet library.
|
||||||
|
|
||||||
10. The next step is to create a task sequence to reference the operating system that was imported. To create a task sequence, right-click the **Task Sequences** node under **MDT Build Lab** and then click **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
10. The next step is to create a task sequence to reference the operating system that was imported. To create a task sequence, right-click the **Task Sequences** node under **MDT Build Lab** and then click **New Task Sequence**. Use the following settings for the New Task Sequence Wizard:
|
||||||
- Task sequence ID: **REFW10X64-001**<BR>
|
- Task sequence ID: **REFW10X64-001**<br>
|
||||||
- Task sequence name: **Windows 10 Enterprise x64 Default Image** <BR>
|
- Task sequence name: **Windows 10 Enterprise x64 Default Image** <br>
|
||||||
- Task sequence comments: **Reference Build**<BR>
|
- Task sequence comments: **Reference Build**<br>
|
||||||
- Template: **Standard Client Task Sequence**
|
- Template: **Standard Client Task Sequence**
|
||||||
- Select OS: click **Windows 10 Enterprise Evaluation in W10Ent_x64 install.wim**
|
- Select OS: click **Windows 10 Enterprise Evaluation in W10Ent_x64 install.wim**
|
||||||
- Specify Product Key: **Do not specify a product key at this time**
|
- Specify Product Key: **Do not specify a product key at this time**
|
||||||
@ -638,27 +640,27 @@ If you have already completed steps in [Deploy Windows 10 in a test lab using Mi
|
|||||||
|
|
||||||
4. In the **State Restore** group, click the **Set Status 5** action, click **Add** in the upper left corner, point to **User State**, and click **Request State Store**. This adds a new action immediately after **Set Status 5**.
|
4. In the **State Restore** group, click the **Set Status 5** action, click **Add** in the upper left corner, point to **User State**, and click **Request State Store**. This adds a new action immediately after **Set Status 5**.
|
||||||
|
|
||||||
5. Configure the **Request State Store** action that was just added with the following settings:<BR>
|
5. Configure the **Request State Store** action that was just added with the following settings:<br>
|
||||||
- Request state storage location to: **Restore state from another computer**<BR>
|
- Request state storage location to: **Restore state from another computer**<br>
|
||||||
- Select the **If computer account fails to connect to state store, use the Network Access account** checkbox.<BR>
|
- Select the **If computer account fails to connect to state store, use the Network Access account** checkbox.<br>
|
||||||
- Options tab: Select the **Continue on error** checkbox.<BR>
|
- Options tab: Select the **Continue on error** checkbox.<br>
|
||||||
- Add Condition: **Task Sequence Variable**:<BR>
|
- Add Condition: **Task Sequence Variable**:<br>
|
||||||
- Variable: **USMTLOCAL** <BR>
|
- Variable: **USMTLOCAL** <br>
|
||||||
- Condition: **not equals**<BR>
|
- Condition: **not equals**<br>
|
||||||
- Value: **True**<BR>
|
- Value: **True**<br>
|
||||||
- Click **OK**.<BR>
|
- Click **OK**.<br>
|
||||||
- Click **Apply**<BR>.
|
- Click **Apply**<br>.
|
||||||
|
|
||||||
6. In the **State Restore** group, click **Restore User State**, click **Add**, point to **User State**, and click **Release State Store**.
|
6. In the **State Restore** group, click **Restore User State**, click **Add**, point to **User State**, and click **Release State Store**.
|
||||||
|
|
||||||
7. Configure the **Release State Store** action that was just added with the following settings:<BR>
|
7. Configure the **Release State Store** action that was just added with the following settings:<br>
|
||||||
- Options tab: Select the **Continue on error** checkbox.<BR>
|
- Options tab: Select the **Continue on error** checkbox.<br>
|
||||||
- Add Condition: **Task Sequence Variable**:<BR>
|
- Add Condition: **Task Sequence Variable**:<br>
|
||||||
- Variable: **USMTLOCAL** <BR>
|
- Variable: **USMTLOCAL** <br>
|
||||||
- Condition: **not equals**<BR>
|
- Condition: **not equals**<br>
|
||||||
- Value: **True**<BR>
|
- Value: **True**<br>
|
||||||
- Click **OK**.<BR>
|
- Click **OK**.<br>
|
||||||
- Click **OK**<BR>.
|
- Click **OK**<br>.
|
||||||
|
|
||||||
|
|
||||||
### Finalize the operating system configuration
|
### Finalize the operating system configuration
|
||||||
@ -668,12 +670,12 @@ If you have already completed steps in [Deploy Windows 10 in a test lab using Mi
|
|||||||
1. In the MDT deployment workbench on SRV1, right-click **Deployment Shares** and then click **New Deployment Share**.
|
1. In the MDT deployment workbench on SRV1, right-click **Deployment Shares** and then click **New Deployment Share**.
|
||||||
|
|
||||||
2. Use the following settings for the New Deployment Share Wizard:
|
2. Use the following settings for the New Deployment Share Wizard:
|
||||||
- Deployment share path: **C:\MDTProduction**<BR>
|
- Deployment share path: **C:\MDTProduction**<br>
|
||||||
- Share name: **MDTProduction$**<BR>
|
- Share name: **MDTProduction$**<br>
|
||||||
- Deployment share description: **MDT Production**<BR>
|
- Deployment share description: **MDT Production**<br>
|
||||||
- Options: click **Next** to accept the default<BR>
|
- Options: click **Next** to accept the default<br>
|
||||||
- Summary: click **Next**<BR>
|
- Summary: click **Next**<br>
|
||||||
- Progress: settings will be applied<BR>
|
- Progress: settings will be applied<br>
|
||||||
- Confirmation: click **Finish**
|
- Confirmation: click **Finish**
|
||||||
|
|
||||||
3. Right-click the **MDT Production** deployment share, and click **Properties**.
|
3. Right-click the **MDT Production** deployment share, and click **Properties**.
|
||||||
@ -724,10 +726,10 @@ If you have already completed steps in [Deploy Windows 10 in a test lab using Mi
|
|||||||
|
|
||||||
2. On the General page, next to **Collection**, click **Browse**, select the **All Unknown Computers** collection, click **OK**, and then click **Next**.
|
2. On the General page, next to **Collection**, click **Browse**, select the **All Unknown Computers** collection, click **OK**, and then click **Next**.
|
||||||
|
|
||||||
3. On the Deployment Settings page, use the following settings:<BR>
|
3. On the Deployment Settings page, use the following settings:<br>
|
||||||
- Purpose: **Available**<BR>
|
- Purpose: **Available**<br>
|
||||||
- Make available to the following: **Only media and PXE**<BR>
|
- Make available to the following: **Only media and PXE**<br>
|
||||||
- Click **Next**.<BR>
|
- Click **Next**.<br>
|
||||||
4. Click **Next** five times to accept defaults on the Scheduling, User Experience, Alerts, and Distribution Points pages.
|
4. Click **Next** five times to accept defaults on the Scheduling, User Experience, Alerts, and Distribution Points pages.
|
||||||
|
|
||||||
5. Click **Close**.
|
5. Click **Close**.
|
||||||
@ -910,14 +912,14 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
|||||||
1. On SRV1, in the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections** and then click **Create Device Collection**.
|
1. On SRV1, in the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections** and then click **Create Device Collection**.
|
||||||
|
|
||||||
2. Use the following settings in the **Create Device Collection Wizard**:
|
2. Use the following settings in the **Create Device Collection Wizard**:
|
||||||
- General > Name: **Install Windows 10 Enterprise x64**<BR>
|
- General > Name: **Install Windows 10 Enterprise x64**<br>
|
||||||
- General > Limiting collection: **All Systems**<BR>
|
- General > Limiting collection: **All Systems**<br>
|
||||||
- Membership Rules > Add Rule: **Direct Rule**<BR>
|
- Membership Rules > Add Rule: **Direct Rule**<br>
|
||||||
- The **Create Direct Membership Rule Wizard** opens, click **Next**<BR>
|
- The **Create Direct Membership Rule Wizard** opens, click **Next**<br>
|
||||||
- Search for Resources > Resource class: **System Resource**<BR>
|
- Search for Resources > Resource class: **System Resource**<br>
|
||||||
- Search for Resources > Attribute name: **Name**<BR>
|
- Search for Resources > Attribute name: **Name**<br>
|
||||||
- Search for Resources > Value: **%**<BR>
|
- Search for Resources > Value: **%**<br>
|
||||||
- Select Resources > Value: Select the computername associated with the PC1 VM<BR>
|
- Select Resources > Value: Select the computername associated with the PC1 VM<br>
|
||||||
- Click **Next** twice and then click **Close** in both windows (Next, Next, Close, then Next, Next, Close)
|
- Click **Next** twice and then click **Close** in both windows (Next, Next, Close, then Next, Next, Close)
|
||||||
|
|
||||||
3. Double-click the Install Windows 10 Enterprise x64 device collection and verify that the PC1 computer account is displayed.
|
3. Double-click the Install Windows 10 Enterprise x64 device collection and verify that the PC1 computer account is displayed.
|
||||||
@ -925,14 +927,14 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
|||||||
4. In the Software Library workspace, expand **Operating Systems**, click **Task Sequences**, right-click **Windows 10 Enterprise x64** and then click **Deploy**.
|
4. In the Software Library workspace, expand **Operating Systems**, click **Task Sequences**, right-click **Windows 10 Enterprise x64** and then click **Deploy**.
|
||||||
|
|
||||||
5. Use the following settings in the Deploy Sofware wizard:
|
5. Use the following settings in the Deploy Sofware wizard:
|
||||||
- General > Collection: Click Browse and select **Install Windows 10 Enterprise x64**<BR>
|
- General > Collection: Click Browse and select **Install Windows 10 Enterprise x64**<br>
|
||||||
- Deployment Settings > Purpose: **Available**<BR>
|
- Deployment Settings > Purpose: **Available**<br>
|
||||||
- Deployment Settings > Make available to the following: **Configuration Manager clients, media and PXE**<BR>
|
- Deployment Settings > Make available to the following: **Configuration Manager clients, media and PXE**<br>
|
||||||
- Scheduling > Click **Next**<BR>
|
- Scheduling > Click **Next**<br>
|
||||||
- User Experience > Click **Next**<BR>
|
- User Experience > Click **Next**<br>
|
||||||
- Alerts > Click **Next**<BR>
|
- Alerts > Click **Next**<br>
|
||||||
- Distribution Points > Click **Next**<BR>
|
- Distribution Points > Click **Next**<br>
|
||||||
- Summary > Click **Next**<BR>
|
- Summary > Click **Next**<br>
|
||||||
- Verify that the wizard completed successfully and then click **Close**
|
- Verify that the wizard completed successfully and then click **Close**
|
||||||
|
|
||||||
|
|
||||||
@ -970,14 +972,14 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
|||||||
1. On SRV1, in the Configuration Manager console, in the Assets and Compliance workspace, right-click **Device Collections** and then click **Create Device Collection**.
|
1. On SRV1, in the Configuration Manager console, in the Assets and Compliance workspace, right-click **Device Collections** and then click **Create Device Collection**.
|
||||||
|
|
||||||
2. Use the following settings in the **Create Device Collection Wizard**:
|
2. Use the following settings in the **Create Device Collection Wizard**:
|
||||||
- General > Name: **USMT Backup (Replace)**<BR>
|
- General > Name: **USMT Backup (Replace)**<br>
|
||||||
- General > Limiting collection: **All Systems**<BR>
|
- General > Limiting collection: **All Systems**<br>
|
||||||
- Membership Rules > Add Rule: **Direct Rule**<BR>
|
- Membership Rules > Add Rule: **Direct Rule**<br>
|
||||||
- The **Create Direct Membership Rule Wizard** opens, click **Next**<BR>
|
- The **Create Direct Membership Rule Wizard** opens, click **Next**<br>
|
||||||
- Search for Resources > Resource class: **System Resource**<BR>
|
- Search for Resources > Resource class: **System Resource**<br>
|
||||||
- Search for Resources > Attribute name: **Name**<BR>
|
- Search for Resources > Attribute name: **Name**<br>
|
||||||
- Search for Resources > Value: **%**<BR>
|
- Search for Resources > Value: **%**<br>
|
||||||
- Select Resources > Value: Select the computername associated with the PC1 VM (GREGLIN-PC1 in this example).<BR>
|
- Select Resources > Value: Select the computername associated with the PC1 VM (GREGLIN-PC1 in this example).<br>
|
||||||
- Click **Next** twice and then click **Close** in both windows.
|
- Click **Next** twice and then click **Close** in both windows.
|
||||||
|
|
||||||
3. Click **Device Collections** and then double-click **USMT Backup (Replace)**. Verify that the computer name/hostname associated with PC1 is displayed in the collection. Do not proceed until this name is displayed.
|
3. Click **Device Collections** and then double-click **USMT Backup (Replace)**. Verify that the computer name/hostname associated with PC1 is displayed in the collection. Do not proceed until this name is displayed.
|
||||||
@ -985,13 +987,13 @@ Set-VMNetworkAdapter -VMName PC4 -StaticMacAddress 00-15-5D-83-26-FF
|
|||||||
### Create a new deployment
|
### Create a new deployment
|
||||||
|
|
||||||
In the Configuration Manager console, in the Software Library workspace under Operating Systems, click **Task Sequences**, right-click **Replace Task Sequence**, click **Deploy**, and use the following settings:
|
In the Configuration Manager console, in the Software Library workspace under Operating Systems, click **Task Sequences**, right-click **Replace Task Sequence**, click **Deploy**, and use the following settings:
|
||||||
- General > Collection: **USMT Backup (Replace)**<BR>
|
- General > Collection: **USMT Backup (Replace)**<br>
|
||||||
- Deployment Settings > Purpose: **Available**<BR>
|
- Deployment Settings > Purpose: **Available**<br>
|
||||||
- Deployment Settings > Make available to the following: **Only Configuration Manager Clients**<BR>
|
- Deployment Settings > Make available to the following: **Only Configuration Manager Clients**<br>
|
||||||
- Scheduling: Click **Next**<BR>
|
- Scheduling: Click **Next**<br>
|
||||||
- User Experience: Click **Next**<BR>
|
- User Experience: Click **Next**<br>
|
||||||
- Alerts: Click **Next**<BR>
|
- Alerts: Click **Next**<br>
|
||||||
- Distribution Points: Click **Next**<BR>
|
- Distribution Points: Click **Next**<br>
|
||||||
- Click **Next** and then click **Close**.
|
- Click **Next** and then click **Close**.
|
||||||
|
|
||||||
### Verify the backup
|
### Verify the backup
|
||||||
|
@ -7,7 +7,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
keywords: deployment, automate, tools, configure, mdt, sccm
|
keywords: deployment, automate, tools, configure, mdt, sccm
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 08/23/2017
|
ms.date: 10/10/2017
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -42,25 +42,25 @@ After completing the instructions in this guide, you will have a PoC environment
|
|||||||
|
|
||||||
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
Topics and procedures in this guide are summarized in the following table. An estimate of the time required to complete each procedure is also provided. Time required to complete procedures will vary depending on the resources available to the Hyper-V host and assigned to VMs, such as processor speed, memory allocation, disk speed, and network speed.
|
||||||
|
|
||||||
|
<br>
|
||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border="1" cellspacing="0" cellpadding="0">
|
||||||
<TR><TD BGCOLOR="#a0e4fa"><B>Topic</B><TD BGCOLOR="#a0e4fa"><B>Description</B><TD BGCOLOR="#a0e4fa"><B>Time</B>
|
<tr><TD BGCOLOR="#a0e4fa"><B>Topic</B></td><TD BGCOLOR="#a0e4fa"><B>Description</B></td><TD BGCOLOR="#a0e4fa"><B>Time</B></td></tr>
|
||||||
|
<tr><td>[Hardware and software requirements](#hardware-and-software-requirements)<td>Prerequisites to complete this guide.<td>Informational
|
||||||
<TR><TD>[Hardware and software requirements](#hardware-and-software-requirements)<TD>Prerequisites to complete this guide.<TD>Informational
|
<tr><td>[Lab setup](#lab-setup)<td>A description and diagram of the PoC environment.<td>Informational
|
||||||
<TR><TD>[Lab setup](#lab-setup)<TD>A description and diagram of the PoC environment.<TD>Informational
|
<tr><td>[Configure the PoC environment](#configure-the-poc-environment)<td>Parent topic for procedures.<td>Informational
|
||||||
<TR><TD>[Configure the PoC environment](#configure-the-poc-environment)<TD>Parent topic for procedures.<TD>Informational
|
<tr><td>[Verify support and install Hyper-V](#verify-support-and-install-hyper-v)<td>Verify that installation of Hyper-V is supported, and install the Hyper-V server role.<td>10 minutes
|
||||||
<TR><TD>[Verify support and install Hyper-V](#verify-support-and-install-hyper-v)<TD>Verify that installation of Hyper-V is supported, and install the Hyper-V server role.<TD>10 minutes
|
<tr><td>[Download VHD and ISO files](#download-vhd-and-iso-files)<td>Download evaluation versions of Windows Server 2012 R2 and Windows 10 and prepare these files to be used on the Hyper-V host.<td>30 minutes
|
||||||
<TR><TD>[Download VHD and ISO files](#download-vhd-and-iso-files)<TD>Download evaluation versions of Windows Server 2012 R2 and Windows 10 and prepare these files to be used on the Hyper-V host.<TD>30 minutes
|
<tr><td>[Convert PC to VM](#convert-pc-to-vm)<td>Convert a physical computer on your network to a VM hosted in Hyper-V.<td>30 minutes
|
||||||
<TR><TD>[Convert PC to VM](#convert-pc-to-vm)<TD>Convert a physical computer on your network to a VM hosted in Hyper-V.<TD>30 minutes
|
<tr><td>[Resize VHD](#resize-vhd)<td>Increase the storage capacity for one of the Windows Server VMs.<td>5 minutes
|
||||||
<TR><TD>[Resize VHD](#resize-vhd)<TD>Increase the storage capacity for one of the Windows Server VMs.<TD>5 minutes
|
<tr><td>[Configure Hyper-V](#configure-hyper-v)<td>Create virtual switches, determine available RAM for virtual machines, and add virtual machines.<td>15 minutes
|
||||||
<TR><TD>[Configure Hyper-V](#configure-hyper-v)<TD>Create virtual switches, determine available RAM for virtual machines, and add virtual machines.<TD>15 minutes
|
<tr><td>[Configure service and user accounts](#configure-service-and-user-accounts)<td>Start virtual machines and configure all services and settings.<td>60 minutes
|
||||||
<TR><TD>[Configure service and user accounts](#configure-service-and-user-accounts)<TD>Start virtual machines and configure all services and settings.<TD>60 minutes
|
<tr><td>[Configure VMs](#configure-vms)<td>Start virtual machines and configure all services and settings.<td>60 minutes
|
||||||
<TR><TD>[Configure VMs](#configure-vms)<TD>Start virtual machines and configure all services and settings.<TD>60 minutes
|
<tr><td>[Appendix A: Verify the configuration](#appendix-a-verify-the-configuration)<td>Verify and troubleshoot network connectivity and services in the PoC environment.<td>30 minutes
|
||||||
<TR><TD>[Appendix A: Verify the configuration](#appendix-a-verify-the-configuration)<TD>Verify and troubleshoot network connectivity and services in the PoC environment.<TD>30 minutes
|
<tr><td>[Appendix B: Terminology in this guide](#appendix-b-terminology-used-in-this-guide)<td>Terms used in this guide.<td>Informational
|
||||||
<TR><TD>[Appendix B: Terminology in this guide](#appendix-b-terminology-used-in-this-guide)<TD>Terms used in this guide.<TD>Informational
|
</table>
|
||||||
</TABLE>
|
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
## Hardware and software requirements
|
## Hardware and software requirements
|
||||||
@ -74,9 +74,9 @@ Harware requirements are displayed below:
|
|||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border="1" cellspacing="0" cellpadding="0">
|
||||||
<tr>
|
<tr>
|
||||||
<TD></td>
|
<td></td>
|
||||||
<td BGCOLOR="#a0e4fa">**Computer 1** (required)</td>
|
<td BGCOLOR="#a0e4fa">**Computer 1** (required)</td>
|
||||||
<td BGCOLOR="#a0e4fa">**Computer 2** (recommended)</td>
|
<td BGCOLOR="#a0e4fa">**Computer 2** (recommended)</td>
|
||||||
</tr>
|
</tr>
|
||||||
@ -230,7 +230,7 @@ When you have completed installation of Hyper-V on the host computer, begin conf
|
|||||||
After completing registration you will be able to download the 7.47 GB Windows Server 2012 R2 evaluation VHD. An example of the download offering is shown below.
|
After completing registration you will be able to download the 7.47 GB Windows Server 2012 R2 evaluation VHD. An example of the download offering is shown below.
|
||||||
|
|
||||||
<TABLE BORDER=1>
|
<TABLE BORDER=1>
|
||||||
<TR><TD>  </TD></TR>
|
<tr><td>  </TD></TR>
|
||||||
</TABLE>
|
</TABLE>
|
||||||
|
|
||||||
2. Download the file to the **C:\VHD** directory. When the download is complete, rename the VHD file that you downloaded to **2012R2-poc-1.vhd**. This is done to make the filename simple to recognize and type.
|
2. Download the file to the **C:\VHD** directory. When the download is complete, rename the VHD file that you downloaded to **2012R2-poc-1.vhd**. This is done to make the filename simple to recognize and type.
|
||||||
@ -262,7 +262,7 @@ w10-enterprise.iso
|
|||||||
|
|
||||||
>Important: Do not attempt to use the VM resulting from the following procedure as a reference image. Also, to avoid conflicts with existing clients, do not start the VM outside the PoC network.
|
>Important: Do not attempt to use the VM resulting from the following procedure as a reference image. Also, to avoid conflicts with existing clients, do not start the VM outside the PoC network.
|
||||||
|
|
||||||
<TABLE BORDER=2><TR><TD>
|
<TABLE BORDER=2><tr><td>
|
||||||
If you do not have a PC available to convert to VM, perform the following steps to download an evaluation VM:
|
If you do not have a PC available to convert to VM, perform the following steps to download an evaluation VM:
|
||||||
<BR>
|
<BR>
|
||||||
<OL>
|
<OL>
|
||||||
@ -292,7 +292,7 @@ When creating a VM in Hyper-V, you must specify either generation 1 or generatio
|
|||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border=1 cellspacing="0" cellpadding="0">
|
||||||
<tr>
|
<tr>
|
||||||
<td></td>
|
<td></td>
|
||||||
<td>Architecture</td>
|
<td>Architecture</td>
|
||||||
@ -363,7 +363,7 @@ The following table displays the Hyper-V VM generation to choose based on the OS
|
|||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border=1 cellspacing="0" cellpadding="0">
|
||||||
<tr>
|
<tr>
|
||||||
<td>OS</td>
|
<td>OS</td>
|
||||||
<td>Partition style</td>
|
<td>Partition style</td>
|
||||||
@ -1073,18 +1073,18 @@ Use the following procedures to verify that the PoC environment is configured pr
|
|||||||
|
|
||||||
<div style='font-size:9.0pt'>
|
<div style='font-size:9.0pt'>
|
||||||
|
|
||||||
<TABLE border=1 cellspacing=0 cellpadding=0>
|
<table border="1" cellspacing="0" cellpadding="0">
|
||||||
<TR><TD BGCOLOR="#a0e4fa"><B>Term</B><TD BGCOLOR="#a0e4fa"><B>Definition</B>
|
<tr><TD BGCOLOR="#a0e4fa"><B>Term</B><TD BGCOLOR="#a0e4fa"><B>Definition</B>
|
||||||
<TR><TD>GPT<TD>GUID partition table (GPT) is an updated hard-disk formatting scheme that enables the use of newer hardware. GPT is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions.
|
<tr><td>GPT<td>GUID partition table (GPT) is an updated hard-disk formatting scheme that enables the use of newer hardware. GPT is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions.
|
||||||
<TR><TD>Hyper-V<TD>Hyper-V is a server role introduced with Windows Server 2008 that lets you create a virtualized computing environment. Hyper-V can also be installed as a Windows feature on Windows client operating systems, starting with Windows 8.
|
<tr><td>Hyper-V<td>Hyper-V is a server role introduced with Windows Server 2008 that lets you create a virtualized computing environment. Hyper-V can also be installed as a Windows feature on Windows client operating systems, starting with Windows 8.
|
||||||
<TR><TD>Hyper-V host<TD>The computer where Hyper-V is installed.
|
<tr><td>Hyper-V host<td>The computer where Hyper-V is installed.
|
||||||
<TR><TD>Hyper-V Manager<TD>The user-interface console used to view and configure Hyper-V.
|
<tr><td>Hyper-V Manager<td>The user-interface console used to view and configure Hyper-V.
|
||||||
<TR><TD>MBR<TD>Master Boot Record (MBR) is a legacy hard-disk formatting scheme that limits support for newer hardware. MBR is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions. MBR is in the process of being replaced by the GPT partition format.
|
<tr><td>MBR<td>Master Boot Record (MBR) is a legacy hard-disk formatting scheme that limits support for newer hardware. MBR is one of the partition formats that can be chosen when first initializing a hard drive, prior to creating and formatting partitions. MBR is in the process of being replaced by the GPT partition format.
|
||||||
<TR><TD>Proof of concept (PoC)<TD>Confirmation that a process or idea works as intended. A PoC is carried out in a test environment to learn about and verify a process.
|
<tr><td>Proof of concept (PoC)<td>Confirmation that a process or idea works as intended. A PoC is carried out in a test environment to learn about and verify a process.
|
||||||
<TR><TD>Shadow copy<TD>A copy or "snapshot" of a computer at a point in time, created by the Volume Shadow Copy Service (VSS), typically for backup purposes.
|
<tr><td>Shadow copy<td>A copy or "snapshot" of a computer at a point in time, created by the Volume Shadow Copy Service (VSS), typically for backup purposes.
|
||||||
<TR><TD>Virtual machine (VM)<TD>A VM is a virtual computer with its own operating system, running on the Hyper-V host.
|
<tr><td>Virtual machine (VM)<td>A VM is a virtual computer with its own operating system, running on the Hyper-V host.
|
||||||
<TR><TD>Virtual switch<TD>A virtual network connection used to connect VMs to each other and to physical network adapters on the Hyper-V host.
|
<tr><td>Virtual switch<td>A virtual network connection used to connect VMs to each other and to physical network adapters on the Hyper-V host.
|
||||||
<TR><TD>VM snapshot<TD>A point in time image of a VM that includes its disk, memory and device state. It can be used to return a virtual machine to a former state corresponding to the time the snapshot was taken.
|
<tr><td>VM snapshot<td>A point in time image of a VM that includes its disk, memory and device state. It can be used to return a virtual machine to a former state corresponding to the time the snapshot was taken.
|
||||||
</TABLE>
|
</TABLE>
|
||||||
|
|
||||||
</div>
|
</div>
|
||||||
|
@ -28,7 +28,7 @@ To create a catalog file, you use a tool called **Package Inspector**. You must
|
|||||||
|
|
||||||
1. Be sure that a code integrity policy is currently deployed in audit mode on the computer on which you will run Package Inspector.
|
1. Be sure that a code integrity policy is currently deployed in audit mode on the computer on which you will run Package Inspector.
|
||||||
|
|
||||||
Package Inspector does not always detect installation files that have been removed from the computer during the installation process. To ensure that these binaries are also trusted, deploy a code integrity policy in audit mode. You can use the code integrity policy that you created and audited in [Create a code integrity policy from a golden computer](deploy-code-integrity-policies-steps.md#create-a-code-integrity-policy-from-a-golden-computer) and [Audit code integrity policies](deploy-code-integrity-policies-steps.md#audit-code-integrity-policies).
|
Package Inspector does not always detect installation files that have been removed from the computer during the installation process. To ensure that these binaries are also trusted, deploy a code integrity policy in audit mode. You can use the code integrity policy that you created and audited in [Create a code integrity policy from a reference computer](deploy-code-integrity-policies-steps.md#create-a-code-integrity-policy-from-a-reference-computer) and [Audit code integrity policies](deploy-code-integrity-policies-steps.md#audit-code-integrity-policies).
|
||||||
|
|
||||||
> **Note** This process should **not** be performed on a system with an enforced Windows Defender Device Guard policy, only with a policy in audit mode. If a policy is currently being enforced, you will not be able to install and run the application.
|
> **Note** This process should **not** be performed on a system with an enforced Windows Defender Device Guard policy, only with a policy in audit mode. If a policy is currently being enforced, you will not be able to install and run the application.
|
||||||
|
|
||||||
|
@ -16,19 +16,25 @@ author: brianlic-msft
|
|||||||
|
|
||||||
For an overview of the process described in the following procedures, see [Deploy code integrity policies: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md). To understand how the deployment of code integrity policies fits with other steps in the Windows Defender Device Guard deployment process, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md).
|
For an overview of the process described in the following procedures, see [Deploy code integrity policies: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md). To understand how the deployment of code integrity policies fits with other steps in the Windows Defender Device Guard deployment process, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md).
|
||||||
|
|
||||||
## Create a code integrity policy from a golden computer
|
## Create a code integrity policy from a reference computer
|
||||||
|
|
||||||
The process for creating a golden code integrity policy from a reference system is straightforward. This section outlines the process that is required to successfully create a code integrity policy with Windows PowerShell. First, for this example, you must initiate variables to be used during the creation process. Rather than using variables, you can simply use the full file paths in the command. Next, you create the code integrity policy by scanning the system for installed applications. When created, the policy file is converted to binary format so that Windows can consume its contents.
|
This section outlines the process to create a code integrity policy with Windows PowerShell.
|
||||||
|
For this example, you must initiate variables to be used during the creation process or use the full file paths in the command.
|
||||||
|
Then create the code integrity policy by scanning the system for installed applications.
|
||||||
|
The policy file is converted to binary format when it gets created so that Windows can interpret it.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> Before you begin this procedure, make sure that the reference PC is virus and malware-free,and that any software you want to be scanned is installed on the system before creating the code integrity policy.
|
> Make sure the reference computer is virus and malware-free, and install any software you want to be scanned before creating the code integrity policy.
|
||||||
|
|
||||||
### Scripting and applications
|
### Scripting and applications
|
||||||
|
|
||||||
Each installed software application should be validated as trustworthy before you create a policy. We recommend that you review the reference PC for software that can load arbitrary DLLs and run code or scripts that could render the PC more vulnerable. Examples include software aimed at development or scripting such as msbuild.exe (part of Visual Studio and the .NET Framework) which can be removed if you do not want it to run scripts.
|
Each installed software application should be validated as trustworthy before you create a policy.
|
||||||
You can remove or disable such software on reference PCs used to create code integrity policies. You can also fine-tune your control by using Windows Defender Device Guard in combination with AppLocker, as described in [Windows Defender Device Guard with AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies#device-guard-with-applocker).
|
We recommend that you review the reference computer for software that can load arbitrary DLLs and run code or scripts that could render the PC more vulnerable.
|
||||||
|
Examples include software aimed at development or scripting such as msbuild.exe (part of Visual Studio and the .NET Framework) which can be removed if you do not want it to run scripts.
|
||||||
|
You can remove or disable such software on the reference computer.
|
||||||
|
You can also fine-tune your control by [using Windows Defender Device Guard in combination with AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies#device-guard-with-applocker).
|
||||||
|
|
||||||
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft® to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Device Guard code integrity policies.
|
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Device Guard code integrity policies.
|
||||||
|
|
||||||
Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent Application Whitelisting policies, including Windows Defender Device Guard:
|
Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent Application Whitelisting policies, including Windows Defender Device Guard:
|
||||||
|
|
||||||
@ -70,11 +76,15 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
|
|||||||
<br />
|
<br />
|
||||||
|
|
||||||
>[!Note]
|
>[!Note]
|
||||||
>This application list is fluid and will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
|
>This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
|
||||||
|
|
||||||
Certain software applications may allow additional code to run by design. These types of applications should be blocked by your Windows Defender Device Guard policy. In addition, when an application version is upgraded to fix a security vulnerability or potential Windows Defender Device Guard bypass, you should add deny rules to your code integrity policies for that application’s previous, less secure versions.
|
Certain software applications may allow additional code to run by design.
|
||||||
|
These types of applications should be blocked by your Windows Defender Device Guard policy.
|
||||||
|
In addition, when an application version is upgraded to fix a security vulnerability or potential Windows Defender Device Guard bypass, you should add deny rules to your code integrity policies for that application’s previous, less secure versions.
|
||||||
|
|
||||||
Microsoft recommends that you install the latest security updates. The June 2017 Windows updates resolve several issues in in-box PowerShell modules that allowed an attacker to bypass Windows Defender Device Guard code integrity policies. These modules cannot be blocked by name or version, and therefore must be blocked by their corresponding hashes.
|
Microsoft recommends that you install the latest security updates.
|
||||||
|
The June 2017 Windows updates resolve several issues in PowerShell modules that allowed an attacker to bypass Windows Defender Device Guard code integrity policies.
|
||||||
|
These modules cannot be blocked by name or version, and therefore must be blocked by their corresponding hashes.
|
||||||
|
|
||||||
For October 2017, we are announcing an update to system.management.automation.dll in which we are revoking older versions by hash values, instead of version rules.
|
For October 2017, we are announcing an update to system.management.automation.dll in which we are revoking older versions by hash values, instead of version rules.
|
||||||
|
|
||||||
@ -681,7 +691,7 @@ To create a code integrity policy, copy each of the following commands into an e
|
|||||||
|
|
||||||
` New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy –UserPEs 3> CIPolicyLog.txt `
|
` New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy –UserPEs 3> CIPolicyLog.txt `
|
||||||
|
|
||||||
> [!Notes]
|
> [!Note]
|
||||||
|
|
||||||
> - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the code integrity policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Windows Defender Device Guard. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application.
|
> - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the code integrity policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Windows Defender Device Guard. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application.
|
||||||
|
|
||||||
@ -707,11 +717,11 @@ We recommend that every code integrity policy be run in audit mode before being
|
|||||||
When code integrity policies are run in audit mode, it allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a code integrity policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new code integrity policy. When the new exception policy is created, you can merge it with your existing code integrity policies.
|
When code integrity policies are run in audit mode, it allows administrators to discover any applications that were missed during an initial policy scan and to identify any new applications that have been installed and run since the original policy was created. While a code integrity policy is running in audit mode, any binary that runs and would have been denied had the policy been enforced is logged in the **Applications and Services Logs\\Microsoft\\Windows\\CodeIntegrity\\Operational** event log. When these logged binaries have been validated, they can easily be added to a new code integrity policy. When the new exception policy is created, you can merge it with your existing code integrity policies.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> Before you begin this process, you need to create a code integrity policy binary file. If you have not already done so, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic, for a step-by-step walkthrough of the process to create a code integrity policy and convert it to binary format.
|
> Before you begin this process, you need to create a code integrity policy binary file. If you have not already done so, see [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer), earlier in this topic, for a step-by-step walkthrough of the process to create a code integrity policy and convert it to binary format.
|
||||||
|
|
||||||
**To audit a code integrity policy with local policy:**
|
**To audit a code integrity policy with local policy:**
|
||||||
|
|
||||||
1. Find a *.bin policy file that you have created, for example, the DeviceGuardPolicy.bin file that resulted from the steps in the earlier section, [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Copy the file to C:\\Windows\\System32\\CodeIntegrity.
|
1. Find a *.bin policy file that you have created, for example, the DeviceGuardPolicy.bin file that resulted from the steps in the earlier section, [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer). Copy the file to C:\\Windows\\System32\\CodeIntegrity.
|
||||||
|
|
||||||
2. On the computer you want to run in audit mode, open the Local Group Policy Editor by running **GPEdit.msc**.
|
2. On the computer you want to run in audit mode, open the Local Group Policy Editor by running **GPEdit.msc**.
|
||||||
|
|
||||||
@ -725,7 +735,7 @@ When code integrity policies are run in audit mode, it allows administrators to
|
|||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
|
|
||||||
> - The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every system. You can instead copy the code integrity policies to a file share to which all computer accounts have access.
|
> - The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer). Also, this policy file does not need to be copied to every system. You can instead copy the code integrity policies to a file share to which all computer accounts have access.
|
||||||
|
|
||||||
> - Any policy you select here is converted to SIPolicy.p7b when it is deployed to the individual computers.
|
> - Any policy you select here is converted to SIPolicy.p7b when it is deployed to the individual computers.
|
||||||
|
|
||||||
@ -783,7 +793,7 @@ Use the following procedure after you have been running a computer with a code i
|
|||||||
You can now use this file to update the existing code integrity policy that you ran in audit mode by merging the two policies. For instructions on how to merge this audit policy with the existing code integrity policy, see the next section, [Merge code integrity policies](#merge-code-integrity-policies).
|
You can now use this file to update the existing code integrity policy that you ran in audit mode by merging the two policies. For instructions on how to merge this audit policy with the existing code integrity policy, see the next section, [Merge code integrity policies](#merge-code-integrity-policies).
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> You may have noticed that you did not generate a binary version of this policy as you did in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). This is because code integrity policies created from an audit log are not intended to run as stand-alone policies but rather to update existing code integrity policies.
|
> You may have noticed that you did not generate a binary version of this policy as you did in [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer). This is because code integrity policies created from an audit log are not intended to run as stand-alone policies but rather to update existing code integrity policies.
|
||||||
|
|
||||||
## <a href="" id="plug-ins"></a>Use a code integrity policy to control specific plug-ins, add-ins, and modules
|
## <a href="" id="plug-ins"></a>Use a code integrity policy to control specific plug-ins, add-ins, and modules
|
||||||
|
|
||||||
@ -813,7 +823,7 @@ New-CIPolicy -Rules $rule -FilePath ".\BlockAddins.xml" -UserPEs
|
|||||||
|
|
||||||
## Merge code integrity policies
|
## Merge code integrity policies
|
||||||
|
|
||||||
When you develop code integrity policies, you will occasionally need to merge two policies. A common example is when a code integrity policy is initially created and audited. Another example is when you create a single master policy by using multiple code integrity policies previously created from golden computers. Because each computer running Windows 10 can have only one code integrity policy, it is important to properly maintain these policies. In this example, audit events have been saved into a secondary code integrity policy that you then merge with the initial code integrity policy.
|
When you develop code integrity policies, you will occasionally need to merge two policies. A common example is when a code integrity policy is initially created and audited. Another example is when you create a single master policy by using multiple code integrity policies previously created from reference computers. Because each computer running Windows 10 can have only one code integrity policy, it is important to properly maintain these policies. In this example, audit events have been saved into a secondary code integrity policy that you then merge with the initial code integrity policy.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> The following example uses several of the code integrity policy .xml files that you created in earlier sections in this topic. You can follow this process, however, with any two code integrity policies you would like to combine.
|
> The following example uses several of the code integrity policy .xml files that you created in earlier sections in this topic. You can follow this process, however, with any two code integrity policies you would like to combine.
|
||||||
@ -863,7 +873,7 @@ Every code integrity policy is created with audit mode enabled. After you have s
|
|||||||
` $CIPolicyBin=$CIPolicyPath+"EnforcedDeviceGuardPolicy.bin"`
|
` $CIPolicyBin=$CIPolicyPath+"EnforcedDeviceGuardPolicy.bin"`
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> The initial code integrity policy that this section refers to was created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are using a different code integrity policy, update the **CIPolicyPath** and **InitialCIPolicy** variables.
|
> The initial code integrity policy that this section refers to was created in the [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer) section. If you are using a different code integrity policy, update the **CIPolicyPath** and **InitialCIPolicy** variables.
|
||||||
|
|
||||||
2. Ensure that rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) are set the way that you intend for this policy. We strongly recommend that you enable these rule options before you run any enforced policy for the first time. Enabling these options provides administrators with a pre-boot command prompt, and allows Windows to start even if the code integrity policy blocks a kernel-mode driver from running. When ready for enterprise deployment, you can remove these options.
|
2. Ensure that rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) are set the way that you intend for this policy. We strongly recommend that you enable these rule options before you run any enforced policy for the first time. Enabling these options provides administrators with a pre-boot command prompt, and allows Windows to start even if the code integrity policy blocks a kernel-mode driver from running. When ready for enterprise deployment, you can remove these options.
|
||||||
|
|
||||||
@ -892,20 +902,22 @@ Now that this policy is in enforced mode, you can deploy it to your test compute
|
|||||||
|
|
||||||
## Signing code integrity policies with SignTool.exe
|
## Signing code integrity policies with SignTool.exe
|
||||||
|
|
||||||
Signed code integrity policies give organizations the highest level of malware protection available in Windows 10. In addition to their enforced policy rules, signed policies cannot be modified or deleted by a user or administrator on the computer. These policies are designed to prevent administrative tampering and kernel mode exploit access. With this in mind, it is much more difficult to remove signed code integrity policies than unsigned ones. Before you sign and deploy a signed code integrity policy, we recommend that you audit the policy to discover any blocked applications that should be allowed to run. For more information about how to audit code integrity policies, see the [Audit code integrity policies](#audit-code-integrity-policies) section.
|
Signed code integrity policies give organizations the highest level of malware protection available in Windows 10.
|
||||||
|
In addition to their enforced policy rules, signed policies cannot be modified or deleted by a user or administrator on the computer.
|
||||||
|
These policies are designed to prevent administrative tampering and kernel mode exploit access.
|
||||||
|
With this in mind, it is much more difficult to remove signed code integrity policies.
|
||||||
|
Before you sign and deploy a signed code integrity policy, we recommend that you [audit the policy](#audit-code-integrity-policies) to discover any blocked applications that should be allowed to run.
|
||||||
|
|
||||||
Signing code integrity policies by using an on-premises CA-generated certificate or a purchased code signing certificate is straightforward. If you do not currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) to create one with your on-premises CA.
|
Signing code integrity policies by using an on-premises CA-generated certificate or a purchased code signing certificate is straightforward.
|
||||||
|
If you do not currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) to create one with your on-premises CA.
|
||||||
|
|
||||||
Before signing code integrity policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Code integrity policy rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md#code-integrity-policy-rules) in "Deploy code integrity policies: policy rules and file rules."
|
Before signing code integrity policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath <PathAndFilename> -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Code integrity policy rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md#code-integrity-policy-rules) in "Deploy code integrity policies: policy rules and file rules."
|
||||||
|
|
||||||
> [!Note]
|
|
||||||
> Signing code integrity policies is the last step in a code integrity deployment. It is much more difficult to remove a signed code integrity policy than an unsigned one. Before you deploy a signed code integrity policy to deployed client computers, be sure to test its effect on a subset of computers.
|
|
||||||
|
|
||||||
To sign a code integrity policy with SignTool.exe, you need the following components:
|
To sign a code integrity policy with SignTool.exe, you need the following components:
|
||||||
|
|
||||||
- SignTool.exe, found in the Windows SDK (Windows 7 or later)
|
- SignTool.exe, found in the Windows SDK (Windows 7 or later)
|
||||||
|
|
||||||
- The binary format of the code integrity policy that you generated in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section or another code integrity policy that you have created
|
- The binary format of the code integrity policy that you generated in the [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer) section or another code integrity policy that you have created
|
||||||
|
|
||||||
- An internal CA code signing certificate or a purchased code signing certificate
|
- An internal CA code signing certificate or a purchased code signing certificate
|
||||||
|
|
||||||
@ -920,7 +932,7 @@ If you do not have a code signing certificate, see the [Optional: Create a code
|
|||||||
` $CIPolicyBin=$CIPolicyPath+"DeviceGuardPolicy.bin"`
|
` $CIPolicyBin=$CIPolicyPath+"DeviceGuardPolicy.bin"`
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> This example uses the code integrity policy that you created in the [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer) section. If you are signing another policy, be sure to update the **$CIPolicyPath** and **$CIPolicyBin** variables with the correct information.
|
> This example uses the code integrity policy that you created in the [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer) section. If you are signing another policy, be sure to update the **$CIPolicyPath** and **$CIPolicyBin** variables with the correct information.
|
||||||
|
|
||||||
2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the code integrity policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md).
|
2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the code integrity policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for code integrity policies](optional-create-a-code-signing-certificate-for-code-integrity-policies.md).
|
||||||
|
|
||||||
@ -1022,7 +1034,7 @@ There may be a time when signed code integrity policies cause a boot failure. Be
|
|||||||
Code integrity policies can easily be deployed and managed with Group Policy. A Windows Defender Device Guard administrative template will be available in Windows Server 2016 that allows you to simplify deployment of Windows Defender Device Guard hardware-based security features and code integrity policies. The following procedure walks you through how to deploy a code integrity policy called **DeviceGuardPolicy.bin** to a test OU called *DG Enabled PCs* by using a GPO called **Contoso GPO Test**.
|
Code integrity policies can easily be deployed and managed with Group Policy. A Windows Defender Device Guard administrative template will be available in Windows Server 2016 that allows you to simplify deployment of Windows Defender Device Guard hardware-based security features and code integrity policies. The following procedure walks you through how to deploy a code integrity policy called **DeviceGuardPolicy.bin** to a test OU called *DG Enabled PCs* by using a GPO called **Contoso GPO Test**.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> This walkthrough requires that you have previously created a code integrity policy and have a computer running Windows 10 on which to test a Group Policy deployment. For more information about how to create a code integrity policy, see [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer), earlier in this topic.
|
> This walkthrough requires that you have previously created a code integrity policy and have a computer running Windows 10 on which to test a Group Policy deployment. For more information about how to create a code integrity policy, see [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer), earlier in this topic.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> Signed code integrity policies can cause boot failures when deployed. We recommend that signed code integrity policies be thoroughly tested on each hardware platform before enterprise deployment.
|
> Signed code integrity policies can cause boot failures when deployed. We recommend that signed code integrity policies be thoroughly tested on each hardware platform before enterprise deployment.
|
||||||
@ -1054,7 +1066,7 @@ To deploy and manage a code integrity policy with Group Policy:
|
|||||||
In this policy setting, you specify either the local path in which the policy will exist on the client computer or a Universal Naming Convention (UNC) path that the client computers will look to retrieve the latest version of the policy. For example, with DeviceGuardPolicy.bin on the test computer, the example file path would be C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 5.
|
In this policy setting, you specify either the local path in which the policy will exist on the client computer or a Universal Naming Convention (UNC) path that the client computers will look to retrieve the latest version of the policy. For example, with DeviceGuardPolicy.bin on the test computer, the example file path would be C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 5.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a golden computer](#create-a-code-integrity-policy-from-a-golden-computer). Also, this policy file does not need to be copied to every computer. You can instead copy the code integrity policies to a file share to which all computer accounts have access. Any policy selected here is converted to SIPolicy.p7b when it is deployed to the individual client computers.
|
> The illustration shows the example file name *DeviceGuardPolicy.bin* because this name was used earlier in this topic, in [Create a code integrity policy from a reference computer](#create-a-code-integrity-policy-from-a-reference-computer). Also, this policy file does not need to be copied to every computer. You can instead copy the code integrity policies to a file share to which all computer accounts have access. Any policy selected here is converted to SIPolicy.p7b when it is deployed to the individual client computers.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -16,7 +16,9 @@ author: brianlic-msft
|
|||||||
|
|
||||||
As you deploy code integrity policies (part of Windows Defender Device Guard), you might need to sign catalog files or code integrity policies internally. To do this, you will either need a publicly issued code signing certificate or an internal CA. If you have purchased a code signing certificate, you can skip this topic and instead follow other topics listed in [Deploy Windows Defender Device Guard: deploy code integrity policies](deploy-device-guard-deploy-code-integrity-policies.md).
|
As you deploy code integrity policies (part of Windows Defender Device Guard), you might need to sign catalog files or code integrity policies internally. To do this, you will either need a publicly issued code signing certificate or an internal CA. If you have purchased a code signing certificate, you can skip this topic and instead follow other topics listed in [Deploy Windows Defender Device Guard: deploy code integrity policies](deploy-device-guard-deploy-code-integrity-policies.md).
|
||||||
|
|
||||||
If you have not purchased a certificate but have an internal CA, complete these steps to create a code signing certificate:
|
If you have an internal CA, complete these steps to create a code signing certificate.
|
||||||
|
Only RSA algorithm is supported for the code signing certificate, and signatures must be PKCS 1.5 padded.
|
||||||
|
ECDSA is not supported.
|
||||||
|
|
||||||
1. Open the Certification Authority Microsoft Management Console (MMC) snap-in, and then select your issuing CA.
|
1. Open the Certification Authority Microsoft Management Console (MMC) snap-in, and then select your issuing CA.
|
||||||
|
|
||||||
|
@ -2,6 +2,8 @@
|
|||||||
## [Windows Defender Security Center](windows-defender-security-center\windows-defender-security-center.md)
|
## [Windows Defender Security Center](windows-defender-security-center\windows-defender-security-center.md)
|
||||||
## [Windows Defender Advanced Threat Protection](windows-defender-atp\windows-defender-advanced-threat-protection.md)
|
## [Windows Defender Advanced Threat Protection](windows-defender-atp\windows-defender-advanced-threat-protection.md)
|
||||||
### [Minimum requirements](windows-defender-atp\minimum-requirements-windows-defender-advanced-threat-protection.md)
|
### [Minimum requirements](windows-defender-atp\minimum-requirements-windows-defender-advanced-threat-protection.md)
|
||||||
|
### [Validate licensing and complete setup](windows-defender-atp\licensing-windows-defender-advanced-threat-protection.md)
|
||||||
|
#### [Troubleshoot onboarding and error messages](windows-defender-atp\troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md)
|
||||||
### [Preview features](windows-defender-atp\preview-windows-defender-advanced-threat-protection.md)
|
### [Preview features](windows-defender-atp\preview-windows-defender-advanced-threat-protection.md)
|
||||||
### [Data storage and privacy](windows-defender-atp\data-storage-privacy-windows-defender-advanced-threat-protection.md)
|
### [Data storage and privacy](windows-defender-atp\data-storage-privacy-windows-defender-advanced-threat-protection.md)
|
||||||
### [Assign user access to the portal](windows-defender-atp\assign-portal-access-windows-defender-advanced-threat-protection.md)
|
### [Assign user access to the portal](windows-defender-atp\assign-portal-access-windows-defender-advanced-threat-protection.md)
|
||||||
@ -237,16 +239,18 @@
|
|||||||
###[Frequently Asked Questions - Windows Defender Application Guard](windows-defender-application-guard\faq-wd-app-guard.md)
|
###[Frequently Asked Questions - Windows Defender Application Guard](windows-defender-application-guard\faq-wd-app-guard.md)
|
||||||
|
|
||||||
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
||||||
### [Create a Windows Information Protection (WIP) policy](windows-information-protection\overview-create-wip-policy.md)
|
### [Create a Windows Information Protection (WIP) policy using Microsoft Intune](windows-information-protection\overview-create-wip-policy.md)
|
||||||
#### [Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md)
|
#### [Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune.md)
|
||||||
##### [Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md)
|
##### [Deploy your Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune.md)
|
||||||
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md)
|
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the classic console for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune.md)
|
||||||
#### [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
#### [Create a Windows Information Protection (WIP) with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
||||||
##### [Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
##### [Deploy your Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
||||||
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
##### [Associate and deploy a VPN policy for Windows Information Protection (WIP) using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
||||||
|
#### [Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-mam-intune-azure.md)
|
||||||
|
### [Create a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\overview-create-wip-policy-sccm.md)
|
||||||
#### [Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
#### [Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](windows-information-protection\create-wip-policy-using-sccm.md)
|
||||||
#### [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
### [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
||||||
#### [Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](windows-information-protection\wip-app-enterprise-context.md)
|
### [Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](windows-information-protection\wip-app-enterprise-context.md)
|
||||||
### [Mandatory tasks and settings required to turn on Windows Information Protection (WIP)](windows-information-protection\mandatory-settings-for-wip.md)
|
### [Mandatory tasks and settings required to turn on Windows Information Protection (WIP)](windows-information-protection\mandatory-settings-for-wip.md)
|
||||||
### [Testing scenarios for Windows Information Protection (WIP)](windows-information-protection\testing-scenarios-for-wip.md)
|
### [Testing scenarios for Windows Information Protection (WIP)](windows-information-protection\testing-scenarios-for-wip.md)
|
||||||
### [Limitations while using Windows Information Protection (WIP)](windows-information-protection\limitations-with-wip.md)
|
### [Limitations while using Windows Information Protection (WIP)](windows-information-protection\limitations-with-wip.md)
|
||||||
|
@ -11,6 +11,11 @@ author: brianlic-msft
|
|||||||
# Change history for threat protection
|
# Change history for threat protection
|
||||||
This topic lists new and updated topics in the [Threat protection](index.md) documentation.
|
This topic lists new and updated topics in the [Threat protection](index.md) documentation.
|
||||||
|
|
||||||
|
## October 2017
|
||||||
|
|New or changed topic |Description |
|
||||||
|
|---------------------|------------|
|
||||||
|
|[Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-mam-intune-azure.md)|New topic for MAM using the Azure portal.|
|
||||||
|
|
||||||
## June 2017
|
## June 2017
|
||||||
|New or changed topic |Description |
|
|New or changed topic |Description |
|
||||||
|---------------------|------------|
|
|---------------------|------------|
|
||||||
|
After Width: | Height: | Size: 167 KiB |
After Width: | Height: | Size: 622 B |
After Width: | Height: | Size: 83 KiB |
After Width: | Height: | Size: 53 KiB |
After Width: | Height: | Size: 76 KiB |
After Width: | Height: | Size: 126 KiB |
After Width: | Height: | Size: 87 KiB |
After Width: | Height: | Size: 76 KiB |
After Width: | Height: | Size: 78 KiB |
After Width: | Height: | Size: 88 KiB |
After Width: | Height: | Size: 213 KiB |
After Width: | Height: | Size: 71 KiB |
After Width: | Height: | Size: 65 KiB |
After Width: | Height: | Size: 64 KiB |
After Width: | Height: | Size: 126 KiB |
After Width: | Height: | Size: 109 KiB |
After Width: | Height: | Size: 66 KiB |
After Width: | Height: | Size: 87 KiB |
After Width: | Height: | Size: 72 KiB |
After Width: | Height: | Size: 179 KiB |
After Width: | Height: | Size: 131 KiB |
After Width: | Height: | Size: 71 KiB |
After Width: | Height: | Size: 98 KiB |
After Width: | Height: | Size: 67 KiB |
After Width: | Height: | Size: 162 KiB |
@ -0,0 +1,137 @@
|
|||||||
|
---
|
||||||
|
title: Validate licensing provisioning and complete Windows Defender ATP set up
|
||||||
|
description: Validating licensing provisioning, setting up initial preferences, and completing the user set up for Windows Defender Advanced Threat Protection portal.
|
||||||
|
keywords: license, licensing, account, set up, validating licensing, windows defender atp
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: v-tanewt
|
||||||
|
author: tbit0001
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/10/2017
|
||||||
|
---
|
||||||
|
# Validate licensing provisioning and complete set up for Windows Defender ATP
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10 Enterprise
|
||||||
|
- Windows 10 Education
|
||||||
|
- Windows 10 Pro
|
||||||
|
- Windows 10 Pro Education
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-validatelicense-abovefoldlink)
|
||||||
|
|
||||||
|
## Check license state
|
||||||
|
|
||||||
|
Checking for the license state and whether it got properly provisioned, can be done through the **Office 365 admin center** or through the **Microsoft Azure portal**.
|
||||||
|
|
||||||
|
1. In the **Office 365 admin center** navigate to **Billing** > **Subscriptions**.
|
||||||
|
|
||||||
|
- On the screen you will see all the provisioned licenses and their current **Status**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. To view your licenses go to the **Microsoft Azure portal** and navigate to the [Microsoft Azure portal license section](https://portal.azure.com/#blade/Microsoft_AAD_IAM/LicensesMenuBlade/Products).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Cloud Service Provider validation
|
||||||
|
|
||||||
|
To gain access into which licenses are provisioned to your company, and to check the state of the licenses, go to the **Office 365 admin center**.
|
||||||
|
|
||||||
|
1. From the **Partner portal**, click on the **Administer services > Office 365**.
|
||||||
|
|
||||||
|
2. Clicking on the **Partner portal** link will leverage the **Admin on behalf** option and will give you access to the customer **Office 365 admin center**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Access the Windows Defender ATP portal for the first time
|
||||||
|
|
||||||
|
When accessing the [Windows Defender ATP portal](https://SecurityCenter.Windows.com) for the first time there will be a set up wizard that will guide you through some initial steps. At the end of the set up wizard there will be a dedicated cloud instance of Windows Defender ATP created.
|
||||||
|
|
||||||
|
1. Each time you access the portal you will need to validate that you are authorized to access the product. Only if you are not authorized will This **Set up your permissions** step will only be available if you are not currently authorized to access the product.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Once the authorization step is completed the **Welcome** screen will be displayed.
|
||||||
|
|
||||||
|
2. The **Welcome** screen will provide some details as to what is about to occur during the set up wizard.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You will need to set up your preferences for the Windows Defender ATP portal.
|
||||||
|
|
||||||
|
3. When onboarding the service for the first time, you can choose to store your data in the Microsoft Azure datacenters in Europe or The United States. Once configured, you cannot change the location where your data is stored. This provides a convenient way to minimize compliance risk by actively selecting the geographic locations where your data will reside. Microsoft will not transfer the data from the specified geolocation.
|
||||||
|
|
||||||
|
> [!WARNING]
|
||||||
|
> This option cannot be changed without completely offboarding from Windows Defender ATP and completing a new enrollment process.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Windows Defender ATP will store data up to a period of 6 months in your cloud instance, however, you have the option to set the data retention period for a shorter timeframe during this step of the set up process.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This option can be changed at a later time.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. You will need to indicate the size of your organization based on an estimate of the number of employees currently employed.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The **organization size** question is not related to how many licenses were purchased for your organization. It is used by the service to optimize the creation of the data cluster for your organization.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. The customer industry information is helpful in collecting data for the Windows Security Team, and while optional, would be useful if completed.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This option can be changed at a later time.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Learn about new features in the Windows Defender ATP preview release and be among the first to try upcoming features by turning on **Preview features**.
|
||||||
|
|
||||||
|
You'll have access to upcoming features which you can provide feedback on to help improve the overall experience before features are generally available.
|
||||||
|
|
||||||
|
- Toggle the setting between On and Off to choose **Preview features**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This option can be changed at a later time.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. You will receive a warning notifying you that you won't be able to change some of your preferences once you click **Continue**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Some of these options can be changed at a later time in the Windows Defender ATP portal.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. A dedicated cloud instance of the Windows Defender ATP portal is being created at this time. This step will take an average of 5 minutes to complete.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. You are almost done. Before you can start using Windows Defender ATP you'll need to:
|
||||||
|
|
||||||
|
- [Onboard endpoints and setup access](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/configure-endpoints-windows-defender-advanced-threat-protection)
|
||||||
|
|
||||||
|
- Run detection test (optional)
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> If you click **Start using Windows Defender ATP** before onboarding endpoints you will receive the following notification:
|
||||||
|
>
|
||||||
|
|
||||||
|
11. After onboarding endpoints you can click **Start using Windows Defender ATP**. You will now launch Windows Defender ATP for the first time.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Onboard and set up Windows Defender Advanced Threat Protection](onboard-configure-windows-defender-advanced-threat-protection.md)
|
||||||
|
- [Troubleshoot onboarding process and error messages](troubleshoot-onboarding-error-messages-windows-defender-advanced-threat-protection.md)
|
@ -0,0 +1,69 @@
|
|||||||
|
---
|
||||||
|
title: Troubleshoot onboarding issues and error messages
|
||||||
|
description: Troubleshoot onboarding issues and error message while completing setup of Windows Defender Advanced Threat Protection.
|
||||||
|
keywords: troubleshoot, troubleshooting, Azure Active Directory, onboarding, error message, error messages, windows defender atp
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: v-tanewt
|
||||||
|
author: tbit0001
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.date: 09/10/2017
|
||||||
|
---
|
||||||
|
|
||||||
|
## Troubleshoot onboarding and error messages
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10 Enterprise
|
||||||
|
- Windows 10 Education
|
||||||
|
- Windows 10 Pro
|
||||||
|
- Windows 10 Pro Education
|
||||||
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
[!include[Prerelease information](prerelease.md)]
|
||||||
|
|
||||||
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troublshootonboarding-abovefoldlink)
|
||||||
|
|
||||||
|
You might need to troubleshoot the Windows Defender ATP onboarding process if you encounter issues.
|
||||||
|
This page provides detailed steps to troubleshoot onboarding issues that might occur when setting up your Windows Defender ATP service.
|
||||||
|
|
||||||
|
If you receive an error message, the Windows Defender ATP portal will provide detailed explanation on what the issue is and relevant links will be supplied.
|
||||||
|
|
||||||
|
## No subscriptions found
|
||||||
|
|
||||||
|
If while accessing the Windows Defender ATP portal you get a **No subscriptions found** message, it means the Azure Active Directory (AAD) used to login the user to the portal, does not have a Windows Defender ATP license.
|
||||||
|
|
||||||
|
Potential reasons:
|
||||||
|
- The Windows E5 and Office E5 licenses are separate licenses.
|
||||||
|
- The license was purchased but not provisioned to this AAD instance.
|
||||||
|
- It could be a license provisioning issue.
|
||||||
|
- It could be you inadvertently provisioned the license to a different Microsoft AAD than the one used for authentication into the service.
|
||||||
|
|
||||||
|
For both cases you should contact Microsoft support at [General Windows Defender ATP Support](https://support.microsoft.com/en-us/getsupport?wf=0&tenant=ClassicCommercial&oaspworkflow=start_1.0.0.0&locale=en-us&supportregion=en-us&pesid=16055&ccsid=636419533611396913) or
|
||||||
|
[Volume license support](https://www.microsoft.com/licensing/servicecenter/Help/Contact.aspx).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Your subscription has expired
|
||||||
|
|
||||||
|
If while accessing the Windows Defender ATP portal you get a **Your subscription has expired** message, your online service subscription has expired. Windows Defender ATP subscription, like any other online service subscription, has an expiration date.
|
||||||
|
|
||||||
|
You can choose to renew or extend the license at any point in time. When accessing the portal after the expiration date a **Your subscription has expired** message will be presented with an option to download the endpoint offboarding package, should you choose to not renew the license.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> For security reasons, the package used to offboard endpoints will expire 30 days after the date it was downloaded. Expired offboarding packages sent to an endpoint will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## You are not authorized to access the portal
|
||||||
|
|
||||||
|
If you receive a **You are not authorized to access the portal**, be aware that Windows Defender ATP is a security monitoring, incident investigation and response product, and as such, access to it is restricted and controlled by the user.
|
||||||
|
For more information see, [**Assign user access to the portal**](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/assign-portal-access-windows-defender-advanced-threat-protection).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
- [Validating licensing provisioning and completing setup for Windows Defender ATP](licensing-windows-defender-advanced-threat-protection.md)
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune (Windows 10)
|
title: Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
description: Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: The Azure portal for Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, supporting mobile device management (MDM), to let you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: explore
|
ms.mktglfcycl: explore
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -9,7 +9,7 @@ author: eross-msft
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune
|
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -19,7 +19,7 @@ ms.localizationpriority: medium
|
|||||||
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your allowed apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>This topic covers creating a Windows Information Protection (WIP) policy for organizations already managing devices by using Mobile Device Management (MDM) solutions. If your organization uses a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without managing devices, you must follow the instructions in the [Create and deploy Windows Information Protection (WIP) app protection policy with Intune](https://docs.microsoft.com/en-us/intune/deploy-use/create-windows-information-protection-policy-with-intune) topic.
|
>This topic covers creating a Windows Information Protection (WIP) policy for organizations already managing devices by using Mobile Device Management (MDM) solutions. If your organization uses a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without managing devices, you must follow the instructions in the [Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md) topic.
|
||||||
|
|
||||||
## Add a WIP policy
|
## Add a WIP policy
|
||||||
After you’ve set up Intune for your organization, you must create a WIP-specific policy.
|
After you’ve set up Intune for your organization, you must create a WIP-specific policy.
|
||||||
@ -50,7 +50,7 @@ After you’ve set up Intune for your organization, you must create a WIP-specif
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
>Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
||||||
|
|
||||||
### Add apps to your Allowed apps list
|
## Add apps to your Allowed apps list
|
||||||
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||||
|
|
||||||
The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app.
|
The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app.
|
||||||
@ -58,7 +58,7 @@ The steps to add your apps are based on the type of template being applied. You
|
|||||||
>[!Important]
|
>[!Important]
|
||||||
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<br><br>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Allowed apps** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<br><br>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Allowed apps** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
#### Add a Recommended app to your Allowed apps list
|
### Add a Recommended app to your Allowed apps list
|
||||||
For this example, we’re going to add Microsoft Edge, a recommended app, to the **Allowed apps** list.
|
For this example, we’re going to add Microsoft Edge, a recommended app, to the **Allowed apps** list.
|
||||||
|
|
||||||
**To add a recommended app**
|
**To add a recommended app**
|
||||||
@ -80,7 +80,7 @@ For this example, we’re going to add Microsoft Edge, a recommended app, to the
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
#### Add a Store app to your Allowed apps list
|
### Add a Store app to your Allowed apps list
|
||||||
For this example, we’re going to add Microsoft Power BI, a store app, to the **Allowed apps** list.
|
For this example, we’re going to add Microsoft Power BI, a store app, to the **Allowed apps** list.
|
||||||
|
|
||||||
**To add a Store app**
|
**To add a Store app**
|
||||||
@ -150,7 +150,7 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
||||||
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
#### Add a Desktop app to your Allowed apps list
|
### Add a Desktop app to your Allowed apps list
|
||||||
For this example, we’re going to add WordPad, a desktop app, to the **Allowed apps** list.
|
For this example, we’re going to add WordPad, a desktop app, to the **Allowed apps** list.
|
||||||
|
|
||||||
**To add a Desktop app**
|
**To add a Desktop app**
|
||||||
@ -223,7 +223,7 @@ For this example, we’re going to add WordPad, a desktop app, to the **Allowed
|
|||||||
```
|
```
|
||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box.
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box.
|
||||||
|
|
||||||
#### Import a list of apps to your Allowed apps list
|
### Import a list of apps to your Allowed apps list
|
||||||
For this example, we’re going to add an AppLocker XML file to the **Allowed apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
For this example, we’re going to add an AppLocker XML file to the **Allowed apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
**To create a list of Allowed apps using the AppLocker tool**
|
**To create a list of Allowed apps using the AppLocker tool**
|
||||||
@ -311,7 +311,7 @@ For this example, we’re going to add an AppLocker XML file to the **Allowed ap
|
|||||||
|
|
||||||
The file imports and the apps are added to your **Allowed app** list.
|
The file imports and the apps are added to your **Allowed app** list.
|
||||||
|
|
||||||
#### Add exempt apps to your policy
|
### Add exempt apps to your policy
|
||||||
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||||
|
|
||||||
**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Allowed apps list**
|
**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Allowed apps list**
|
||||||
@ -336,7 +336,7 @@ If you're running into compatibility issues where your app is incompatible with
|
|||||||
|
|
||||||
4. Click **OK**.
|
4. Click **OK**.
|
||||||
|
|
||||||
### Manage the WIP protection mode for your enterprise data
|
## Manage the WIP protection mode for your enterprise data
|
||||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Hide Overrides**.
|
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Hide Overrides**.
|
||||||
@ -361,7 +361,7 @@ We recommend that you start with **Silent** or **Allow Overrides** while verifyi
|
|||||||
|
|
||||||
2. Click **Save**.
|
2. Click **Save**.
|
||||||
|
|
||||||
### Define your enterprise-managed corporate identity
|
## Define your enterprise-managed corporate identity
|
||||||
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
|
|
||||||
Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field.
|
Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field.
|
||||||
@ -376,7 +376,7 @@ Starting with Windows 10, version 1703, Intune automatically determines your cor
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Choose where apps can access enterprise data
|
## Choose where apps can access enterprise data
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
@ -453,7 +453,7 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
|
|
||||||
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network.
|
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click this box if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you clear this box, Windows will search for additional IP ranges on any domain-joined devices connected to your network.
|
||||||
|
|
||||||
### Upload your Data Recovery Agent (DRA) certificate
|
## Upload your Data Recovery Agent (DRA) certificate
|
||||||
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
@ -468,7 +468,7 @@ After you create and deploy your WIP policy to your employees, Windows begins to
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Choose your optional WIP-related settings
|
## Choose your optional WIP-related settings
|
||||||
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
|
||||||
**To set your optional settings**
|
**To set your optional settings**
|
||||||
@ -501,7 +501,7 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
|
|
||||||
- **Off, or not configured.** Stops using Azure Rights Management encryption with WIP.
|
- **Off, or not configured.** Stops using Azure Rights Management encryption with WIP.
|
||||||
|
|
||||||
### Choose to set up Azure Rights Management with WIP
|
## Choose to set up Azure Rights Management with WIP
|
||||||
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
||||||
|
|
||||||
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
||||||
|
@ -33,7 +33,7 @@ After you’ve set up Intune for your organization, you must create a WIP-specif
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Add app rules to your policy
|
## Add app rules to your policy
|
||||||
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||||
|
|
||||||
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
||||||
@ -41,7 +41,7 @@ The steps to add your app rules are based on the type of rule template being app
|
|||||||
>[!Important]
|
>[!Important]
|
||||||
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App Rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
#### Add a store app rule to your policy
|
### Add a store app rule to your policy
|
||||||
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
||||||
|
|
||||||
**To add a store app**
|
**To add a store app**
|
||||||
@ -118,7 +118,7 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Add a desktop app rule to your policy
|
### Add a desktop app rule to your policy
|
||||||
For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
||||||
|
|
||||||
**To add a desktop app**
|
**To add a desktop app**
|
||||||
@ -191,7 +191,7 @@ In this example, you'd get the following info:
|
|||||||
```
|
```
|
||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
||||||
|
|
||||||
#### Add an AppLocker policy file
|
### Add an AppLocker policy file
|
||||||
For this example, we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
For this example, we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
**To create an app rule and xml file using the AppLocker tool**
|
**To create an app rule and xml file using the AppLocker tool**
|
||||||
@ -282,7 +282,7 @@ For this example, we’re going to add an AppLocker XML file to the **App Rules*
|
|||||||
|
|
||||||
The file is imported and the apps are added to your **App Rules** list.
|
The file is imported and the apps are added to your **App Rules** list.
|
||||||
|
|
||||||
#### Exempt apps from WIP restrictions
|
### Exempt apps from WIP restrictions
|
||||||
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||||
|
|
||||||
**To exempt a store app, a desktop app, or an AppLocker policy file app rule**
|
**To exempt a store app, a desktop app, or an AppLocker policy file app rule**
|
||||||
@ -306,7 +306,7 @@ If you're running into compatibility issues where your app is incompatible with
|
|||||||
|
|
||||||
5. Click **OK**.
|
5. Click **OK**.
|
||||||
|
|
||||||
### Manage the WIP protection mode for your enterprise data
|
## Manage the WIP protection mode for your enterprise data
|
||||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Allow Overrides** or **Hide Overrides**.
|
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Allow Overrides** or **Hide Overrides**.
|
||||||
@ -320,7 +320,7 @@ We recommend that you start with **Silent** or **Allow Overrides** while verifyi
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Define your enterprise-managed corporate identity
|
## Define your enterprise-managed corporate identity
|
||||||
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
|
|
||||||
You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (`contoso.com|newcontoso.com`). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (`contoso.com|newcontoso.com`). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
||||||
@ -330,7 +330,7 @@ You can specify multiple domains owned by your enterprise by separating them wit
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Choose where apps can access enterprise data
|
## Choose where apps can access enterprise data
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
@ -412,7 +412,7 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
|
|
||||||
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
||||||
|
|
||||||
### Choose to set up Azure Rights Management with WIP
|
## Choose to set up Azure Rights Management with WIP
|
||||||
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files via removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files via removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
||||||
|
|
||||||
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
||||||
@ -422,7 +422,7 @@ Optionally, if you don’t want everyone in your organization to be able to shar
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-custom-templates) topic.
|
>For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-custom-templates) topic.
|
||||||
|
|
||||||
### Choose your optional WIP-related settings
|
## Choose your optional WIP-related settings
|
||||||
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
|
||||||

|

|
||||||
|
@ -0,0 +1,650 @@
|
|||||||
|
---
|
||||||
|
title: Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune (Windows 10)
|
||||||
|
description: The Azure portal for Microsoft Intune helps you create and deploy your Windows Information Protection (WIP) policy, supporting mobile application management (MAM), to let you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: explore
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: eross-msft
|
||||||
|
ms.author: lizross
|
||||||
|
ms.date: 10/12/2017
|
||||||
|
localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune
|
||||||
|
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10, version 1703 and later
|
||||||
|
- Windows 10 Mobile, version 1703 and later (except Microsoft Azure Rights Management, which is only available on the desktop)
|
||||||
|
|
||||||
|
By using Microsoft Intune with Mobile application management (MAM), organizations can take advantage of Azure Active Directory (Azure AD) and the app protection policy feature to keep employees from logging in with personal credentials and accessing corporate data. Additionally, MAM solutions can help your enterprise do the following for mobile apps:
|
||||||
|
|
||||||
|
- Configure, update, and deploy mobile apps to employees
|
||||||
|
- Control what your employees can do with enterprise data, such as copying, pasting, and saving
|
||||||
|
- Keep enterprise data separate from your employee's personal data
|
||||||
|
- Remove enterprise data from employee's devices
|
||||||
|
- Report on mobile app inventory and track usage
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>This topic covers creating a Windows Information Protection (WIP) policy for organizations using a mobile application management (MAM) solution to deploy your WIP policy to Intune apps without device enrollment. If you are already managing devices by using a Mobile Device Management (MDM) solution, you must follow the instructions in the [Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md) topic.
|
||||||
|
|
||||||
|
## Prerequisites to using MAM with Windows Information Protection (WIP)
|
||||||
|
Before you can create your WIP policy with MAM, you must first set up your MAM provider. For more info about how to do this, see the [Get ready to configure app protection policies for Windows 10](https://docs.microsoft.com/en-us/intune-classic/deploy-use/get-ready-to-configure-app-protection-policies-for-windows-10) topic.
|
||||||
|
|
||||||
|
Additionally, you must have an [Azure AD Premium license](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-licensing-what-is) and be running at least Windows 10, version 1703 on your device.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>WIP doesn't support multi-identity. Only one managed identity can exist at a time.
|
||||||
|
|
||||||
|
## Add a WIP policy
|
||||||
|
After you’ve set up Intune for your organization, you must create a WIP-specific policy.
|
||||||
|
|
||||||
|
**To add a WIP policy**
|
||||||
|
1. Open the Azure portal and click the **Intune service** from the sidebar.
|
||||||
|
|
||||||
|
The Microsoft Intune Overview blade appears.
|
||||||
|
|
||||||
|
2. Click **Mobile apps**, click **App protection policies**, and then click **Add a policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. In the **Add a policy** blade, fill out the fields:
|
||||||
|
|
||||||
|
- **Name.** Type a name (required) for your new policy.
|
||||||
|
|
||||||
|
- **Description.** Type an optional description.
|
||||||
|
|
||||||
|
- **Platform.** Choose **Windows 10** to create your MAM policy for desktop client devices.
|
||||||
|
|
||||||
|
- **Enrollment state.** Choose **Without enrollment** as the enrollment state for your policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Choosing **Without enrollment** only applies for organizations using MAM. If you're using MDM, you must use these instructions, [Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md), instead.
|
||||||
|
|
||||||
|
4. Click **Create**.
|
||||||
|
|
||||||
|
The policy is created and appears in the table on the **Mobile apps - App protection policies** blade.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available.
|
||||||
|
|
||||||
|
## Add apps to your Allowed apps list
|
||||||
|
During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||||
|
|
||||||
|
The steps to add your apps are based on the type of template being applied. You can add a recommended app, a store app (also known as a Universal Windows Platform (UWP) app), or a signed Windows desktop app. You can also import a list of approved apps or add exempt apps.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<br><br>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **Allowed apps** list. If you don’t get this statement, it’s possible that you could experience app compatibility issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
|
### Add a Recommended app to your Allowed apps list
|
||||||
|
For this example, we’re going to add a few recommended apps to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a recommended app**
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
The **Add apps** blade appears, showing you all **Recommended apps**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select each app you want to access your enterprise data, and then click **OK**.
|
||||||
|
|
||||||
|
The **Allowed apps** blade updates to show you your selected apps.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Click **Save** to save the **Allowed apps** list to your policy.
|
||||||
|
|
||||||
|
### Add a Store app to your Allowed apps list
|
||||||
|
For this example, we’re going to add Microsoft Power BI, a Windows store app, to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a Store app**
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
3. On the **Add apps** blade, click **Store apps** from the dropdown list.
|
||||||
|
|
||||||
|
4. Type the friendly name of the app, the publisher info, and the product name. For this example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.MicrosoftPowerBIForWindows`.
|
||||||
|
|
||||||
|
5. After you’ve entered the info into the fields, click **OK** to add the app to your **Allowed apps** list, and then click **Save** to save the **Allowed apps** list to your policy.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>To add multiple Store apps at the same time, you can click the menu **(…)** at the end of the app row, and continue to add more apps. When you’re done, click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Find the Name, Publisher, and Product name for Store apps
|
||||||
|
If you don't know the publisher or product name for your Store app, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps.
|
||||||
|
|
||||||
|
**To find the publisher and product name values for Store apps without installing them**
|
||||||
|
1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Microsoft Power BI*.
|
||||||
|
|
||||||
|
2. Copy the ID value from the app URL. For example, Microsoft Power BI ID URL is https://www.microsoft.com/en-us/store/p/microsoft-power-bi/9nblgggzlxn1, and you'd copy the ID value, `9nblgggzlxn1`.
|
||||||
|
|
||||||
|
3. In a browser, run the Microsoft Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata, where `9nblgggzlxn1` is replaced with your ID value.
|
||||||
|
|
||||||
|
The API runs and opens a text editor with the app details.
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"packageIdentityName": "Microsoft.MicrosoftPowerBIForWindows",
|
||||||
|
"publisherCertificateName": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US"
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
4. Copy the `publisherCertificateName` value into the **Publisher** box and copy the `packageIdentityName` value into the **Name** box of the **Add apps** blade.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.<br><br>For example:<br>
|
||||||
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
|
**To find the publisher and product name values for apps installed on Windows 10 mobile phones**
|
||||||
|
1. If you need to add mobile apps that aren't distributed through the Microsoft Store for Business, you must use the **Windows Device Portal** feature.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Your PC and phone must be on the same wireless network.
|
||||||
|
|
||||||
|
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
||||||
|
|
||||||
|
3. In the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**.
|
||||||
|
|
||||||
|
4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate.
|
||||||
|
|
||||||
|
5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step.
|
||||||
|
|
||||||
|
6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names.
|
||||||
|
|
||||||
|
7. Start the app for which you're looking for the publisher and product name values.
|
||||||
|
|
||||||
|
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>The JSON file might also return a windowsPhoneLegacyId value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as windowsPhoneLegacyId, and set the **Publisher Name** as CN= followed by the windowsPhoneLegacyId.<br><br>For example:<br>
|
||||||
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
|
### Add a Desktop app to your Allowed apps list
|
||||||
|
For this example, we’re going to add WordPad, a Desktop app, to the **Allowed apps** list.
|
||||||
|
|
||||||
|
**To add a Desktop app**
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Allowed apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
3. On the **Add apps** blade, click **Desktop apps** from the dropdown list.
|
||||||
|
|
||||||
|
The blade changes to show boxes for you to add the following, based on the results you want returned:
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Field</th>
|
||||||
|
<th>Manages</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>All fields marked as “*”</td>
|
||||||
|
<td>All files signed by any publisher. (Not recommended)</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Name</td>
|
||||||
|
<td>A friendly name for your app. You can't use this field by itself. However, you can use it in conjunction with any of the other fields.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher (required) only</td>
|
||||||
|
<td>Filling out this field, gives you all files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps.<br><br>This is a required field and must be filled out whether by itself or in conjunction with other fields.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher (required) and Product name only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher (required), Product name, and File only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher (required), Product name, File, and Min version only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.<br><br>This option is recommended for enlightened apps that weren't previously enlightened.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Publisher (required), Product name, File, and Max version only</td>
|
||||||
|
<td>If you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>All fields completed</td>
|
||||||
|
<td>If you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
4. After you’ve entered the info into the fields, click **OK** to add the app to your **Allowed apps** list, and then click **Save** to save the **Allowed apps** list to your policy.
|
||||||
|
|
||||||
|
>[!Note]
|
||||||
|
>To add multiple Desktop apps at the same time, you can click the menu **(…)** at the end of the app row, and then continue to add more apps. When you’re done, click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
#### Find the Publisher and File name for Desktop apps
|
||||||
|
If you’re unsure about what to include for the publisher, you can run this PowerShell command:
|
||||||
|
|
||||||
|
```ps1
|
||||||
|
Get-AppLockerFileInformation -Path "<path_of_the_exe>"
|
||||||
|
```
|
||||||
|
Where `"<path_of_the_exe>"` goes to the location of the app on the device. For example, `Get-AppLockerFileInformation -Path "C:\Program Files\Windows NT\Accessories\wordpad.exe"`.
|
||||||
|
|
||||||
|
In this example, you'd get the following info:
|
||||||
|
|
||||||
|
``` json
|
||||||
|
Path Publisher
|
||||||
|
---- ---------
|
||||||
|
%PROGRAMFILES%\WINDOWS NT\ACCESSORIES\WORDPAD.EXE O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US
|
||||||
|
```
|
||||||
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter into the **Publisher** box and `WORDPAD.EXE` is the text to enter into the **File** box.
|
||||||
|
|
||||||
|
### Import a list of apps to your Allowed apps list
|
||||||
|
For this example, we’re going to add an AppLocker XML file to the **Allowed apps** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
|
**To create a list of Allowed apps using the AppLocker tool**
|
||||||
|
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||||
|
|
||||||
|
2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Right-click in the right-hand blade, and then click **Create New Rule**.
|
||||||
|
|
||||||
|
The **Create Packaged app Rules** wizard appears.
|
||||||
|
|
||||||
|
4. On the **Before You Begin** page, click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. On the updated **Publisher** page, click **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Review the Local Security Policy snap-in to make sure your rule is correct.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. In the left blade, right-click on **AppLocker**, and then click **Export policy**.
|
||||||
|
|
||||||
|
The **Export policy** box opens, letting you export and save your new policy as XML.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
||||||
|
|
||||||
|
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
||||||
|
|
||||||
|
**Example XML file**<br>
|
||||||
|
This is the XML file that AppLocker creates for Microsoft Dynamics 365.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<?xml version="1.0"?>
|
||||||
|
<AppLockerPolicy Version="1">
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Appx">
|
||||||
|
<FilePublisherRule Action="Allow" UserOrGroupSid="S-1-1-0" Description="" Name="Microsoft.MicrosoftDynamicsCRMforWindows10, version 3.2.0.0 and above, from Microsoft Corporation" Id="3da34ed9-aec6-4239-88ba-0afdce252ab4">
|
||||||
|
<Conditions>
|
||||||
|
<FilePublisherCondition BinaryName="*" ProductName="Microsoft.MicrosoftDynamicsCRMforWindows10" PublisherName="CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US">
|
||||||
|
<BinaryVersionRange HighSection="*" LowSection="3.2.0.0"/>
|
||||||
|
</FilePublisherCondition>
|
||||||
|
</Conditions>
|
||||||
|
</FilePublisherRule>
|
||||||
|
</RuleCollection>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Dll"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Exe"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Msi"/>
|
||||||
|
<RuleCollection EnforcementMode="NotConfigured" Type="Script"/>
|
||||||
|
</AppLockerPolicy>
|
||||||
|
```
|
||||||
|
|
||||||
|
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||||
|
|
||||||
|
**To import your list of Allowed apps using Microsoft Intune**
|
||||||
|
|
||||||
|
1. From the **Allowed apps** area, click **Import apps**.
|
||||||
|
|
||||||
|
The blade changes to let you add your import file.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Browse to your exported AppLocker policy file, and then click **Open**.
|
||||||
|
|
||||||
|
The file imports and the apps are added to your **Allowed app** list.
|
||||||
|
|
||||||
|
### Add exempt apps to your policy
|
||||||
|
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||||
|
|
||||||
|
**To exempt a Store app, a Desktop app, or an AppLocker policy file from the Allowed apps list**
|
||||||
|
|
||||||
|
1. From the **App policy** blade, click the name of your policy, and then click **Exempt apps** from the menu that appears.
|
||||||
|
|
||||||
|
The **Exempt apps** blade appears, showing you any apps that are already included in the list for this policy.
|
||||||
|
|
||||||
|
2. From the **Exempt apps** blade, click **Add apps**.
|
||||||
|
|
||||||
|
Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data. To allow apps, see the [Add app rules to your policy](#add-apps-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
3. Fill out the rest of the app info, based on the type of app you’re adding:
|
||||||
|
|
||||||
|
- **Recommended app.** Follow the instructions in the [Add a Recommended app to your Allowed apps list](#add-a-recommended-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **Store app.** Follow the instructions in the [Add a Store app to your Allowed apps list](#add-a-store-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **Desktop app.** Follow the instructions in the [Add a Desktop app to your Allowed apps list](#add-a-desktop-app-to_your-allowed-apps-list) section of this topic.
|
||||||
|
|
||||||
|
- **AppLocker policy file.** Follow the instructions to create your app list in the [Import a list of apps to your Allowed apps list](#import-a-list-of-apps-to_your-allowed-apps-list) section of this topic, using a list of exempted apps.
|
||||||
|
|
||||||
|
4. Click **OK**.
|
||||||
|
|
||||||
|
## Manage your Required settings
|
||||||
|
In the **Required settings** blade you must pick your Windows Information Protection mode and you can review or change your **Corporate identity**.
|
||||||
|
|
||||||
|
### Manage the WIP protection mode for your enterprise data
|
||||||
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
|
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Hide Overrides**.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).
|
||||||
|
|
||||||
|
**To add your protection mode**
|
||||||
|
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Required settings** blade appears.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|Mode |Description |
|
||||||
|
|-----|------------|
|
||||||
|
|Hide Overrides |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
||||||
|
|Allow Overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
||||||
|
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
||||||
|
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<br><br>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
||||||
|
|
||||||
|
2. Click **Save**.
|
||||||
|
|
||||||
|
### Define your enterprise-managed corporate identity
|
||||||
|
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
|
|
||||||
|
Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field.
|
||||||
|
|
||||||
|
**To change your corporate identity**
|
||||||
|
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Required settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Required settings** blade appears.
|
||||||
|
|
||||||
|
2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field. If you need to add additional domains, for example your email domains, you can do it in the **Advanced settings** area.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Manage your Advanced settings
|
||||||
|
In the **Advanced settings** blade you must specify where apps can access your corporate data, upload a Data Recovery Agent (DRA) certificate, and set several optional data protection and access settings.
|
||||||
|
|
||||||
|
### Choose where apps can access enterprise data
|
||||||
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
|
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Every WIP policy should include policy that defines your enterprise network locations.<br>Classless Inter-Domain Routing (CIDR) notation isn’t supported for WIP configurations.
|
||||||
|
|
||||||
|
**To define where your allowed apps can find and send enterprise data on you network**
|
||||||
|
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. Click **Add network boundary** from the **Network perimeter** area.
|
||||||
|
|
||||||
|
The **Add network boundary** blade appears.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select the type of network boundary to add from the **Boundary type** box.
|
||||||
|
|
||||||
|
4. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the following options, and then click **OK**.
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Boundary type</th>
|
||||||
|
<th>Value format</th>
|
||||||
|
<th>Description</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Cloud Resources</td>
|
||||||
|
<td><strong>With proxy:</strong> contoso.sharepoint.com,contoso.internalproxy1.com|<br>contoso.visualstudio.com,contoso.internalproxy2.com<br><br><strong>Without proxy:</strong> contoso.sharepoint.com|contoso.visualstudio.com</td>
|
||||||
|
<td>Specify the cloud resources to be treated as corporate and protected by WIP.<br><br>For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource. Be aware that all traffic routed through your Internal proxy servers is considered enterprise.<br><br>If you have multiple resources, you must separate them using the "|" delimiter. If you don’t use proxy servers, you must also include the "," delimiter just before the "|". For example: <code>URL <,proxy>|URL <,proxy></code>.<br><br><strong>Important</strong><br>In some cases, such as when an app connects directly to a cloud resource through an IP address, Windows can’t tell whether it’s attempting to connect to an enterprise cloud resource or to a personal site. In this case, Windows blocks the connection by default. To stop Windows from automatically blocking these connections, you can add the <code>/*AppCompat*/</code> string to the setting. For example: <code>URL <,proxy>|URL <,proxy>|/*AppCompat*/</code>.<br><br>When using this string, we recommend that you also turn on [Azure Active Directory Conditional Access](https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access), using the <strong>Domain joined or marked as compliant</strong> option, which blocks apps from accessing any enterprise cloud resources that are protected by conditional access.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Network domain names</td>
|
||||||
|
<td>corp.contoso.com,region.contoso.com</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the DNS suffixes used in your environment. All traffic to the fully-qualified domains appearing in this list will be protected.<br><br>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Proxy servers</td>
|
||||||
|
<td>proxy.contoso.com:80;proxy2.contoso.com:443</td>
|
||||||
|
<td>Specify the proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.<br><br>This list shouldn’t include any servers listed in your Internal proxy servers list. Internal proxy servers must be used only for WIP-protected (enterprise) traffic.<br><br>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Internal proxy servers</td>
|
||||||
|
<td>contoso.internalproxy1.com;contoso.internalproxy2.com</td>
|
||||||
|
<td>Specify the internal proxy servers your devices will go through to reach your cloud resources. Using this server type indicates that the cloud resources you’re connecting to are enterprise resources.<br><br>This list shouldn’t include any servers listed in your Proxy servers list. Proxy servers must be used only for non-WIP-protected (non-enterprise) traffic.<br><br>If you have multiple resources, you must separate them using the ";" delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>IPv4 ranges</td>
|
||||||
|
<td>**Starting IPv4 Address:** 3.4.0.1<br>**Ending IPv4 Address:** 3.4.255.254<br>**Custom URI:** 3.4.0.1-3.4.255.254,<br>10.0.0.1-10.255.255.254</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv4 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.<br><br>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>IPv6 ranges</td>
|
||||||
|
<td>**Starting IPv6 Address:** 2a01:110::<br>**Ending IPv6 Address:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff<br>**Custom URI:** 2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,<br>fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff</td>
|
||||||
|
<td>Starting with Windows 10, version 1703, this field is optional.<br><br>Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Network domain names, define your corporate network boundaries.<br><br>If you have multiple ranges, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Neutral resources</td>
|
||||||
|
<td>sts.contoso.com,sts.contoso2.com</td>
|
||||||
|
<td>Specify your authentication redirection endpoints for your company.<br><br>These locations are considered enterprise or personal, based on the context of the connection before the redirection.<br><br>If you have multiple resources, you must separate them using the "," delimiter.</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
5. Repeat steps 1-4 to add any additional network boundaries.
|
||||||
|
|
||||||
|
6. Decide if you want to Windows to look for additional network settings:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Click **On** for Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network.Click **Off** and Windows searches for additional proxy servers in your immediate network.
|
||||||
|
|
||||||
|
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Click **On** for Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. Click **Off** and Windows searches for additional IP ranges on any domain-joined devices connected to your network.
|
||||||
|
|
||||||
|
### Upload your Data Recovery Agent (DRA) certificate
|
||||||
|
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) topic.
|
||||||
|
|
||||||
|
**To upload your DRA certificate**
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Choose your optional WIP-related settings
|
||||||
|
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
|
||||||
|
**To set your optional settings**
|
||||||
|
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. Choose to set any or all optional settings:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
||||||
|
|
||||||
|
- **On (recommended).** Turns on the feature and provides the additional protection.
|
||||||
|
|
||||||
|
- **Off** Doesn't enable this feature.
|
||||||
|
|
||||||
|
- **Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
||||||
|
|
||||||
|
- **On (recommended).** Revokes local encryption keys from a device during unenrollment.
|
||||||
|
|
||||||
|
- **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions.
|
||||||
|
|
||||||
|
- **Revoke access to protected data when the device enrolls to MDM.** Determines whether to revoke a user's WIP keys when a device is upgraded from MAM to a higher-security MDM solution. The options are:
|
||||||
|
|
||||||
|
- **On.** Revokes the encryption keys from a device when it's upgraded from MAM to MDM.
|
||||||
|
|
||||||
|
- **Off.** Encryption keys aren't removed and the user can continue to access protected files. This is the recommended setting if the MDM service uses the same WIP EnterpriseID value as the MAM service.
|
||||||
|
|
||||||
|
- **Show the enterprise data protection icon.** Determines whether an icon appears on corporate files in the **Save As** and **File Explorer** views. The options are:
|
||||||
|
|
||||||
|
- **On.** Allows an icon to appear on corporate files in the **Save As** and **File Explorer** views. Additionally, for unenlightened but allowed apps, the icon also appears on the app tile and with Managed text on the app name in the **Start** menu.
|
||||||
|
|
||||||
|
- **Off (recommended).** Stops the icon from appearing on corporate files or unenlightened, but allowed apps. By default, this is turned off.
|
||||||
|
|
||||||
|
- **Use Azure RMS for WIP.** Determines whether to use Azure Rights Management encryption with Windows Information Protection. The options are:
|
||||||
|
|
||||||
|
- **On.** Starts using Azure Rights Management encryption with WIP. By turning this option on, you can also add a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. For more info about setting up Azure Rights management and using a template ID with WIP, see the [Choose to set up Azure Rights Management with WIP](#choose-to-set-up-azure-rights-management-with-wip) section of this topic.
|
||||||
|
|
||||||
|
- **Off.** Stops using Azure Rights Management encryption with WIP.
|
||||||
|
|
||||||
|
- **MDM discovery URL.** Lets the **Windows Settings** > **Accounts** > **Access work or school** sign-in offer an **Upgrade to MDM** link. Additionally, this lets you switch to another MDM provider, so that Microsoft Intune can manage MAM, while the new MDM provider manages the MDM devices. By default, this is specified to use Microsoft Intune.
|
||||||
|
|
||||||
|
#### Choose to set up Azure Rights Management with WIP
|
||||||
|
WIP can integrate with Microsoft Azure Rights Management to enable secure sharing of files by using removable drives such as USB drives. For more info about Azure Rights Management, see [Microsoft Azure Rights Management](https://products.office.com/en-us/business/microsoft-azure-rights-management). To integrate Azure Rights Management with WIP, you must already have Azure Rights Management set up.
|
||||||
|
|
||||||
|
To configure WIP to use Azure Rights Management, you must set the **AllowAzureRMSForEDP** MDM setting to **1** in Microsoft Intune. This setting tells WIP to encrypt files copied to removable drives with Azure Rights Management, so they can be shared amongst your employees on computers running at least Windows 10, version 1703.
|
||||||
|
|
||||||
|
Optionally, if you don’t want everyone in your organization to be able to share your enterprise data, you can set the **RMSTemplateIDForEDP** MDM setting to the **TemplateID** of the Azure Rights Management template used to encrypt the data. You must make sure to mark the template with the **EditRightsData** option.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>For more info about setting the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings, see the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/enterprisedataprotection-csp) topic. For more info about setting up and using a custom template, see [Configuring custom templates for the Azure Rights Management service](https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-custom-templates) topic.
|
||||||
|
|
||||||
|
### Choose whether to use and configure Windows Hello for Business
|
||||||
|
You can turn on Windows Hello for Business, letting your employees use it as a sign-in method for their devices.
|
||||||
|
|
||||||
|
**To turn on and configure Windows Hello for Business**
|
||||||
|
|
||||||
|
1. From the **Mobile apps - App protection policies** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||||
|
|
||||||
|
The **Advanced settings** blade appears.
|
||||||
|
|
||||||
|
2. Choose to turn on and configure the Windows Hello for Business settings:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- **Use Windows Hello for Business as a method for signing into Windows.** Turns on Windows Hello for Business. The options are:
|
||||||
|
|
||||||
|
- **On.** Turns on Windows Hello For Business for anyone assigned to this policy.
|
||||||
|
|
||||||
|
- **Off.** Turns off Windows Hello for Business.
|
||||||
|
|
||||||
|
- **Set the minimum number of characters required for the PIN.** Enter a numerical value (4-127 characters) for how many characters must be used to create a valid PIN. Default is 4 characters.
|
||||||
|
|
||||||
|
- **Configure the use of uppercase letters in the Windows Hello for Business PIN.** Lets you decide whether uppercase letters can be used in a valid PIN. The options are:
|
||||||
|
|
||||||
|
- **Allow the use of uppercase letters in PIN.** Lets an employee use uppercase letters in a valid PIN.
|
||||||
|
|
||||||
|
- **Require the use of at least one uppercase letter in PIN.** Requires an employee to use at least 1 uppercase letter in a valid PIN.
|
||||||
|
|
||||||
|
- **Do not allow the use of uppercase letters in PIN.** Prevents an employee from using uppercase letters in a valid PIN.
|
||||||
|
|
||||||
|
- **Configure the use of lowercase letters in the Windows Hello for Business PIN.** Lets you decide whether lowercase letters can be used in a valid PIN. The options are:
|
||||||
|
|
||||||
|
- **Allow the use of lowercase letters in PIN.** Lets an employee use lowercase letters in a valid PIN.
|
||||||
|
|
||||||
|
- **Require the use of at least one lowercase letter in PIN.** Requires an employee to use at least 1 lowercase letter in a valid PIN.
|
||||||
|
|
||||||
|
- **Do not allow the use of lowercase letters in PIN.** Prevents an employee from using lowercase letters in a valid PIN.
|
||||||
|
|
||||||
|
- **Configure the use of special characters in the Windows Hello for Business PIN.** Lets you decide whether special characters can be used in a valid PIN. The options are:
|
||||||
|
|
||||||
|
- **Allow the use of special characters in PIN.** Lets an employee use special characters in a valid PIN.
|
||||||
|
|
||||||
|
- **Require the use of at least one special character in PIN.** Requires an employee to use at least 1 special character in a valid PIN.
|
||||||
|
|
||||||
|
- **Do not allow the use of special characters in PIN.** Prevents an employee from using special characters in a valid PIN.
|
||||||
|
|
||||||
|
- **Specify the period of time (in days) that a PIN can be used before the system requires the user to change it.** Enter a numerical value (0-730 days) for how many days can pass before a PIN must be changed. If you enter a value of 0, the PIN never expires.
|
||||||
|
|
||||||
|
- **Specify the number of past PINs that can be associated to a user account that can't be reused.** Enter a numerical value (0-50 days) for how many days can pass before an employee can reuse a previous PIN. If you enter a value of 0, a PINs can be reused immediately and past PINs aren't stored.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>PIN history is not preserved through a PIN reset.
|
||||||
|
|
||||||
|
- **Number of authentication failures allowed before the device will be wiped.** Enter a numerical value for how many times the PIN can be incorrectly entered before wiping the device of corporate data. If you enter a value of 0, the device is never wiped, regardless of the number of incorrect PIN entries.<p>This setting has different behavior for mobile devices and desktops.
|
||||||
|
|
||||||
|
- **On mobile devices.** When an employee reaches the value set here, the device is wiped of corporate data.
|
||||||
|
|
||||||
|
- **On desktop devices.** When an employee reaches the value set here, the desktop is put into BitLocker recovery mode, instead of being wiped. You must have BitLocker installed on the device or this setting is ignored.
|
||||||
|
|
||||||
|
- **Maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked.** Enter a numerical value for how many days can pass before a PIN must be changed. If you enter a value of 0, the device never becomes PIN or password locked while idle.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>You can set this value to be anything; however, it can't be longer than the time specified by the **Settings** app. If you exceed the maximum timeout value, this setting is ignored.
|
||||||
|
|
||||||
|
|
||||||
|
## Deploy your policy
|
||||||
|
After you’ve created your policy, you'll need to deploy it to your employees. MAM is deployed to users and not devices.
|
||||||
|
|
||||||
|
**To deploy your policy**
|
||||||
|
|
||||||
|
1. On the **Mobile apps - App protection policies** pane, click your newly-created policy, click **Assignments** from the menu that appears, and then click **Select groups**.
|
||||||
|
|
||||||
|
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane.
|
||||||
|
|
||||||
|
2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy.
|
||||||
|
|
||||||
|
The policy is deployed to the selected group.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [Implement server-side support for mobile application management on Windows](https://docs.microsoft.com/en-us/windows/client-management/mdm/implement-server-side-mobile-application-management)
|
||||||
|
|
||||||
|
- [Microsoft Intune - Mobile Application Management (MAM) standalone blog post](https://blogs.technet.microsoft.com/cbernier/2016/01/05/microsoft-intune-mobile-application-management-mam-standalone/)
|
||||||
|
|
||||||
|
- [MAM-supported apps](https://www.microsoft.com/en-us/cloud-platform/microsoft-intune-apps)
|
||||||
|
|
||||||
|
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
||||||
|
|
||||||
|
- [Deploy your Windows Information Protection (WIP) policy](deploy-wip-policy-using-intune.md)
|
||||||
|
|
||||||
|
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
@ -20,9 +20,6 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
System Center Configuration Manager helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection mode, and how to find enterprise data on the network.
|
System Center Configuration Manager helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection mode, and how to find enterprise data on the network.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>If you previously created a WIP policy using System Center Configuration Manager version 1511 or 1602, you’ll need to recreate it using version 1606 or later. Editing a WIP policy created in version 1511 or 1602 is not supported in later versions and there is no migration path between older and newer WIP policies.
|
|
||||||
|
|
||||||
## Add a WIP policy
|
## Add a WIP policy
|
||||||
After you’ve installed and set up System Center Configuration Manager for your organization, you must create a configuration item for WIP, which in turn becomes your WIP policy.
|
After you’ve installed and set up System Center Configuration Manager for your organization, you must create a configuration item for WIP, which in turn becomes your WIP policy.
|
||||||
|
|
||||||
@ -57,7 +54,7 @@ The **Create Configuration Item Wizard** starts.
|
|||||||
|
|
||||||
The **Configure Windows Information Protection settings** page appears, where you'll configure your policy for your organization.
|
The **Configure Windows Information Protection settings** page appears, where you'll configure your policy for your organization.
|
||||||
|
|
||||||
### Add app rules to your policy
|
## Add app rules to your policy
|
||||||
During the policy-creation process in System Center Configuration Manager, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
During the policy-creation process in System Center Configuration Manager, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps.
|
||||||
|
|
||||||
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
The steps to add your app rules are based on the type of rule template being applied. You can add a store app (also known as a Universal Windows Platform (UWP) app), a signed Windows desktop app, or an AppLocker policy file.
|
||||||
@ -65,7 +62,7 @@ The steps to add your app rules are based on the type of rule template being app
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
>Enlightened apps are expected to prevent enterprise data from going to unprotected network locations and to avoid encrypting personal data. On the other hand, WIP-unaware apps might not respect the corporate network boundary, and WIP-unaware apps will encrypt all files they create or modify. This means that they could encrypt personal data and cause data loss during the revocation process.<p>Care must be taken to get a support statement from the software provider that their app is safe with WIP before adding it to your **App rules** list. If you don’t get this statement, it’s possible that you could experience app compat issues due to an app losing the ability to access a necessary file after revocation.
|
||||||
|
|
||||||
#### Add a store app rule to your policy
|
### Add a store app rule to your policy
|
||||||
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
For this example, we’re going to add Microsoft OneNote, a store app, to the **App Rules** list.
|
||||||
|
|
||||||
**To add a store app**
|
**To add a store app**
|
||||||
@ -150,7 +147,7 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Add a desktop app rule to your policy
|
### Add a desktop app rule to your policy
|
||||||
For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
For this example, we’re going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
||||||
|
|
||||||
**To add a desktop app to your policy**
|
**To add a desktop app to your policy**
|
||||||
@ -223,7 +220,7 @@ Path Publisher
|
|||||||
```
|
```
|
||||||
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
Where the text, `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the publisher name to enter in the **Publisher Name** box.
|
||||||
|
|
||||||
#### Add an AppLocker policy file
|
### Add an AppLocker policy file
|
||||||
For this example, we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
For this example, we’re going to add an AppLocker XML file to the **App Rules** list. You’ll use this option if you want to add multiple apps at the same time. For more info about AppLocker, see the [AppLocker](https://technet.microsoft.com/itpro/windows/keep-secure/applocker-overview) content.
|
||||||
|
|
||||||
**To create an app rule and xml file using the AppLocker tool**
|
**To create an app rule and xml file using the AppLocker tool**
|
||||||
@ -314,7 +311,7 @@ For this example, we’re going to add an AppLocker XML file to the **App Rules*
|
|||||||
|
|
||||||
The file is imported and the apps are added to your **App Rules** list.
|
The file is imported and the apps are added to your **App Rules** list.
|
||||||
|
|
||||||
#### Exempt apps from WIP restrictions
|
### Exempt apps from WIP restrictions
|
||||||
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
If you're running into compatibility issues where your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||||
|
|
||||||
**To exempt a store app, a desktop app, or an AppLocker policy file app rule**
|
**To exempt a store app, a desktop app, or an AppLocker policy file app rule**
|
||||||
@ -339,7 +336,7 @@ If you're running into compatibility issues where your app is incompatible with
|
|||||||
|
|
||||||
5. Click **OK**.
|
5. Click **OK**.
|
||||||
|
|
||||||
### Manage the WIP-protection level for your enterprise data
|
## Manage the WIP-protection level for your enterprise data
|
||||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||||
|
|
||||||
We recommend that you start with **Silent** or **Override** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Override** or **Hide Overrides**.
|
We recommend that you start with **Silent** or **Override** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, either **Override** or **Hide Overrides**.
|
||||||
@ -356,7 +353,7 @@ We recommend that you start with **Silent** or **Override** while verifying with
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Define your enterprise-managed identity domains
|
## Define your enterprise-managed identity domains
|
||||||
Corporate identity, usually expressed as your primary internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
Corporate identity, usually expressed as your primary internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||||
|
|
||||||
You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (contoso.com|newcontoso.com). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
You can specify multiple domains owned by your enterprise by separating them with the "|" character. For example, (contoso.com|newcontoso.com). With multiple domains, the first one is designated as your corporate identity and all of the additional ones as being owned by the first one. We strongly recommend that you include all of your email address domains in this list.
|
||||||
@ -367,7 +364,7 @@ You can specify multiple domains owned by your enterprise by separating them wit
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
### Choose where apps can access enterprise data
|
## Choose where apps can access enterprise data
|
||||||
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
After you've added a protection mode to your apps, you'll need to decide where those apps can access enterprise data on your network.
|
||||||
|
|
||||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||||
@ -451,7 +448,7 @@ There are no default locations included with WIP, you must add each of your netw
|
|||||||
|
|
||||||
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
For more info about how to find and export your data recovery certificate, see the [Data Recovery and Encrypting File System (EFS)](https://go.microsoft.com/fwlink/p/?LinkId=761462) topic. For more info about creating and verifying your EFS DRA certificate, see the [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md).
|
||||||
|
|
||||||
### Choose your optional WIP-related settings
|
## Choose your optional WIP-related settings
|
||||||
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
After you've decided where your protected apps can access enterprise data on your network, you’ll be asked to decide if you want to add any optional WIP settings.
|
||||||
|
|
||||||

|

|
||||||
@ -488,7 +485,7 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
|
|
||||||
2. After you pick all of the settings you want to include, click **Summary**.
|
2. After you pick all of the settings you want to include, click **Summary**.
|
||||||
|
|
||||||
### Review your configuration choices in the Summary screen
|
## Review your configuration choices in the Summary screen
|
||||||
After you've finished configuring your policy, you can review all of your info on the **Summary** screen.
|
After you've finished configuring your policy, you can review all of your info on the **Summary** screen.
|
||||||
|
|
||||||
**To view the Summary screen**
|
**To view the Summary screen**
|
||||||
@ -516,6 +513,3 @@ After you’ve created your WIP policy, you'll need to deploy it to your organiz
|
|||||||
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
||||||
|
|
||||||
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|
After Width: | Height: | Size: 18 KiB |
Before Width: | Height: | Size: 33 KiB After Width: | Height: | Size: 10 KiB |
After Width: | Height: | Size: 37 KiB |
Before Width: | Height: | Size: 33 KiB After Width: | Height: | Size: 26 KiB |
Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 32 KiB |
Before Width: | Height: | Size: 7.3 KiB After Width: | Height: | Size: 3.2 KiB |
Before Width: | Height: | Size: 8.4 KiB After Width: | Height: | Size: 3.7 KiB |
Before Width: | Height: | Size: 43 KiB After Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 19 KiB After Width: | Height: | Size: 11 KiB |
Before Width: | Height: | Size: 28 KiB After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 68 KiB |
After Width: | Height: | Size: 104 KiB |
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 28 KiB |
Before Width: | Height: | Size: 26 KiB After Width: | Height: | Size: 28 KiB |
@ -0,0 +1,26 @@
|
|||||||
|
---
|
||||||
|
title: Create a Windows Information Protection (WIP) policy using System Center Configuration Manager (Windows 10)
|
||||||
|
description: System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: explore
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
author: eross-msft
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Create a Windows Information Protection (WIP) policy using System Center Configuration Manager
|
||||||
|
**Applies to:**
|
||||||
|
|
||||||
|
- Windows 10, version 1607 and later
|
||||||
|
- Windows 10 Mobile, version 1607 and later
|
||||||
|
|
||||||
|
System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
|
## In this section
|
||||||
|
|Topic |Description |
|
||||||
|
|------|------------|
|
||||||
|
|[Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) |System Center Configuration Manager helps you create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|
|[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. |
|
||||||
|
|[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). |
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Create a Windows Information Protection (WIP) policy (Windows 10)
|
title: Create a Windows Information Protection (WIP) policy using Microsoft Intune (Windows 10)
|
||||||
description: Microsoft Intune and System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
description: Microsoft Intune and System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
ms.assetid: d2059e74-94bd-4e54-ab59-1a7b9b52bdc6
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -10,22 +10,19 @@ author: eross-msft
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy
|
# Create a Windows Information Protection (WIP) policy using Microsoft Intune
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile, version 1607 and later
|
- Windows 10 Mobile, version 1607 and later
|
||||||
|
|
||||||
Microsoft Intune and System Center Configuration Manager helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
Microsoft Intune helps you create and deploy your enterprise data protection (WIP) policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|Topic |Description |
|
|Topic |Description |
|
||||||
|------|------------|
|
|------|------------|
|
||||||
|
|[Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy with MDM, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|
|[Create a Windows Information Protection (WIP) policy with MAM using the Azure portal for Microsoft Intune](create-wip-policy-using-mam-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create your WIP policy with MDM, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network.|
|
||||||
|[Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](create-wip-policy-using-intune.md) |Details about how to use the classic console for Microsoft Intune to create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
|[Create a Windows Information Protection (WIP) policy using the classic console for Microsoft Intune](create-wip-policy-using-intune.md) |Details about how to use the classic console for Microsoft Intune to create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
||||||
|[Create a Windows Information Protection (WIP) with enrollment policy using the Azure portal for Microsoft Intune](create-wip-policy-using-intune-azure.md)|Details about how to use the Azure portal for Microsoft Intune to create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
|
||||||
|[Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager](create-wip-policy-using-sccm.md) |System Center Configuration Manager helps you create and deploy your WIP policy, including letting you choose your protected apps, your WIP-protection level, and how to find enterprise data on the network. |
|
|
||||||
|[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. |
|
|[Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](create-and-verify-an-efs-dra-certificate.md) |Steps to create, verify, and perform a quick recovery using a Encrypting File System (EFS) Data Recovery Agent (DRA) certificate. |
|
||||||
|[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). |
|
|[Determine the Enterprise Context of an app running in Windows Information Protection (WIP)](wip-app-enterprise-context.md) |Use the Task Manager to determine whether an app is considered work, personal or exempt by Windows Information Protection (WIP). |
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Contributing to TechNet content](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
|