Merge pull request #6918 from MicrosoftDocs/repo_sync_working_branch
Resolve syncing conflicts from repo_sync_working_branch to public
@ -188,5 +188,4 @@
|
|||||||
### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md)
|
### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md)
|
||||||
|
|
||||||
## KB Troubleshoot
|
## KB Troubleshoot
|
||||||
### [Clear the Internet Explorer cache from a command line](kb-support/clear-ie-cache-from-command-line.md)
|
|
||||||
### [Internet Explorer and Microsoft Edge FAQ for IT Pros](kb-support/ie-edge-faqs.md)
|
### [Internet Explorer and Microsoft Edge FAQ for IT Pros](kb-support/ie-edge-faqs.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: IE and Microsoft Edge FAQ for IT Pros
|
title: IE and Microsoft Edge FAQ for IT Pros
|
||||||
description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals.
|
description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals.
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
manager: msmets
|
manager: msmets
|
||||||
author: ramakoni1
|
author: ramakoni1
|
||||||
|
@ -8,7 +8,7 @@ ms.prod: hololens
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 05/12/2020
|
ms.date: 06/9/2020
|
||||||
ms.custom:
|
ms.custom:
|
||||||
- CI 111456
|
- CI 111456
|
||||||
- CSSTroubleshooting
|
- CSSTroubleshooting
|
||||||
@ -20,6 +20,48 @@ appliesto:
|
|||||||
|
|
||||||
# HoloLens 2 release notes
|
# HoloLens 2 release notes
|
||||||
|
|
||||||
|
## Windows Holographic, version 2004 - June 2020 Update
|
||||||
|
- Build 19041.1106
|
||||||
|
|
||||||
|
Improvements and fixes in the update:
|
||||||
|
|
||||||
|
- Custom MRC recorders have new default values for certain properties if they aren't specified.
|
||||||
|
- On the MRC Video Effect:
|
||||||
|
- PreferredHologramPerspective (1 PhotoVideoCamera)
|
||||||
|
- GlobalOpacityCoefficient (0.9 (HoloLens) 1.0 (Immersive headset))
|
||||||
|
- On the MRC Audio Effect:
|
||||||
|
- LoopbackGain (the current "App Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal)
|
||||||
|
- MicrophoneGain (the current "Mic Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal)
|
||||||
|
- This update contains a bug fix that improves audio quality in Mixed Reality Capture scenarios. Specifically, it should eliminate any audio glitching in the recording when the Start Menu is displayed.
|
||||||
|
- Improved hologram stability in recorded videos.
|
||||||
|
- Resolves an issue where mixed reality capture couldn't record video after device is left in standby state for multiple days.
|
||||||
|
- The HolographicSpace.UserPresence API is generally disabled for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. The API is now enabled for Unity versions 2018.4.18 and higher, and 2019.3.4 and higher.
|
||||||
|
- When accessing Device Portal over a WiFi connection, a web browser might prevent access to due to an invalid certificate, reporting an error such as "ERR_SSL_PROTOCOL_ERROR," even if the device certificate has previously been trusted. In this case, you would be unable to progress to Device Portal as options to ignore security warnings are not available. This update resolves the issue. If the device certificate was previously downloaded and trusted on a PC to remove browser security warnings and the SSL error has been encountered, the new certificate will need to be downloaded and trusted to address browser security warnings.
|
||||||
|
- Enabled ability to create a runtime provisioning package which can install an app using MSIX packages.
|
||||||
|
- New setting that users can find under Settings > System > Holograms, that allows users to automatically remove all holograms from the mixed reality home when the device shuts down.
|
||||||
|
- Fixed an issue that caused HoloLens apps that change their pixel format to render black in the HoloLens emulator.
|
||||||
|
- Fixed bug that caused a crash during Iris Login.
|
||||||
|
- Fixes an issue around repeated store downloads for already current apps.
|
||||||
|
- Fixed a bug to preventing immersive apps from launching Edge multiple times.
|
||||||
|
- Fixes an issue around launches of the Photos app in initial boots after updating from the 1903 release.
|
||||||
|
- Improved performance and reliability.
|
||||||
|
|
||||||
|
## Windows Holographic, version 1903 - June 2020 Update
|
||||||
|
- Build 18362.1064
|
||||||
|
|
||||||
|
Improvements and fixes in the update:
|
||||||
|
|
||||||
|
- Custom MRC recorders have new default values for certain properties if they aren't specified.
|
||||||
|
- On the MRC Video Effect:
|
||||||
|
- PreferredHologramPerspective (1 PhotoVideoCamera)
|
||||||
|
- GlobalOpacityCoefficient (0.9 (HoloLens) 1.0 (Immersive headset))
|
||||||
|
- On the MRC Audio Effect:
|
||||||
|
- LoopbackGain (the current "App Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal)
|
||||||
|
- MicrophoneGain (the current "Mic Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal)
|
||||||
|
- The HolographicSpace.UserPresence API is generally disabled for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. The API is now enabled for Unity versions 2018.4.18 and higher, and 2019.3.4 and higher.
|
||||||
|
- Fixed an issue that caused HoloLens apps that change their pixel format to render black in the HoloLens emulator.
|
||||||
|
- Fixes an issue around launches of the Photos app in initial boots after updating from the 1903 release.
|
||||||
|
|
||||||
## Windows Holographic, version 2004
|
## Windows Holographic, version 2004
|
||||||
Build - 19041.1103
|
Build - 19041.1103
|
||||||
|
|
||||||
@ -32,7 +74,7 @@ We are excited to announce our May 2020 major software update for HoloLens 2, **
|
|||||||
| Improved provisioning | Seamlessly apply a provisioning package from a USB drive to your HoloLens |
|
| Improved provisioning | Seamlessly apply a provisioning package from a USB drive to your HoloLens |
|
||||||
| Application install status | Check install status for apps have been pushed to HoloLens 2 via MDM, in the Settings app |
|
| Application install status | Check install status for apps have been pushed to HoloLens 2 via MDM, in the Settings app |
|
||||||
| Configuration Service Providers (CSPs) | Added new Configuration Service Providers (CSPs) enhancing admin control capabilities. |
|
| Configuration Service Providers (CSPs) | Added new Configuration Service Providers (CSPs) enhancing admin control capabilities. |
|
||||||
| USB 5G/LTE support | Expanded USB Ethernet capability enables support for 5G/LTE dongles |
|
| USB 5G/LTE support | Expanded USB Ethernet capability enables support for 5G/LTE |
|
||||||
| Dark App Mode | Dark App Mode for apps that support both dark and light modes, improving the viewing experience |
|
| Dark App Mode | Dark App Mode for apps that support both dark and light modes, improving the viewing experience |
|
||||||
| Voice Commands | Support for additional system voice commands to control HoloLens, hands-free |
|
| Voice Commands | Support for additional system voice commands to control HoloLens, hands-free |
|
||||||
| Hand Tracking improvements | Hand Tracking improvements make buttons and 2D slate interactions more accurate |
|
| Hand Tracking improvements | Hand Tracking improvements make buttons and 2D slate interactions more accurate |
|
||||||
|
@ -51,14 +51,15 @@
|
|||||||
### [Surface Brightness Control](microsoft-surface-brightness-control.md)
|
### [Surface Brightness Control](microsoft-surface-brightness-control.md)
|
||||||
### [Surface Asset Tag](assettag.md)
|
### [Surface Asset Tag](assettag.md)
|
||||||
|
|
||||||
|
|
||||||
## Secure
|
## Secure
|
||||||
|
|
||||||
### [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md)
|
### [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md)
|
||||||
### [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
|
### [Manage Surface UEFI settings](manage-surface-uefi-settings.md)
|
||||||
### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
|
### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md)
|
||||||
### [Surface Enterprise Management Mode](surface-enterprise-management-mode.md)
|
### [Surface Enterprise Management Mode](surface-enterprise-management-mode.md)
|
||||||
### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
|
### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md)
|
||||||
### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
|
### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md)
|
||||||
|
### [Secure Surface Dock 2 ports with SEMM](secure-surface-dock-ports-semm.md)
|
||||||
### [Use Microsoft Endpoint Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md)
|
### [Use Microsoft Endpoint Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md)
|
||||||
### [Surface Data Eraser](microsoft-surface-data-eraser.md)
|
### [Surface Data Eraser](microsoft-surface-data-eraser.md)
|
||||||
|
|
||||||
|
BIN
devices/surface/images/secure-surface-dock-ports-semm-1.png
Normal file
After Width: | Height: | Size: 94 KiB |
BIN
devices/surface/images/secure-surface-dock-ports-semm-2.png
Normal file
After Width: | Height: | Size: 33 KiB |
BIN
devices/surface/images/secure-surface-dock-ports-semm-3.png
Normal file
After Width: | Height: | Size: 94 KiB |
BIN
devices/surface/images/secure-surface-dock-ports-semm-4.png
Normal file
After Width: | Height: | Size: 67 KiB |
BIN
devices/surface/images/secure-surface-dock-ports-semm-5.png
Normal file
After Width: | Height: | Size: 43 KiB |
BIN
devices/surface/images/secure-surface-dock-ports-semm-6.png
Normal file
After Width: | Height: | Size: 72 KiB |
166
devices/surface/secure-surface-dock-ports-semm.md
Normal file
@ -0,0 +1,166 @@
|
|||||||
|
---
|
||||||
|
title: Secure Surface Dock 2 ports with Surface Enterprise Management Mode (SEMM)
|
||||||
|
description: This document provides guidance for configuring UEFI port settings for Surface Dock 2 when connected to compatible Surface devices including Surface Book 3, Surface Laptop 3, and Surface Pro 7.
|
||||||
|
ms.assetid: 2808a8be-e2d4-4cb6-bd53-9d10c0d3e1d6
|
||||||
|
ms.reviewer:
|
||||||
|
manager: laurawi
|
||||||
|
keywords: Troubleshoot common problems, setup issues
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: support
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: surfacehub
|
||||||
|
author: v-miegge
|
||||||
|
ms.author: jesko
|
||||||
|
ms.topic: article
|
||||||
|
ms.date: 06/08/2020
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.audience: itpro
|
||||||
|
---
|
||||||
|
|
||||||
|
# Secure Surface Dock 2 ports with Surface Enterprise Management Mode (SEMM)
|
||||||
|
|
||||||
|
## Introduction
|
||||||
|
|
||||||
|
Surface Enterprise Management Mode (SEMM) enables IT admins to secure and manage Surface Dock 2 ports by configuring UEFI settings in a Windows installer configuration package (.MSI file) deployed to compatible Surface devices across a corporate environment.
|
||||||
|
|
||||||
|
### Supported devices
|
||||||
|
|
||||||
|
Managing Surface Dock 2 with SEMM is available for docks connected to Surface Book 3, Surface Laptop 3, and Surface Pro 7. These compatible Surface devices are commonly referred to as **host devices**. A package is applied to host devices based on if a host device is **authenticated** or **unauthenticated**. Configured settings reside in the UEFI layer on host devices enabling you — the IT admin — to manage Surface Dock 2 just like any other built-in peripheral such as the camera.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>You can manage Surface Dock 2 ports only when the dock is connected to one of the following compatible devices: Surface Book 3, Surface Laptop 3, and Surface Pro 7. Any device that doesn't receive the UEFI Authenticated policy settings is inherently an unauthenticated device.
|
||||||
|
|
||||||
|
Restricting Surface Dock 2 to authorized persons signed into a corporate host device provides another layer of data protection. This ability to lock down Surface Dock 2 is critical for specific customers in highly secure environments who want the functionality and productivity benefits of the dock while maintaining compliance with strict security protocols. We anticipate SEMM used with Surface Dock 2 will be particularly useful in open offices and shared spaces especially for customers who want to lock USB ports for security reasons.
|
||||||
|
|
||||||
|
## Configuring and deploying UEFI settings for Surface Dock 2
|
||||||
|
|
||||||
|
This section provides step-by-step guidance for the following tasks:
|
||||||
|
|
||||||
|
1. Install **Surface UEFI Configurator**.
|
||||||
|
1. Create or obtain public key certificates.
|
||||||
|
1. Create an .MSI configuration package.
|
||||||
|
1. Add your certificates.
|
||||||
|
1. Enter the 16-digit RN number for your Surface Dock 2 devices.
|
||||||
|
1. Configure UEFI settings.
|
||||||
|
1. Build and apply the configuration package to targeted Surface devices (Surface Book 3, Surface Laptop 3, or Surface Pro 7.)
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The **Random Number (RN)** is a unique 16-digit hex code identifier which is provisioned at the factory, and printed in small type on the underside of the dock. The RN differs from most serial numbers in that it can't be read electronically. This ensures proof of ownership is primarily established only by reading the RN when physically accessing the device. The RN may also be obtained during the purchase transaction and is recorded in Microsoft inventory systems.
|
||||||
|
|
||||||
|
### Install SEMM and Surface UEFI Configurator
|
||||||
|
|
||||||
|
Install SEMM by running **SurfaceUEFI_Configurator_v2.71.139.0.msi**. This is a standalone installer and contains everything you need to create and distribute configuration packages for Surface Dock 2.
|
||||||
|
|
||||||
|
- Download **Surface UEFI Configurator** from [Surface Tools for IT](https://www.microsoft.com/en-us/download/details.aspx?id=46703).
|
||||||
|
|
||||||
|
## Create public key certificates
|
||||||
|
|
||||||
|
This section provides specifications for creating the certificates needed to manage ports for Surface Dock 2.
|
||||||
|
|
||||||
|
### Prerequisites
|
||||||
|
|
||||||
|
This article assumes that you either obtain certificates from a third-party provider or you already have expertise in PKI certificate services and know how to create your own. You should be familiar with and follow the general recommendations for creating certificates as described in [Surface Enterprise Management Mode (SEMM)](https://docs.microsoft.com/surface/surface-enterprise-management-mode) documentation, with one exception. The certificates documented on this page require expiration terms of 30 years for the **Dock Certificate Authority**, and 20 years for the **Host Authentication Certificate**.
|
||||||
|
|
||||||
|
For more information, see [Certificate Services Architecture](https://docs.microsoft.com/windows/win32/seccrypto/certificate-services-architecture) documentation and review the appropriate chapters in [Windows Server 2019 Inside Out](https://www.microsoftpressstore.com/store/windows-server-2019-inside-out-9780135492277), or [Windows Server 2008 PKI and Certificate Security](https://www.microsoftpressstore.com/store/windows-server-2008-pki-and-certificate-security-9780735640788) available from Microsoft Press.
|
||||||
|
|
||||||
|
### Root and host certificate requirements
|
||||||
|
|
||||||
|
Prior to creating the configuration package, you need to prepare public key certificates that authenticate ownership of Surface Dock 2 and facilitate any subsequent changes in ownership during the device lifecycle. The host and provisioning certificates require entering EKU IDs otherwise known as **Client Authentication Enhanced Key Usage (EKU) object identifiers (OIDs)**.
|
||||||
|
|
||||||
|
The required EKU values are listed in Table 1 and Table 2.
|
||||||
|
|
||||||
|
#### Table 1. Root and Dock Certificate requirements
|
||||||
|
|
||||||
|
|Certificate|Algorithm|Description|Expiration|EKU OID|
|
||||||
|
|---|---|---|---|---|
|
||||||
|
|Root Certificate Authority|ECDSA_P384|- Root certificate with 384-bit prime elliptic curve digital signature algorithm (ECDSA)<br>- SHA 256 Key Usage:<br>CERT_DIGITAL_SIGNATURE_KEY_USAGE<br>- CERT_KEY_CERT_SIGN_KEY_USAGE<br>CERT_CRL_SIGN_KEY_USAGE|30 years|N/A
|
||||||
|
|Dock Certificate Authority|ECC P256 curve|- Host certificate with 256-bit elliptic-curve cryptography (ECC)<br>- SHA 256 Key Usage:<br>CERT_KEY_CERT_SIGN_KEY_USAGE<br>- Path Length Constraint = 0|20 years|1.3.6.1.4.1.311.76.9.21.2<br>1.3.6.1.4.1.311.76.9.21.3|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The dock CA must be exported as a .p7b file.
|
||||||
|
|
||||||
|
### Provisioning Administration Certificate requirements
|
||||||
|
|
||||||
|
Each host device must have the doc CA and two certificates as shown in Table 2.
|
||||||
|
|
||||||
|
#### Table 2. Provisioning administration certificate requirements
|
||||||
|
|
||||||
|
|Certificate|Algorithm|Description|EKU OID|
|
||||||
|
|---|---|---|---|
|
||||||
|
|Host authentication certificate|ECC P256<br>SHA 256|Proves the identity of the host device.|1.3.6.1.4.1.311.76.9.21.2|
|
||||||
|
|Provisioning administration certificate|ECC P256<br>SHA256|Enables you to change dock ownership and/or policy settings by allowing you to replace the CA that's currently installed on the dock.|1.3.6.1.4.1.311.76.9.21.3<br>1.3.6.1.4.1.311.76.9.21.4|
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The host authentication and provisioning certificates must be exported as.pfx files.
|
||||||
|
|
||||||
|
### Create configuration package
|
||||||
|
|
||||||
|
When you have obtained or created the certificates, you’re ready to build the MSI configuration package that will be applied to target Surface devices.
|
||||||
|
|
||||||
|
1. Run Surface **UEFI Configurator**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Select **Surface Dock**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. On the certificate page, enter the appropriate **certificates**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Add appropriate dock RNs to the list.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>When creating a configuration package for multiple Surface Dock 2 devices, instead of entering each RN manually, you can use a .csv file that contains a list of RNs.
|
||||||
|
|
||||||
|
1. Specify your policy settings for USB data, Ethernet, and Audio ports. UEFI Configurator lets you configure policy settings for authenticated users (Authenticated Policy) and unauthenticated users (Unauthenticated Policy). The following figure shows port access turned on for authenticated users and turned off for unauthenticated users.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
- Authenticated user refers to a Surface Device that has the appropriate certificates installed, as configured in the .MSI configuration package that you applied to target devices. It applies to any user authenticated user who signs into the device.
|
||||||
|
- Unauthenticated user refers to any other device.
|
||||||
|
- Select **Reset** to create a special “Reset” package that will remove any previous configuration package that the dock had accepted.
|
||||||
|
|
||||||
|
1. Select **Build** to create the package as specified.
|
||||||
|
|
||||||
|
### Apply the configuration package to a Surface Dock 2
|
||||||
|
|
||||||
|
1. Take the MSI file that the Surface UEFI Configurator generated and install it on a Surface host device. Compatible host devices are Surface Book 3, Surface Laptop 3, or Surface Pro 7.
|
||||||
|
1. Connect the host device to the Surface Dock 2. When you connect the dock UEFI policy settings are applied.
|
||||||
|
|
||||||
|
## Verify managed state using the Surface App
|
||||||
|
|
||||||
|
Once you have applied the configuration package, you can quickly verify the resultant policy state of the dock directly from the Surface App, installed by default on all Surface devices. If Surface App isn't present on the device, you can download and install it from the Microsoft Store.
|
||||||
|
|
||||||
|
### Test scenario
|
||||||
|
|
||||||
|
Objective: Configure policy settings to allow port access by authenticated users only.
|
||||||
|
|
||||||
|
1. Turn on all ports for authenticated users and turn them off for unauthenticated users.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Apply the configuration package to your target device and then connect Surface Dock 2.
|
||||||
|
|
||||||
|
1. Open **Surface App** and select **Surface Dock** to view the resultant policy state of your Surface Dock. If the policy settings are applied, Surface App will indicate that ports are available.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
1. Now you need to verify that the policy settings have successfully turned off all ports for unauthenticated users. Connect Surface Dock 2 to an unmanaged device, i.e., any Surface device outside the scope of management for the configuration package you created.
|
||||||
|
|
||||||
|
1. Open **Surface App** and select **Surface Dock**. The resultant policy state will indicate ports are turned off.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you want to keep ownership of the device, but allow all users full access, you can make a new package with everything turned on. If you wish to completely remove the restrictions and ownership of the device (make it unmanaged), select **Reset** in Surface UEFI Configurator to create a package to apply to target devices.
|
||||||
|
|
||||||
|
Congratulations. You have successfully managed Surface Dock 2 ports on targeted host devices.
|
||||||
|
|
||||||
|
## Learn more
|
||||||
|
|
||||||
|
- [Surface Enterprise Management Mode (SEMM) documentation](https://docs.microsoft.com/surface/surface-enterprise-management-mode)
|
||||||
|
- [Certificate Services Architecture](https://docs.microsoft.com/windows/win32/seccrypto/certificate-services-architecture)
|
||||||
|
- [Windows Server 2019 Inside Out](https://www.microsoftpressstore.com/store/windows-server-2019-inside-out-9780135492277)
|
||||||
|
- [Windows Server 2008 PKI and Certificate Security](https://www.microsoftpressstore.com/store/windows-server-2008-pki-and-certificate-security-9780735640788)
|
@ -40,48 +40,16 @@ The App-V 5.1 Server does not support the following scenarios:
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for the App-V 5.1 Management server installation.
|
The following table lists the operating systems that are supported for the App-V 5.1 Management server installation.
|
||||||
|
|
||||||
**Note**
|
> [!NOTE]
|
||||||
Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information.
|
> Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
<table>
|
|
||||||
<colgroup>
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
<col width="33%" />
|
|
||||||
</colgroup>
|
|
||||||
<thead>
|
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Operating system</th>
|
|
||||||
<th align="left">Service Pack</th>
|
|
||||||
<th align="left">System architecture</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2016</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012 R2</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2008 R2</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
| Operating System | Service Pack | System Architecture |
|
||||||
|
|----------------------------------|--------------|---------------------|
|
||||||
|
| Microsoft Windows Server 2019 | | 64-bit |
|
||||||
|
| Microsoft Windows Server 2016 | | 64-bit |
|
||||||
|
| Microsoft Windows Server 2012 R2 | | 64-bit |
|
||||||
|
| Microsoft Windows Server 2012 | | 64-bit |
|
||||||
|
| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates)| SP1 | 64-bit |
|
||||||
|
|
||||||
|
|
||||||
**Important**
|
**Important**
|
||||||
@ -155,44 +123,13 @@ For more information on user configuration files with SQL server 2016 or later,
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for the App-V 5.1 Publishing server installation.
|
The following table lists the operating systems that are supported for the App-V 5.1 Publishing server installation.
|
||||||
|
|
||||||
<table>
|
| Operating System | Service Pack | System Architecture |
|
||||||
<colgroup>
|
|----------------------------------|--------------|---------------------|
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2019 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2016 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2012 R2 | | 64-bit |
|
||||||
</colgroup>
|
| Microsoft Windows Server 2012 | | 64-bit |
|
||||||
<thead>
|
| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit |
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Operating system</th>
|
|
||||||
<th align="left">Service Pack</th>
|
|
||||||
<th align="left">System architecture</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2016</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012 R2</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2008 R2</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="publishing-server-hardware-requirements-"></a>Publishing server hardware requirements
|
### <a href="" id="publishing-server-hardware-requirements-"></a>Publishing server hardware requirements
|
||||||
|
|
||||||
@ -208,44 +145,13 @@ App-V adds no additional requirements beyond those of Windows Server.
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for the App-V 5.1 Reporting server installation.
|
The following table lists the operating systems that are supported for the App-V 5.1 Reporting server installation.
|
||||||
|
|
||||||
<table>
|
| Operating System | Service Pack | System Architecture |
|
||||||
<colgroup>
|
|----------------------------------|--------------|---------------------|
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2019 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2016 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2012 R2 | | 64-bit |
|
||||||
</colgroup>
|
| Microsoft Windows Server 2012 | | 64-bit |
|
||||||
<thead>
|
| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit |
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Operating system</th>
|
|
||||||
<th align="left">Service Pack</th>
|
|
||||||
<th align="left">System architecture</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2016</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012 R2</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2008 R2</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="reporting-server-hardware-requirements-"></a>Reporting server hardware requirements
|
### <a href="" id="reporting-server-hardware-requirements-"></a>Reporting server hardware requirements
|
||||||
|
|
||||||
@ -309,7 +215,8 @@ The following table lists the SQL Server versions that are supported for the App
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for the App-V 5.1 client installation.
|
The following table lists the operating systems that are supported for the App-V 5.1 client installation.
|
||||||
|
|
||||||
**Note:** With the Windows 10 Anniversary release (aka 1607 version), the App-V client is in-box and will block installation of any previous version of the App-V client
|
> [!NOTE]
|
||||||
|
> With the Windows 10 Anniversary release (aka 1607 version), the App-V client is in-box and will block installation of any previous version of the App-V client
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
@ -368,44 +275,13 @@ The following list displays the supported hardware configuration for the App-V 5
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for App-V 5.1 Remote Desktop Services (RDS) client installation.
|
The following table lists the operating systems that are supported for App-V 5.1 Remote Desktop Services (RDS) client installation.
|
||||||
|
|
||||||
<table>
|
| Operating System | Service Pack | System Architecture |
|
||||||
<colgroup>
|
|----------------------------------|--------------|---------------------|
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2019 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2016 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2012 R2 | | 64-bit |
|
||||||
</colgroup>
|
| Microsoft Windows Server 2012 | | 64-bit |
|
||||||
<thead>
|
| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit |
|
||||||
<tr class="header">
|
|
||||||
<th align="left">Operating system</th>
|
|
||||||
<th align="left">Service Pack</th>
|
|
||||||
<th align="left">System architecture</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2016</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012 R2</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2008 R2</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Remote Desktop Services client hardware requirements
|
### Remote Desktop Services client hardware requirements
|
||||||
|
|
||||||
@ -421,59 +297,16 @@ App-V adds no additional requirements beyond those of Windows Server.
|
|||||||
|
|
||||||
The following table lists the operating systems that are supported for the App-V 5.1 Sequencer installation.
|
The following table lists the operating systems that are supported for the App-V 5.1 Sequencer installation.
|
||||||
|
|
||||||
<table>
|
| Operating System | Service Pack | System Architecture |
|
||||||
<colgroup>
|
|----------------------------------|--------------|---------------------|
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2019 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2016 | | 64-bit |
|
||||||
<col width="33%" />
|
| Microsoft Windows Server 2012 R2 | | 64-bit |
|
||||||
</colgroup>
|
| Microsoft Windows Server 2012 | | 64-bit |
|
||||||
<thead>
|
| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit |
|
||||||
<tr class="header">
|
| Microsoft Windows 10 | | 32-bit and 64-bit |
|
||||||
<th align="left">Operating system</th>
|
| Microsoft Windows 8.1 | | 32-bit and 64-bit |
|
||||||
<th align="left">Service pack</th>
|
| Microsoft Windows 7 | SP1 | 32-bit and 64-bit |
|
||||||
<th align="left">System architecture</th>
|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2016</p></td>
|
|
||||||
<td align="left"></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012 R2</p></td>
|
|
||||||
<td align="left"></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2012</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows Server 2008 R2</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows 10</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>32-bit and 64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Microsoft Windows 8.1</p></td>
|
|
||||||
<td align="left"><p></p></td>
|
|
||||||
<td align="left"><p>32-bit and 64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Microsoft Windows 7</p></td>
|
|
||||||
<td align="left"><p>SP1</p></td>
|
|
||||||
<td align="left"><p>32-bit and 64-bit</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Sequencer hardware requirements
|
### Sequencer hardware requirements
|
||||||
|
|
||||||
@ -491,7 +324,8 @@ The App-V client supports the following versions of System Center Configuration
|
|||||||
|
|
||||||
The following App-V and System Center Configuration Manager version matrix shows all officially supported combinations of App-V and Configuration Manager.
|
The following App-V and System Center Configuration Manager version matrix shows all officially supported combinations of App-V and Configuration Manager.
|
||||||
|
|
||||||
**Note:** Both App-V 4.5 and 4.6 have exited Mainstream support.
|
> [!NOTE]
|
||||||
|
> Both App-V 4.5 and 4.6 have exited Mainstream support.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
|
@ -104,17 +104,7 @@ Similarly, the App-V Remote Desktop Services (RDS) client is included with Windo
|
|||||||
|
|
||||||
## Sequencer system requirements
|
## Sequencer system requirements
|
||||||
|
|
||||||
The following table lists the operating systems that the App-V Sequencer installation supports.
|
Sequencer is now part of the Windows Assessment and Deployment Kit (Windows ADK). [Download the latest Windows ADK](https://docs.microsoft.com/windows-hardware/get-started/adk-install) that is recommended for your version of the Windows OS.
|
||||||
|
|
||||||
|Operating system|Service pack|System architecture|
|
|
||||||
|---|---|---|
|
|
||||||
|Microsoft Windows Server 2012 R2||64-bit|
|
|
||||||
|Microsoft Windows Server 2012||64-bit|
|
|
||||||
|Microsoft Windows Server 2008 R2|SP1|64-bit|
|
|
||||||
|Microsoft Windows 10||32-bit and 64-bit|
|
|
||||||
|Microsoft Windows 8.1||32-bit and 64-bit|
|
|
||||||
|Microsoft Windows 8||32-bit and 64-bit|
|
|
||||||
|Microsoft Windows 7|SP1|32-bit and 64-bit|
|
|
||||||
|
|
||||||
### Sequencer hardware requirements
|
### Sequencer hardware requirements
|
||||||
|
|
||||||
|
@ -930,12 +930,35 @@ The following list shows the supported values:
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged on user is non-admin/standard user Azure AD account.
|
Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged on user is non-admin/standard user Azure AD account.
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> This policy is only supported in Azure AD accounts.
|
> This policy is only supported in Azure AD accounts.
|
||||||
|
|
||||||
"AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, silent encryption is enforced.
|
"AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, silent encryption is enforced.
|
||||||
|
|
||||||
If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user is the current logged on user in the system.
|
If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user is the current logged on user in the system.
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Home</th>
|
||||||
|
<th>Pro</th>
|
||||||
|
<th>Business</th>
|
||||||
|
<th>Enterprise</th>
|
||||||
|
<th>Education</th>
|
||||||
|
<th>Mobile</th>
|
||||||
|
<th>Mobile Enterprise</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
The expected values for this policy are:
|
The expected values for this policy are:
|
||||||
|
|
||||||
|
@ -59,6 +59,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
||||||
|
|
||||||
- **Change history in MDM documentation**
|
- **Change history in MDM documentation**
|
||||||
|
- [June 2020](#june-2020)
|
||||||
- [May 2020](#may-2020)
|
- [May 2020](#may-2020)
|
||||||
- [February 2020](#february-2020)
|
- [February 2020](#february-2020)
|
||||||
- [January 2020](#january-2020)
|
- [January 2020](#january-2020)
|
||||||
@ -1980,6 +1981,11 @@ What data is handled by dmwappushsvc? | It is a component handling the internal
|
|||||||
How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. |
|
How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. |
|
||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
### June 2020
|
||||||
|
|New or updated topic | Description|
|
||||||
|
|--- | ---|
|
||||||
|
|[BitLocker CSP](bitlocker-csp.md)|Added SKU support table for **AllowStandardUserEncryption**.|
|
||||||
|
|[Policy CSP - NetworkIsolation](policy-csp-networkisolation.md)|Updated the description from Boolean to Integer for the following policy settings:<br>EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative.|
|
||||||
|
|
||||||
### May 2020
|
### May 2020
|
||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
|
@ -228,7 +228,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets.
|
Integer value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
@ -468,7 +468,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies.
|
Integer value that tells the client to accept the configured list of proxies and not try to detect other work proxies.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
|
@ -44,7 +44,11 @@
|
|||||||
- name: Define your servicing strategy
|
- name: Define your servicing strategy
|
||||||
href: update/waas-servicing-strategy-windows-10-updates.md
|
href: update/waas-servicing-strategy-windows-10-updates.md
|
||||||
- name: Best practices for feature updates on mission-critical devices
|
- name: Best practices for feature updates on mission-critical devices
|
||||||
href: update/feature-update-mission-critical.md
|
href: update/feature-update-mission-critical.md
|
||||||
|
- name: Windows 10 deployment considerations
|
||||||
|
href: planning/windows-10-deployment-considerations.md
|
||||||
|
- name: Windows 10 infrastructure requirements
|
||||||
|
href: planning/windows-10-infrastructure-requirements.md
|
||||||
- name: Plan for volume activation
|
- name: Plan for volume activation
|
||||||
href: volume-activation/plan-for-volume-activation-client.md
|
href: volume-activation/plan-for-volume-activation-client.md
|
||||||
- name: Features removed or planned for replacement
|
- name: Features removed or planned for replacement
|
||||||
@ -126,7 +130,7 @@
|
|||||||
- name: Deploy updates with Configuration Manager
|
- name: Deploy updates with Configuration Manager
|
||||||
href: update/deploy-updates-configmgr.md
|
href: update/deploy-updates-configmgr.md
|
||||||
- name: Deploy updates with Intune
|
- name: Deploy updates with Intune
|
||||||
href: update/waas-wufb-csp-mdm.md
|
href: update/deploy-updates-intune.md
|
||||||
- name: Deploy updates with WSUS
|
- name: Deploy updates with WSUS
|
||||||
href: update/waas-manage-updates-wsus.md
|
href: update/waas-manage-updates-wsus.md
|
||||||
- name: Deploy updates with Group Policy
|
- name: Deploy updates with Group Policy
|
||||||
@ -238,13 +242,13 @@
|
|||||||
href: update/windows-update-overview.md
|
href: update/windows-update-overview.md
|
||||||
- name: Servicing stack updates
|
- name: Servicing stack updates
|
||||||
href: update/servicing-stack-updates.md
|
href: update/servicing-stack-updates.md
|
||||||
- name: How Windows Update works
|
|
||||||
href: update/how-windows-update-works.md
|
|
||||||
- name: Additional Windows Update settings
|
- name: Additional Windows Update settings
|
||||||
href: update/waas-wu-settings.md
|
href: update/waas-wu-settings.md
|
||||||
- name: Delivery Optimization reference
|
- name: Delivery Optimization reference
|
||||||
href: update/waas-delivery-optimization-reference.md
|
href: update/waas-delivery-optimization-reference.md
|
||||||
- name: Windows 10 in S mode
|
- name: Windows 10 in S mode
|
||||||
|
href: s-mode.md
|
||||||
|
- name: Switch to Windows 10 Pro or Enterprise from S mode
|
||||||
href: windows-10-pro-in-s-mode.md
|
href: windows-10-pro-in-s-mode.md
|
||||||
- name: Windows 10 deployment tools
|
- name: Windows 10 deployment tools
|
||||||
items:
|
items:
|
||||||
|
@ -13,7 +13,7 @@ metadata:
|
|||||||
ms.collection: windows-10
|
ms.collection: windows-10
|
||||||
author: greg-lindsay #Required; your GitHub user alias, with correct capitalization.
|
author: greg-lindsay #Required; your GitHub user alias, with correct capitalization.
|
||||||
ms.author: greglin #Required; microsoft alias of author; optional team alias.
|
ms.author: greglin #Required; microsoft alias of author; optional team alias.
|
||||||
ms.date: 05/27/2020 #Required; mm/dd/yyyy format.
|
ms.date: 06/09/2020 #Required; mm/dd/yyyy format.
|
||||||
localization_priority: medium
|
localization_priority: medium
|
||||||
|
|
||||||
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
|
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new
|
||||||
@ -22,29 +22,35 @@ landingContent:
|
|||||||
# Cards and links should be based on top customer tasks or top subjects
|
# Cards and links should be based on top customer tasks or top subjects
|
||||||
# Start card title with a verb
|
# Start card title with a verb
|
||||||
# Card (optional)
|
# Card (optional)
|
||||||
- title: Overview
|
- title: Deploy Windows 10
|
||||||
linkLists:
|
linkLists:
|
||||||
- linkListType: overview
|
- linkListType: overview
|
||||||
links:
|
links:
|
||||||
- text: Windows 10 deployment scenarios
|
- text: Windows 10 deployment scenarios
|
||||||
url: windows-10-deployment-scenarios.md
|
url: windows-10-deployment-scenarios.md
|
||||||
- text: What is Windows as a service?
|
|
||||||
url: update/waas-overview.md
|
|
||||||
- text: Types of Windows updates
|
|
||||||
url: update/waas-quick-start.md#definitions
|
|
||||||
|
|
||||||
# Card (optional)
|
|
||||||
- title: Get started
|
|
||||||
linkLists:
|
|
||||||
- linkListType: get-started
|
- linkListType: get-started
|
||||||
links:
|
links:
|
||||||
- text: Demonstrate Autopilot deployment
|
- text: Demonstrate Autopilot deployment
|
||||||
url: windows-autopilot/demonstrate-deployment-on-vm.md
|
url: windows-autopilot/demonstrate-deployment-on-vm.md
|
||||||
- text: Servicing the Windows 10 operating system
|
|
||||||
url: update/waas-servicing-strategy-windows-10-updates.md
|
|
||||||
- text: Deploy Windows 10 in a test lab
|
- text: Deploy Windows 10 in a test lab
|
||||||
url: windows-10-poc.md
|
url: windows-10-poc.md
|
||||||
|
|
||||||
|
# Card (optional)
|
||||||
|
- title: Update Windows 10
|
||||||
|
linkLists:
|
||||||
|
- linkListType: overview
|
||||||
|
links:
|
||||||
|
- text: What is Windows as a service?
|
||||||
|
url: update/waas-overview.md
|
||||||
|
- text: Types of Windows updates
|
||||||
|
url: update/waas-quick-start.md#definitions
|
||||||
|
- linkListType: get-started
|
||||||
|
links:
|
||||||
|
- text: Servicing the Windows 10 operating system
|
||||||
|
url: update/waas-servicing-strategy-windows-10-updates.md
|
||||||
|
|
||||||
|
|
||||||
# Card (optional)
|
# Card (optional)
|
||||||
- title: Deployment planning
|
- title: Deployment planning
|
||||||
linkLists:
|
linkLists:
|
||||||
@ -52,8 +58,12 @@ landingContent:
|
|||||||
links:
|
links:
|
||||||
- text: Create a deployment plan
|
- text: Create a deployment plan
|
||||||
url: update/create-deployment-plan.md
|
url: update/create-deployment-plan.md
|
||||||
|
- text: Define readiness criteria
|
||||||
|
url: update/plan-define-readiness.md
|
||||||
- text: Evaluate infrastructure and tools
|
- text: Evaluate infrastructure and tools
|
||||||
url: update/eval-infra-tools.md
|
url: update/eval-infra-tools.md
|
||||||
|
- text: Determine application readiness
|
||||||
|
url: update/plan-determine-app-readiness.md
|
||||||
- text: Define your servicing strategy
|
- text: Define your servicing strategy
|
||||||
url: update/waas-servicing-strategy-windows-10-updates.md
|
url: update/waas-servicing-strategy-windows-10-updates.md
|
||||||
|
|
||||||
@ -62,7 +72,9 @@ landingContent:
|
|||||||
linkLists:
|
linkLists:
|
||||||
- linkListType: how-to-guide
|
- linkListType: how-to-guide
|
||||||
links:
|
links:
|
||||||
- text: Prepare to deploy Windows 10
|
- text: Prepare for Zero Touch Installation with Configuration Manager
|
||||||
|
url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md
|
||||||
|
- text: Prepare to deploy Windows 10 with MDT
|
||||||
url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md
|
url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md
|
||||||
- text: Evaluate and update infrastructure
|
- text: Evaluate and update infrastructure
|
||||||
url: update/update-policies.md
|
url: update/update-policies.md
|
||||||
@ -70,25 +82,36 @@ landingContent:
|
|||||||
url: update/waas-deployment-rings-windows-10-updates.md
|
url: update/waas-deployment-rings-windows-10-updates.md
|
||||||
|
|
||||||
# Card
|
# Card
|
||||||
- title: Deploy Windows 10
|
- title: Deploy and update Windows 10
|
||||||
linkLists:
|
linkLists:
|
||||||
- linkListType: deploy
|
- linkListType: deploy
|
||||||
links:
|
links:
|
||||||
- text: Deploy Windows 10 with Autopilot
|
- text: Windows Autopilot scenarios and capabilities
|
||||||
url: windows-autopilot/windows-autopilot-scenarios.md
|
url: windows-autopilot/windows-autopilot-scenarios.md
|
||||||
|
- text: Deploy Windows 10 to a new device with Configuration Manager
|
||||||
|
url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md
|
||||||
|
- text: Deploy a Windows 10 image using MDT
|
||||||
|
url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md
|
||||||
- text: Assign devices to servicing channels
|
- text: Assign devices to servicing channels
|
||||||
url: update/waas-servicing-channels-windows-10-updates.md
|
url: update/waas-servicing-channels-windows-10-updates.md
|
||||||
- text: Deploy Windows 10 updates
|
- text: Deploy Windows 10 updates
|
||||||
url: update/index.md
|
url: update/waas-servicing-channels-windows-10-updates.md
|
||||||
|
- text: Resolve Windows 10 upgrade errors
|
||||||
|
url: upgrade/resolve-windows-10-upgrade-errors.md
|
||||||
|
|
||||||
# Card (optional)
|
# Card (optional)
|
||||||
- title: Also see
|
- title: Windows 10 resources
|
||||||
linkLists:
|
linkLists:
|
||||||
- linkListType: reference
|
- linkListType: learn
|
||||||
links:
|
links:
|
||||||
- text: Windows 10 release information
|
- text: Windows 10 release information
|
||||||
url: https://docs.microsoft.com/en-us/windows/release-information/
|
url: https://docs.microsoft.com/windows/release-information/
|
||||||
- text: What's new in Windows 10
|
- text: What's new in Windows 10
|
||||||
url: https://docs.microsoft.com/en-us/windows/whats-new/
|
url: https://docs.microsoft.com/windows/whats-new/
|
||||||
- text: Windows 10 Enterprise Security
|
- text: Windows 10 Enterprise Security
|
||||||
url: https://docs.microsoft.com/en-us/windows/security/
|
url: https://docs.microsoft.com/windows/security/
|
||||||
|
- text: Desktop Deployment Center
|
||||||
|
url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home
|
||||||
|
- text: Microsoft 365 solution and architecture center
|
||||||
|
url: https://docs.microsoft.com/microsoft-365/solutions/?view=o365-worldwide
|
||||||
|
|
||||||
|
@ -1,144 +1,132 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 deployment considerations (Windows 10)
|
title: Windows 10 deployment considerations (Windows 10)
|
||||||
description: There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications.
|
description: There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications.
|
||||||
ms.assetid: A8DD6B37-1E11-4CD6-B588-92C2404219FE
|
ms.assetid: A8DD6B37-1E11-4CD6-B588-92C2404219FE
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.author: greglin
|
ms.author: greglin
|
||||||
keywords: deploy, upgrade, update, in-place
|
keywords: deploy, upgrade, update, in-place
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.mktglfcycl: plan
|
ms.mktglfcycl: plan
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
ms.topic: article
|
author: greg-lindsay
|
||||||
---
|
ms.topic: article
|
||||||
|
---
|
||||||
# Windows 10 deployment considerations
|
|
||||||
|
# Windows 10 deployment considerations
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
**Applies to**
|
||||||
- Windows 10
|
|
||||||
|
- Windows 10
|
||||||
There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications.
|
|
||||||
|
There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications.
|
||||||
For many years, organizations have deployed new versions of Windows using a “wipe and load” deployment process. At a high level, this process captures existing data and settings from the existing device, deploys a new custom-built Windows image to a PC, injects hardware drivers, reinstalls applications, and finally restores the data and settings. With Windows 10, this process is still fully supported, and for some deployment scenarios is still necessary.
|
|
||||||
|
For many years, organizations have deployed new versions of Windows using a “wipe and load” deployment process. At a high level, this process captures existing data and settings from the existing device, deploys a new custom-built Windows image to a PC, injects hardware drivers, reinstalls applications, and finally restores the data and settings. With Windows 10, this process is still fully supported, and for some deployment scenarios is still necessary.
|
||||||
Windows 10 also introduces two additional scenarios that organizations should consider:
|
|
||||||
|
Windows 10 also introduces two additional scenarios that organizations should consider:
|
||||||
- **In-place upgrade**, which provides a simple, automated process that leverages the Windows setup process to automatically upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications.
|
|
||||||
|
- **In-place upgrade**, which provides a simple, automated process that leverages the Windows setup process to automatically upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications.
|
||||||
- **Dynamic provisioning**, which enables organizations to configure new Windows 10 devices for organization use without having to deploy a new custom organization image to the device.
|
|
||||||
|
- **Dynamic provisioning**, which enables organizations to configure new Windows 10 devices for organization use without having to deploy a new custom organization image to the device.
|
||||||
Both of these scenarios eliminate the image creation process altogether, which can greatly simplify the deployment process.
|
|
||||||
|
Both of these scenarios eliminate the image creation process altogether, which can greatly simplify the deployment process.
|
||||||
So how do you choose? At a high level:
|
|
||||||
|
So how do you choose? At a high level:
|
||||||
<table>
|
|
||||||
<colgroup>
|
<table>
|
||||||
<col width="50%" />
|
<colgroup>
|
||||||
<col width="50%" />
|
<col width="50%" />
|
||||||
</colgroup>
|
<col width="50%" />
|
||||||
<thead>
|
</colgroup>
|
||||||
<tr class="header">
|
<thead>
|
||||||
<th align="left">Consider ...</th>
|
<tr class="header">
|
||||||
<th align="left">For these scenarios</th>
|
<th align="left">Consider ...</th>
|
||||||
</tr>
|
<th align="left">For these scenarios</th>
|
||||||
</thead>
|
</tr>
|
||||||
<tbody>
|
</thead>
|
||||||
<tr class="odd">
|
<tbody>
|
||||||
<td align="left">In-place upgrade</td>
|
<tr class="odd">
|
||||||
<td align="left"><ul>
|
<td align="left">In-place upgrade</td>
|
||||||
<li><p>When you want to keep all (or at least most) existing applications</p></li>
|
<td align="left"><ul>
|
||||||
<li><p>When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)</p></li>
|
<li><p>When you want to keep all (or at least most) existing applications</p></li>
|
||||||
<li><p>To migrate from Windows 10 to a later Windows 10 release</p></li>
|
<li><p>When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)</p></li>
|
||||||
</ul></td>
|
<li><p>To migrate from Windows 10 to a later Windows 10 release</p></li>
|
||||||
</tr>
|
</ul></td>
|
||||||
<tr class="even">
|
</tr>
|
||||||
<td align="left">Traditional wipe-and-load</td>
|
<tr class="even">
|
||||||
<td align="left"><ul>
|
<td align="left">Traditional wipe-and-load</td>
|
||||||
<li><p>When you upgrade significant numbers of applications along with the new Windows OS</p></li>
|
<td align="left"><ul>
|
||||||
<li><p>When you make significant device or operating system configuration changes</p></li>
|
<li><p>When you upgrade significant numbers of applications along with the new Windows OS</p></li>
|
||||||
<li><p>When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs</p></li>
|
<li><p>When you make significant device or operating system configuration changes</p></li>
|
||||||
<li><p>When you migrate from Windows Vista or other previous operating system versions</p></li>
|
<li><p>When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs</p></li>
|
||||||
</ul></td>
|
<li><p>When you migrate from Windows Vista or other previous operating system versions</p></li>
|
||||||
</tr>
|
</ul></td>
|
||||||
<tr class="odd">
|
</tr>
|
||||||
<td align="left">Dynamic provisioning</td>
|
<tr class="odd">
|
||||||
<td align="left"><ul>
|
<td align="left">Dynamic provisioning</td>
|
||||||
<li><p>For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required</p></li>
|
<td align="left"><ul>
|
||||||
<li><p>When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps</p></li>
|
<li><p>For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required</p></li>
|
||||||
</ul></td>
|
<li><p>When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps</p></li>
|
||||||
</tr>
|
</ul></td>
|
||||||
</tbody>
|
</tr>
|
||||||
</table>
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
## Migration from previous Windows versions
|
## Migration from previous Windows versions
|
||||||
|
|
||||||
|
For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall.
|
||||||
For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall.
|
|
||||||
|
The original Windows 8 release was only supported until January 2016. For devices running Windows 8.0, you can update to Windows 8.1 and then upgrade to Windows 10.
|
||||||
Note that the original Windows 8 release is only supported until January 2016. Organizations that do not think they can complete a full Windows 10 migration by that date should deploy Windows 8.1 now and consider Windows 10 after Windows 8 has been removed from the environment.
|
|
||||||
|
For PCs running operating systems older than Windows 7, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware.
|
||||||
For existing Windows PCs running Windows Vista, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware.
|
|
||||||
|
For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed).
|
||||||
Note that to take advantage of the limited-time free upgrade offer for PCs running Windows 7, Windows 8, or Windows 8.1, you must leverage an in-place upgrade, either from Windows Update or by using the upgrade media available from the [Windows 10 software download page](https://go.microsoft.com/fwlink/p/?LinkId=625073) to acquire a new Windows 10 license from the Windows Store. For more information, refer to the [Windows 10 FAQ](https://go.microsoft.com/fwlink/p/?LinkId=625074).
|
|
||||||
|
For organizations that did not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements.
|
||||||
For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed).
|
|
||||||
|
## Setting up new computers
|
||||||
For organizations that do not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements.
|
|
||||||
|
For new computers acquired with Windows 10 preinstalled, you can leverage dynamic provisioning scenarios to transform the device from its initial state into a fully-configured organization PC. There are two primary dynamic provisioning scenarios you can use:
|
||||||
## Setup of new computers
|
|
||||||
|
- **User-driven, from the cloud.** By joining a device into Azure Active Directory and leveraging the automatic mobile device management (MDM) provisioning capabilities at the same time, an end user can initiate the provisioning process themselves just by entering the Azure Active Directory account and password (called their “work or school account” within Windows 10). The MDM service can then transform the device into a fully-configured organization PC. For more information, see [Azure Active Directory integration with MDM](https://go.microsoft.com/fwlink/p/?LinkId=625075).
|
||||||
|
|
||||||
For new computers acquired with Windows 10 preinstalled, you can leverage dynamic provisioning scenarios to transform the device from its initial state into a fully-configured organization PC. There are two primary dynamic provisioning scenarios you can use:
|
- **IT admin-driven, using new tools.** Using the new Windows Imaging and Configuration Designer (ICD) tool, IT administrators can create provisioning packages that can be applied to a computer to transform it into a fully-configured organization PC. For more information, see [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=625076).
|
||||||
|
|
||||||
- **User-driven, from the cloud.** By joining a device into Azure Active Directory and leveraging the automatic mobile device management (MDM) provisioning capabilities at the same time, an end user can initiate the provisioning process themselves just by entering the Azure Active Directory account and password (called their “work or school account” within Windows 10). The MDM service can then transform the device into a fully-configured organization PC. For more information, see [Azure Active Directory integration with MDM](https://go.microsoft.com/fwlink/p/?LinkId=625075).
|
In either of these scenarios, you can make a variety of configuration changes to the PC:
|
||||||
|
|
||||||
- **IT admin-driven, using new tools.** Using the new Windows Imaging and Configuration Designer (ICD) tool, IT administrators can create provisioning packages that can be applied to a computer to transform it into a fully-configured organization PC. For more information, see [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=625076).
|
- Transform the edition (SKU) of Windows 10 that is in use.
|
||||||
|
- Apply configuration and settings to the device (for example, security settings, device restrictions, policies, Wi-Fi and VPN profiles, certificates, and so on).
|
||||||
In either of these scenarios, you can make a variety of configuration changes to the PC:
|
- Install apps, language packs, and updates.
|
||||||
|
- Enroll the device in a management solution (applicable for IT admin-driven scenarios, configuring the device just enough to allow the management tool to take over configuration and ongoing management).
|
||||||
- Transform the edition (SKU) of Windows 10 that is in use.
|
|
||||||
|
## Stay up to date
|
||||||
- Apply configuration and settings to the device (for example, security settings, device restrictions, policies, Wi-Fi and VPN profiles, certificates, and so on).
|
|
||||||
|
For computers already running Windows 10 on the Semi-Annual Channel, new upgrades will be deployed two times per year. You can deploy these upgrades by using a variety of methods:
|
||||||
- Install apps, language packs, and updates.
|
|
||||||
|
- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet.
|
||||||
- Enroll the device in a management solution (applicable for IT admin-driven scenarios, configuring the device just enough to allow the management tool to take over configuration and ongoing management).
|
- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update).
|
||||||
|
- Configuration Manager task sequences.
|
||||||
## Stay up to date
|
- Configuration Manager software update capabilities (deploying like an update).
|
||||||
|
|
||||||
|
These upgrades (which are installed differently than monthly updates) leverage an in-place upgrade process. Unlike updates, which are relatively small, these upgrades will include a full operating system image (around 3 GB for 64-bit operating systems), which requires time (1-2 hours) and disk space (approximately 10 GB) to complete. Ensure that the deployment method you use can support the required network bandwidth and/or disk space requirements.
|
||||||
For computers already running Windows 10 on the Semi-Annual Channel, new upgrades will periodically be deployed, approximately two to three times per year. You can deploy these upgrades by using a variety of methods:
|
|
||||||
|
The upgrade process is also optimized to reduce the overall time and network bandwidth consumed.
|
||||||
- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet.
|
|
||||||
|
## Related topics
|
||||||
- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update). Note that this will require updates to WSUS, which are only available for Windows Server 2012 and Windows Server 2012 R2, not previous versions.
|
|
||||||
|
|
||||||
- System Center Configuration Manager task sequences (with Configuration Manager 2012, 2012 R2, and later versions).
|
[Windows 10 compatibility](windows-10-compatibility.md)<br>
|
||||||
|
[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md)
|
||||||
- System Center Configuration Manager vNext software update capabilities (deploying like an update).
|
|
||||||
|
|
||||||
Note that these upgrades (which are installed differently than monthly updates) will leverage an in-place upgrade process. Unlike updates, which are relatively small, these upgrades will include a full operating system image (around 3 GB for 64-bit operating systems), which requires time (1-2 hours) and disk space (approximately 10 GB) to complete. Ensure that the deployment method you use can support the required network bandwidth and/or disk space requirements.
|
|
||||||
|
|
||||||
Over time, this upgrade process will be optimized to reduce the overall time and network bandwidth consumed.
|
|
||||||
|
|
||||||
## Related topics
|
|
||||||
|
|
||||||
|
|
||||||
[Windows 10 compatibility](windows-10-compatibility.md)
|
|
||||||
|
|
||||||
[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -26,38 +26,24 @@ There are specific infrastructure requirements to deploy and manage Windows 10
|
|||||||
|
|
||||||
## High-level requirements
|
## High-level requirements
|
||||||
|
|
||||||
|
|
||||||
For initial Windows 10 deployments, as well as subsequent Windows 10 upgrades, ensure that sufficient disk space is available for distribution of the Windows 10 installation files (about 3 GB for Windows 10 x64 images, slightly smaller for x86). Also, be sure to take into account the network impact of moving these large images to each PC; you may need to leverage local server storage.
|
For initial Windows 10 deployments, as well as subsequent Windows 10 upgrades, ensure that sufficient disk space is available for distribution of the Windows 10 installation files (about 3 GB for Windows 10 x64 images, slightly smaller for x86). Also, be sure to take into account the network impact of moving these large images to each PC; you may need to leverage local server storage.
|
||||||
|
|
||||||
For persistent VDI environments, carefully consider the I/O impact from upgrading large numbers of PCs in a short period of time. Ensure that upgrades are performed in smaller numbers, or during off-peak time periods. (For pooled VDI environments, a better approach is to replace the base image with a new version.)
|
For persistent VDI environments, carefully consider the I/O impact from upgrading large numbers of PCs in a short period of time. Ensure that upgrades are performed in smaller numbers, or during off-peak time periods. (For pooled VDI environments, a better approach is to replace the base image with a new version.)
|
||||||
|
|
||||||
## Deployment tools
|
## Deployment tools
|
||||||
|
|
||||||
|
The latest version of the Windows Assessment and Deployment Toolkit (ADK) is available for download [here](https://docs.microsoft.com/windows-hardware/get-started/adk-install).
|
||||||
A new version of the Assessment and Deployment Toolkit (ADK) has been released to support Windows 10. This new version, available for download [here](https://go.microsoft.com/fwlink/p/?LinkId=526740), is required for Windows 10; you should not use earlier versions of the ADK to deploy Windows 10. It also supports the deployment of Windows 7, Windows 8, and Windows 8.1.
|
|
||||||
|
|
||||||
Significant enhancements in the ADK for Windows 10 include new runtime provisioning capabilities, which leverage the Windows Imaging and Configuration Designer (Windows ICD), as well as updated versions of existing deployment tools (DISM, USMT, Windows PE, and more).
|
Significant enhancements in the ADK for Windows 10 include new runtime provisioning capabilities, which leverage the Windows Imaging and Configuration Designer (Windows ICD), as well as updated versions of existing deployment tools (DISM, USMT, Windows PE, and more).
|
||||||
|
|
||||||
Microsoft Deployment Toolkit 2013 Update 1, available for download [here](https://go.microsoft.com/fwlink/p/?LinkId=625079), has also been updated to support Windows 10 and the new ADK; older versions do not support Windows 10. New in this release is task sequence support for Windows 10 in-place upgrades.
|
The latest version of the Microsoft Deployment Toolkit (MDT) is available for download [here](https://docs.microsoft.com/mem/configmgr/mdt/release-notes).
|
||||||
|
|
||||||
For System Center Configuration Manager, Windows 10 support is offered with various releases:
|
For Configuration Manager, Windows 10 version specific support is offered with [various releases](https://docs.microsoft.com/mem/configmgr/core/plan-design/configs/support-for-windows-10).
|
||||||
|
|
||||||
| Release | Windows 10 management? | Windows 10 deployment? |
|
|
||||||
|---------------------------------------------|------------------------|------------------------------------------------|
|
|
||||||
| System Center Configuration Manager 2007 | Yes, with a hotfix | No |
|
|
||||||
| System Center Configuration Manager 2012 | Yes, with SP2 and CU1 | Yes, with SP2, CU1, and the ADK for Windows 10 |
|
|
||||||
| System Center Configuration Manager 2012 R2 | Yes, with SP1 and CU1 | Yes, with SP1, CU1, and the ADK for Windows 10 |
|
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> Configuration Manager 2012 supports Windows 10 version 1507 (build 10.0.10240) and 1511 (build 10.0.10586) for the lifecycle of these builds. Future releases of Windows 10 CB/CBB are not supported With Configuration Manager 2012, and will require Microsoft Endpoint Configuration Manager current branch for supported management.
|
|
||||||
|
|
||||||
|
|
||||||
For more details about Microsoft Endpoint Configuration Manager support for Windows 10, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
For more details about Microsoft Endpoint Configuration Manager support for Windows 10, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md).
|
||||||
|
|
||||||
## Management tools
|
## Management tools
|
||||||
|
|
||||||
|
|
||||||
In addition to Microsoft Endpoint Configuration Manager, Windows 10 also leverages other tools for management. For Windows Server and Active Directory, existing supported versions are fully supported for Windows 10. New Group Policy templates will be needed to configure new settings available in Windows 10; these templates are available in the Windows 10 media images, and are available as a separate download [here](https://go.microsoft.com/fwlink/p/?LinkId=625081). See [Group Policy settings reference](https://go.microsoft.com/fwlink/p/?LinkId=625082) for a list of the new and modified policy settings. If you are using a central policy store, follow the steps outlined [here](https://go.microsoft.com/fwlink/p/?LinkId=625083) to update the ADMX files stored in that central store.
|
In addition to Microsoft Endpoint Configuration Manager, Windows 10 also leverages other tools for management. For Windows Server and Active Directory, existing supported versions are fully supported for Windows 10. New Group Policy templates will be needed to configure new settings available in Windows 10; these templates are available in the Windows 10 media images, and are available as a separate download [here](https://go.microsoft.com/fwlink/p/?LinkId=625081). See [Group Policy settings reference](https://go.microsoft.com/fwlink/p/?LinkId=625082) for a list of the new and modified policy settings. If you are using a central policy store, follow the steps outlined [here](https://go.microsoft.com/fwlink/p/?LinkId=625083) to update the ADMX files stored in that central store.
|
||||||
|
|
||||||
No new Active Directory schema updates or specific functional levels are currently required for core Windows 10 product functionality, although subsequent upgrades could require these to support new features.
|
No new Active Directory schema updates or specific functional levels are currently required for core Windows 10 product functionality, although subsequent upgrades could require these to support new features.
|
||||||
@ -72,8 +58,6 @@ Microsoft Desktop Optimization Pack (MDOP) has been updated to support Windows
|
|||||||
| Microsoft BitLocker Administration and Monitoring (MBAM) | MBAM 2.5 SP1 (2.5 is OK) |
|
| Microsoft BitLocker Administration and Monitoring (MBAM) | MBAM 2.5 SP1 (2.5 is OK) |
|
||||||
| User Experience Virtualization (UE-V) | UE-V 2.1 SP1 |
|
| User Experience Virtualization (UE-V) | UE-V 2.1 SP1 |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
For more information, see the [MDOP TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=625090).
|
For more information, see the [MDOP TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=625090).
|
||||||
|
|
||||||
For devices you manage with mobile device management (MDM) solutions such as Microsoft Intune, existing capabilities (provided initially in Windows 8.1) are fully supported in Windows 10; new Windows 10 MDM settings and capabilities will require updates to the MDM services. See [Mobile device management](https://go.microsoft.com/fwlink/p/?LinkId=625084) for more information.
|
For devices you manage with mobile device management (MDM) solutions such as Microsoft Intune, existing capabilities (provided initially in Windows 8.1) are fully supported in Windows 10; new Windows 10 MDM settings and capabilities will require updates to the MDM services. See [Mobile device management](https://go.microsoft.com/fwlink/p/?LinkId=625084) for more information.
|
||||||
@ -81,20 +65,17 @@ For devices you manage with mobile device management (MDM) solutions such as Mic
|
|||||||
Windows Server Update Services (WSUS) requires some additional configuration to receive updates for Windows 10. Use the Windows Server Update Services admin tool and follow these instructions:
|
Windows Server Update Services (WSUS) requires some additional configuration to receive updates for Windows 10. Use the Windows Server Update Services admin tool and follow these instructions:
|
||||||
|
|
||||||
1. Select the **Options** node, and then click **Products and Classifications**.
|
1. Select the **Options** node, and then click **Products and Classifications**.
|
||||||
|
|
||||||
2. In the **Products** tree, select the **Windows 10** and **Windows 10 LTSB** products and any other Windows 10-related items that you want. Click **OK**.
|
2. In the **Products** tree, select the **Windows 10** and **Windows 10 LTSB** products and any other Windows 10-related items that you want. Click **OK**.
|
||||||
|
|
||||||
3. From the **Synchronizations** node, right-click and choose **Synchronize Now**.
|
3. From the **Synchronizations** node, right-click and choose **Synchronize Now**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Figure 1. WSUS product list with Windows 10 choices
|
WSUS product list with Windows 10 choices
|
||||||
|
|
||||||
Because Windows 10 updates are cumulative in nature, each month’s new update will supersede the previous month's. Consider leveraging “express installation” packages to reduce the size of the payload that needs to be sent to each PC each month; see [Express installation files](https://go.microsoft.com/fwlink/p/?LinkId=625086) for more information. (Note that this will increase the amount of disk storage needed by WSUS, and impacts all operating systems being managed with WSUS.)
|
Because Windows 10 updates are cumulative in nature, each month’s new update will supersede the previous month's. Consider leveraging “express installation” packages to reduce the size of the payload that needs to be sent to each PC each month; see [Express installation files](https://go.microsoft.com/fwlink/p/?LinkId=625086) for more information. (Note that this will increase the amount of disk storage needed by WSUS, and impacts all operating systems being managed with WSUS.)
|
||||||
|
|
||||||
## Activation
|
## Activation
|
||||||
|
|
||||||
|
|
||||||
Windows 10 volume license editions of Windows 10 will continue to support all existing activation methods (KMS, MAK, and AD-based activation). An update will be required for existing KMS servers:
|
Windows 10 volume license editions of Windows 10 will continue to support all existing activation methods (KMS, MAK, and AD-based activation). An update will be required for existing KMS servers:
|
||||||
|
|
||||||
| Product | Required update |
|
| Product | Required update |
|
||||||
@ -104,26 +85,21 @@ Windows 10 volume license editions of Windows 10 will continue to support all
|
|||||||
| Windows Server 2012 and Windows 8 | [https://support.microsoft.com/kb/3058168](https://go.microsoft.com/fwlink/p/?LinkId=625087) |
|
| Windows Server 2012 and Windows 8 | [https://support.microsoft.com/kb/3058168](https://go.microsoft.com/fwlink/p/?LinkId=625087) |
|
||||||
| Windows Server 2008 R2 and Windows 7 | [https://support.microsoft.com/kb/3079821](https://support.microsoft.com/kb/3079821) |
|
| Windows Server 2008 R2 and Windows 7 | [https://support.microsoft.com/kb/3079821](https://support.microsoft.com/kb/3079821) |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Also see: [Windows Server 2016 Volume Activation Tips](https://blogs.technet.microsoft.com/askcore/2016/10/19/windows-server-2016-volume-activation-tips/)
|
Also see: [Windows Server 2016 Volume Activation Tips](https://blogs.technet.microsoft.com/askcore/2016/10/19/windows-server-2016-volume-activation-tips/)
|
||||||
|
|
||||||
Additionally, new product keys will be needed for all types of volume license activation (KMS, MAK, and AD-based Activation); these keys are available on the Volume Licensing Service Center (VLSC) for customers with rights to the Windows 10 operating system. To find the needed keys:
|
Additionally, new product keys will be needed for all types of volume license activation (KMS, MAK, and AD-based Activation); these keys are available on the Volume Licensing Service Center (VLSC) for customers with rights to the Windows 10 operating system. To find the needed keys:
|
||||||
|
|
||||||
- Sign into the [Volume Licensing Service Center (VLSC)](https://go.microsoft.com/fwlink/p/?LinkId=625088) at with a Microsoft account that has appropriate rights.
|
- Sign into the [Volume Licensing Service Center (VLSC)](https://go.microsoft.com/fwlink/p/?LinkId=625088) at with a Microsoft account that has appropriate rights.
|
||||||
|
|
||||||
- For KMS keys, click **Licenses** and then select **Relationship Summary**. Click the appropriate active license ID, and then select **Product Keys** near the right side of the page. For KMS running on Windows Server, find the **Windows Srv 2012R2 DataCtr/Std KMS for Windows 10** product key; for KMS running on client operating systems, find the **Windows 10** product key.
|
- For KMS keys, click **Licenses** and then select **Relationship Summary**. Click the appropriate active license ID, and then select **Product Keys** near the right side of the page. For KMS running on Windows Server, find the **Windows Srv 2012R2 DataCtr/Std KMS for Windows 10** product key; for KMS running on client operating systems, find the **Windows 10** product key.
|
||||||
|
|
||||||
- For MAK keys, click **Downloads and Keys**, and then filter the list by using **Windows 10** as a product. Click the **Key** link next to an appropriate list entry (for example, **Windows 10 Enterprise** or **Windows 10 Enterprise LTSB**) to view the available MAK keys. (You can also find keys for KMS running on Windows 10 in this list. These keys will not work on Windows servers running KMS.)
|
- For MAK keys, click **Downloads and Keys**, and then filter the list by using **Windows 10** as a product. Click the **Key** link next to an appropriate list entry (for example, **Windows 10 Enterprise** or **Windows 10 Enterprise LTSB**) to view the available MAK keys. (You can also find keys for KMS running on Windows 10 in this list. These keys will not work on Windows servers running KMS.)
|
||||||
|
|
||||||
Note that Windows 10 Enterprise and Windows 10 Enterprise LTSB installations use different MAK keys. But you can use the same KMS server or Active Directory-based activation environment for both; the KMS keys obtained from the Volume Licensing Service Center will work with both.
|
Note that Windows 10 Enterprise and Windows 10 Enterprise LTSC installations use different MAK keys. But you can use the same KMS server or Active Directory-based activation environment for both; the KMS keys obtained from the Volume Licensing Service Center will work with both.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
[Windows 10 servicing options](../update/waas-servicing-strategy-windows-10-updates.md)<br>
|
||||||
[Windows 10 servicing options](../update/waas-servicing-strategy-windows-10-updates.md)
|
[Windows 10 deployment considerations](windows-10-deployment-considerations.md)<br>
|
||||||
<BR>[Windows 10 deployment considerations](windows-10-deployment-considerations.md)
|
[Windows 10 compatibility](windows-10-compatibility.md)<br>
|
||||||
<BR>[Windows 10 compatibility](windows-10-compatibility.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ms.localizationpriority: medium
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
ms.date: 12/05/2018
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
@ -42,7 +41,7 @@ Save your files to your favorite cloud, like OneDrive or Dropbox, and access the
|
|||||||
|
|
||||||
## Deployment
|
## Deployment
|
||||||
|
|
||||||
Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired.
|
Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](windows-autopilot/windows-autopilot.md). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired.
|
||||||
|
|
||||||
## Keep line of business apps functioning with Desktop Bridge
|
## Keep line of business apps functioning with Desktop Bridge
|
||||||
|
|
||||||
|
107
windows/deployment/update/get-started-updates-channels-tools.md
Normal file
@ -0,0 +1,107 @@
|
|||||||
|
---
|
||||||
|
title: Windows 10 updates, channels, and tools
|
||||||
|
description: Brief summary of the kinds of Windows updates, the channels they are served through, and the tools for managing them
|
||||||
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
author: jaimeo
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: jaimeo
|
||||||
|
ms.reviewer:
|
||||||
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Windows 10 updates, channels, and tools
|
||||||
|
|
||||||
|
## How Windows updates work
|
||||||
|
|
||||||
|
There are four phases to the Windows update process:
|
||||||
|
|
||||||
|
- **Scan:** A device checks the Microsoft Update server, Windows Update service, or your Windows Server Update Services (WSUS) endpoint at random intervals to see if any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the
|
||||||
|
administrator. This process is invisible to the user.
|
||||||
|
- **Download:** Once the device determines that an update is available, it begins downloading the update. The download process is also invisible to the user. With feature updates, download happens in multiple
|
||||||
|
sequential phases.
|
||||||
|
- **Install:** After the update is downloaded, depending on the device’s Windows Update settings, the update is installed on the system.
|
||||||
|
- **Commit and restart:** Once installed, the device usually (but not always) must be restarted in order to complete the installation and begin using the update. Before that happens, a device is still running the previous
|
||||||
|
version of the software.
|
||||||
|
|
||||||
|
## Types of updates
|
||||||
|
|
||||||
|
We include information here about a number of different update types you'll hear about, but the two overarching types which you have the most direct control over are *feature updates* and *quality updates*.
|
||||||
|
|
||||||
|
- **Feature updates:** Released twice per year, around March and September. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage.
|
||||||
|
- **Quality updates:** Quality updates deliver both security and non-security fixes to Windows 10. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. They are typically released on the second Tuesday of each month, though they can be released at any time. The second-Tuesday releases are the ones that focus on security updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously.
|
||||||
|
- **Servicing stack updates:** The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see [Servicing stack updates](servicing-stack-updates.md).
|
||||||
|
- **Driver updates**: These are updates to drivers applicable to your devices. Driver updates are turned off by default in Windows Server Update Services (WSUS), but for cloud-based update methods, you can control whether they are installed or not.
|
||||||
|
- **Microsoft product updates:** These are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using policies controlled by various servicing tools.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Servicing channels
|
||||||
|
|
||||||
|
Windows 10 offers three servicing channels, each of which offers you a different level of flexibility with how and when updates are delivered to devices. Using the different servicing channels allows you to deploy Windows 10 "as a service" which conceives of deployment as a continual process of updates which roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process.
|
||||||
|
|
||||||
|
The first step of controlling when and how devices install updates is assigning them to the appropriate servicing channel. You can assign devices to a particular channel with any of several tools, including Microsoft Endpoint Configuration Manager, Windows Server Update Services (WSUS), and Group Policy settings applied by any of several means. By dividing devices into different populations ("deployment groups" or "rings") you can use servicing channel assignment, followed by other management features such as update deferral policies, to create a phased deployment of any update that allows you to start with a limited pilot deployment for testing before moving to a broad deployment throughout your organization.
|
||||||
|
|
||||||
|
|
||||||
|
### Semi-annual Channel
|
||||||
|
|
||||||
|
In the Semi-annual Channel, feature updates are available as soon as Microsoft releases them, twice per year. As long as a device isn't set to defer feature updates, any device using the Semi-annual Channel will install a feature update as soon as it's released. If you use Windows Update for Business, the Semi-annual Channel provides three months of additional total deployment time before being required to update to the next release.{IS THIS STILL TRUE?}
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607.
|
||||||
|
|
||||||
|
### Windows Insider Program for Business
|
||||||
|
|
||||||
|
Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. There are actually three options within the Windows Insider Program for Business channel:
|
||||||
|
|
||||||
|
- Windows Insider Fast
|
||||||
|
- Windows Insider Slow
|
||||||
|
- Windows Insider Release Preview
|
||||||
|
|
||||||
|
We recommend that you use the Windows Insider Release Preview channel for validation activities.
|
||||||
|
|
||||||
|
|
||||||
|
### Long-term Servicing Channel
|
||||||
|
|
||||||
|
The **Long Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx).
|
||||||
|
|
||||||
|
The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition.
|
||||||
|
|
||||||
|
|
||||||
|
| Windows 10 edition | Semi-Annual Channel | Insider Program | Long-Term Servicing Channel |
|
||||||
|
| --- | --- | --- | --- |
|
||||||
|
| Home | | | |
|
||||||
|
| Pro |  |  | |
|
||||||
|
| Enterprise |  | | |
|
||||||
|
| Enterprise LTSB |  | | |
|
||||||
|
| Pro Education |  |  | |
|
||||||
|
| Education |  |  | |
|
||||||
|
|
||||||
|
## Servicing tools
|
||||||
|
|
||||||
|
### Tools for on-premises update delivery
|
||||||
|
|
||||||
|
Windows Server Update Services (WSUS): you set up a WSUS server, which downloads updates in bulk from Microsoft. Your individual devices then connect to your server to install their updates from there.
|
||||||
|
|
||||||
|
You can set up, control, and manage the server and update process with a number of tools:
|
||||||
|
|
||||||
|
- A standalone Windows Server Update Services server operated directly
|
||||||
|
- [Configuration Manager](deploy-updates-configmgr.md)
|
||||||
|
- Non-Microsoft tools
|
||||||
|
|
||||||
|
For more information, see [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus).
|
||||||
|
|
||||||
|
### Tools for cloud-based update delivery
|
||||||
|
|
||||||
|
Your individual devices connect to Microsoft endpoints directly to get the updates. The details of this process (how often devices download updates of various kinds, from which channels, deferrals, and details of the users' experience of installation) are set on devices either with Group Policy or MDM policies, which you can control with any of a number of tools:
|
||||||
|
|
||||||
|
- [Group Policy Management Console](waas-wufb-group-policy.md) (Gpmc.msc)
|
||||||
|
- [Microsoft Intune](waas-wufb-intune.md)
|
||||||
|
- Non-Microsoft MDM tools
|
||||||
|
|
||||||
|
### Hybrid scenarios
|
||||||
|
|
||||||
|
It is also possible to combine WSUS-based on-premises update distribution with cloud-based update delivery.
|
||||||
|
|
@ -43,7 +43,7 @@ Combining the various validation methods with the app classifications you've pre
|
|||||||
|Test in pilot | x | x | x |
|
|Test in pilot | x | x | x |
|
||||||
|
|
||||||
|
|
||||||
## Identify users
|
### Identify users
|
||||||
|
|
||||||
Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include:
|
Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include:
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ Since your organization no doubt has a wide variety of users, each with differen
|
|||||||
|
|
||||||
You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users.
|
You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users.
|
||||||
|
|
||||||
## Identify and set up devices for validation
|
### Identify and set up devices for validation
|
||||||
|
|
||||||
In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment.
|
In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment.
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ There is more than one way to choose devices for app validation:
|
|||||||
- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices.
|
- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices.
|
||||||
|
|
||||||
|
|
||||||
## Desktop Analytics
|
### Desktop Analytics
|
||||||
|
|
||||||
Desktop Analytics can make all of the tasks discussed in this article significantly easier:
|
Desktop Analytics can make all of the tasks discussed in this article significantly easier:
|
||||||
|
|
||||||
|
158
windows/deployment/update/prepare-deploy-windows.md
Normal file
@ -0,0 +1,158 @@
|
|||||||
|
---
|
||||||
|
title: Prepare to deploy Windows
|
||||||
|
description:
|
||||||
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
author: jaimeo
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: jaimeo
|
||||||
|
ms.reviewer:
|
||||||
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Prepare to deploy Windows
|
||||||
|
|
||||||
|
Having worked through the activities in the planning phase, you should be in a good position to prepare your environment and process to deploy Windows 10. The planning phase will have left you with these useful items:
|
||||||
|
|
||||||
|
- A clear understanding of necessary personnel and their roles and criteria for [rating app readiness](plan-define-readiness.md)
|
||||||
|
- A plan for [testing and validating](plan-determine-app-readiness.md) apps
|
||||||
|
- An assessment of your [deployment infrastructure](eval-infra-tools.md) and definitions for operational readiness
|
||||||
|
- A [deployment plan](create-deployment-plan.md) that defines the rings you want to use
|
||||||
|
|
||||||
|
Now you're ready to actually start making changes in your environment to get ready to deploy.
|
||||||
|
|
||||||
|
## Prepare infrastructure and environment
|
||||||
|
|
||||||
|
- Deploy site server updates for Configuration Manager.
|
||||||
|
- Update non-Microsoft security tools like security agents or servers.
|
||||||
|
- Update non-Microsoft management tools like data loss prevention agents.
|
||||||
|
|
||||||
|
Your infrastructure probably includes many different components and tools. You’ll need to ensure your environment isn’t affected by issues due to the changes you make to the various parts of the infrastructure. Follow these steps:
|
||||||
|
|
||||||
|
1. Review all of the infrastructure changes that you’ve identified in your plan. It’s important to understand the changes that need to be made and to detail how to implement them. This prevents problems later on.
|
||||||
|
2. Validate your changes. You’ll validate the changes for your infrastructure’s components and tools, to help you understand how your changes could affect your production environment.
|
||||||
|
3. Implement the changes. Once the changes have been validated, you can implement the changes across the wider infrastructure.
|
||||||
|
|
||||||
|
|
||||||
|
You should also look at your organization’s environment’s configuration and outline how you’ll implement any necessary changes previously identified in the plan phase to support the update. Consider what you’ll need to do for the various settings and policies that currently underpin the environment. For example:
|
||||||
|
|
||||||
|
- Implement new draft security guidance. New versions of Windows can include new features that improve your environment’s security. Your security teams will want to make appropriate changes to security related configurations.
|
||||||
|
- Update security baselines. Security teams understand the relevant security baselines and will have to work to make sure all baselines fit into whatever guidance they have to adhere to.
|
||||||
|
However, your configuration will consist of many different settings and policies. It’s important to only apply changes where they are necessary, and where you gain a clear improvement. Otherwise, your environment might face issues that will slow down the update process. You want to ensure your environment isn’t affected adversely because of changes you make. For example:
|
||||||
|
|
||||||
|
1. Review new security settings. Your security team will review the new security settings, to understand how they can best be set to facilitate the update, and to also investigate the potential effects they might have on your environment.
|
||||||
|
2. Review security baselines for changes. Security teams will also review all the necessary security baselines, to ensure the changes can be implemented, and ensure your environment remains compliant.
|
||||||
|
3. Implement and validate security settings and baseline changes. Your security teams will then implement all of the security settings and baselines, having addressed any potential outstanding issues.
|
||||||
|
|
||||||
|
|
||||||
|
## Prepare applications and devices
|
||||||
|
|
||||||
|
You've previously decided on which validation methods you want to use to validate apps in the upcoming pilot deployment phase. Now is a good time to make sure that individual devices are ready and able to install the next update without difficulty.
|
||||||
|
|
||||||
|
### Ensure updates are available
|
||||||
|
|
||||||
|
Enable update services on devices. Ensure that every device is running all the services Windows Update relies on. Sometimes users or even malware can disable the services Windows Update requires to work correctly. Make sure the following services are running:
|
||||||
|
|
||||||
|
- Background Intelligent Transfer Service
|
||||||
|
- Background Tasks Infrastructure Service
|
||||||
|
- BranchCache (if you use this feature for update deployment)
|
||||||
|
- ConfigMgr Task Sequence Agent (if you use Configuration Manager to deploy updates)
|
||||||
|
- Cryptographic Services
|
||||||
|
- DCOM Server Process Launcher
|
||||||
|
- Device Install
|
||||||
|
- Delivery Optimization
|
||||||
|
- Device Setup Manager
|
||||||
|
- License Manager
|
||||||
|
- Microsoft Account Sign-in Assistant
|
||||||
|
- Microsoft Software Shadow Copy Provider
|
||||||
|
- Remote Procedure Call (RPC)
|
||||||
|
- Remote Procedure Call (RPC) Locator
|
||||||
|
- RPC Endpoint Mapper
|
||||||
|
- Service Control Manager
|
||||||
|
- Task Scheduler
|
||||||
|
- Token Broker
|
||||||
|
- Update Orchestrator Service
|
||||||
|
- Volume Shadow Copy Service
|
||||||
|
- Windows Automatic Update Service
|
||||||
|
- Windows Backup
|
||||||
|
- Windows Defender Firewall
|
||||||
|
- Windows Management Instrumentation
|
||||||
|
- Windows Management Service
|
||||||
|
- Windows Module Installer
|
||||||
|
- Windows Push Notification
|
||||||
|
- Windows Security Center Service
|
||||||
|
- Windows Time Service
|
||||||
|
- Windows Update
|
||||||
|
- Windows Update Medic Service
|
||||||
|
|
||||||
|
You can check these services manually by using Services.msc, or by using PowerShell scripts, Desktop Analytics, or other methods.
|
||||||
|
|
||||||
|
### Network configuration
|
||||||
|
|
||||||
|
Ensure that devices can reach necessary Windows Update endpoints through the firewall.
|
||||||
|
|
||||||
|
### Optimize download bandwidth
|
||||||
|
Set up [Delivery Optimization](waas-delivery-optimization.md) for peer network sharing or Microsoft Connected Cache.
|
||||||
|
|
||||||
|
### Address unhealthy devices
|
||||||
|
|
||||||
|
In the course of surveying your device population, either with Desktop Analytics or by some other means, you might find devices that have systemic problems that could interfere with update installation. Now is the time to fix those problems.
|
||||||
|
|
||||||
|
- **Low disk space:** Quality updates require a minimum of two GB to successfully install. Feature updates require between 8 and 15 GB depending upon the configuration. On Windows 10, version 1903 and later you can proactively use the "reserved storage" feature (for wipe and loads, rebuilds, and new builds) to avoid running out of disk space. If you find a group of devices that don't have enough disk space, you can often resolve this by cleaning up log files and asking users to clean up data if necessary. A good place to start is to delete the following files:
|
||||||
|
- C:\Windows\temp
|
||||||
|
- C:\Windows\cbstemp (though this file might be necessary to investigate update failures)
|
||||||
|
- C:\Windows\WindowsUpdate.log (though this file might be necessary to investigate update failures)
|
||||||
|
- C:\Windows.Old (these files should automatically clean up after 10 days or might ask the device user for permission to clean up sooner when constrained for disk space)
|
||||||
|
|
||||||
|
You can also create and run scripts to perform additional cleanup actions on devices, with administrative rights, or use Group Policy settings.
|
||||||
|
|
||||||
|
- Clean up the Windows Store Cache by running C:\Windows\sytem32\wsreset.exe
|
||||||
|
- Optimize the WinSxS folder on the client machine by using **Dism.exe /online /Cleanup-Image /StartComponentCleanup**
|
||||||
|
- Compact the operating system by running **Compact.exe /CompactOS:always**
|
||||||
|
- Remove Windows Features on Demand that the user doesn't need. See [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) for more guidance.
|
||||||
|
- Move Windows Known Folders to OneDrive. See [Use Group Policy to control OneDrive sync settings](https://docs.microsoft.com/onedrive/use-group-policy) for more information.
|
||||||
|
- Clean up the Software Distribution folder. Try deploying these commands as a batch file to run on devices to reset the download state of Windows Updates:
|
||||||
|
|
||||||
|
```
|
||||||
|
net stop wuauserv
|
||||||
|
net stop cryptSvc
|
||||||
|
net stop bits
|
||||||
|
net stop msiserver
|
||||||
|
ren C:\Windows\SoftwareDistribution C:\Windows\SoftwareDistribution.old
|
||||||
|
net start wuauserv
|
||||||
|
net start cryptSvc
|
||||||
|
net start bits
|
||||||
|
net start msiserver
|
||||||
|
```
|
||||||
|
|
||||||
|
- **Application and driver updates:** Out-of-date app or driver software can prevent devices from updating successfully. Desktop Analytics will help you identify drivers and applications that need attention. You can also
|
||||||
|
check for known issues in order to take any appropriate action. Deploy any updates from the vendor(s) for any problematic application or driver versions to resolve issues.
|
||||||
|
- **Corruption:** In rare circumstances, a device that has repeated installation errors might be corrupted in a way that prevents the system from applying a new update. You might have to repair the Component Based Store from another source. You can do this with the [System File Checker](https://support.microsoft.com/help/929833/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Prepare capability
|
||||||
|
|
||||||
|
In the plan phase, you determined the specific infrastructure and configuration changes that needed to be implemented to add new capabilities to the environment. Now you can move on to implementing those changes defined in the plan phase. You'll need to complete these higher-level tasks to gain those new capabilities:
|
||||||
|
|
||||||
|
- Enable capabilities across the environment by implementing the changes. For example, implement updates to relevant ADMX templates in Active Directory. New Windows versions will come with new policies that you use to update ADMX templates.
|
||||||
|
- Validate new changes to understand how they affect the wider environment.
|
||||||
|
- Remediate any potential problems that have been identified through validation.
|
||||||
|
|
||||||
|
## Prepare users
|
||||||
|
|
||||||
|
Users often feel like they are forced into updating their devices randomly. They often don't fully understand why an update is needed, and they don't know when updates would be applied to their devices ahead of time. It's best to ensure that upcoming updates are communicated clearly and with adequate warning.
|
||||||
|
|
||||||
|
You can employ a variety of measures to achieve this, for example:
|
||||||
|
|
||||||
|
- Send overview email about the update and how it will be deployed to the entire organization.
|
||||||
|
- Send personalized emails to users about the update with specific details.
|
||||||
|
- Set an opt-out deadline for employees that need to remain on the current version for a bit longer, due to a business need.
|
||||||
|
- Provide the ability to voluntarily update at users’ convenience.
|
||||||
|
- Inform users of a mandatory installation date when the update will be installed on all devices.
|
||||||
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10)
|
title: Monitor Windows Updates and Microsoft Defender AV with Update Compliance (Windows 10)
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network.
|
description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network.
|
||||||
|
@ -24,9 +24,11 @@ ms.topic: article
|
|||||||
> This is a 200 level topic (moderate).
|
> This is a 200 level topic (moderate).
|
||||||
> See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article.
|
> See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article.
|
||||||
|
|
||||||
|
This topic provides some common causes and solutions that are associated with specific upgrade error codes. If a Windows 10 upgrade fails, you can write down the error code that is displayed, or find the error code in the Windows [Event Log](windows-error-reporting.md) or in the Windows Setup [log files](log-files.md) (ex: **setuperr.log**) and review the cause and solutions provided here. You should also try running the free [SetupDiag](setupdiag.md) tool provided by Microsoft, which can automatically find the reason for an upgrade failure.
|
||||||
|
|
||||||
## 0xC1900101
|
## 0xC1900101
|
||||||
|
|
||||||
A frequently observed result code is 0xC1900101. This result code can be thrown at any stage of the upgrade process, with the exception of the downlevel phase. 0xC1900101 is a generic rollback code, and usually indicates that an incompatible driver is present. The incompatible driver can cause blue screens, system hangs, and unexpected reboots. Analysis of supplemental log files is often helpful, such as:
|
A frequently observed [result code](upgrade-error-codes.md#result-codes) is 0xC1900101. This result code can be thrown at any stage of the upgrade process, with the exception of the downlevel phase. 0xC1900101 is a generic rollback code, and usually indicates that an incompatible driver is present. The incompatible driver can cause blue screens, system hangs, and unexpected reboots. Analysis of supplemental log files is often helpful, such as:
|
||||||
|
|
||||||
- The minidump file: $Windows.~bt\Sources\Rollback\setupmem.dmp,
|
- The minidump file: $Windows.~bt\Sources\Rollback\setupmem.dmp,
|
||||||
- Event logs: $Windows.~bt\Sources\Rollback\*.evtx
|
- Event logs: $Windows.~bt\Sources\Rollback\*.evtx
|
||||||
@ -38,251 +40,16 @@ To resolve a rollback that was caused by driver conflicts, try running setup usi
|
|||||||
|
|
||||||
See the following general troubleshooting procedures associated with a result code of 0xC1900101:<br /><br />
|
See the following general troubleshooting procedures associated with a result code of 0xC1900101:<br /><br />
|
||||||
|
|
||||||
<table border="1" cellspacing="0" cellpadding="0">
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
| Code | Mitigation | Cause |
|
||||||
|
| :--- | :--- | :--- |
|
||||||
<table cellspacing="0" cellpadding="0">
|
| 0xC1900101 - 0x20004 | Uninstall antivirus applications.<br>Remove all unused SATA devices. <br>Remove all unused devices and drivers. <br>Update drivers and BIOS. | Windows Setup encountered an error during the SAFE_OS with the INSTALL_RECOVERY_ENVIRONMENT operation. <br>This is generally caused by out-of-date drivers. |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
| 0xC1900101 - 0x2000c | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.<br> Contact your hardware vendor to obtain updated device drivers.<br> Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. | Windows Setup encountered an unspecified error during Wim apply in the WinPE phase.<br> This is generally caused by out-of-date drivers |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x20004
|
| 0xC1900101 - 0x20017 | Ensure that all that drivers are updated.<br>Open the Setuperr.log and Setupact.log files in the %windir%\Panther directory, and then locate the problem drivers.<br>For more information, see [Windows Vista, Windows 7, Windows Server 2008 R2, Windows 8.1, and Windows 10 setup log file locations](https://support.microsoft.com/en-us/help/927521/windows-vista-windows-7-windows-server-2008-r2-windows-8-1-and-windows).<br>Update or uninstall the problem drivers. | A driver has caused an illegal operation.<br>Windows was not able to migrate the driver, resulting in a rollback of the operating system.<br>This is a SafeOS boot failure, typically caused by drivers or non-Microsoft disk encryption software. |
|
||||||
</table>
|
| 0xC1900101 - 0x30018 | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.<br>Contact your hardware vendor to obtain updated device drivers.<br>Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. | A device driver has stopped responding to setup.exe during the upgrade process. |
|
||||||
|
| 0xC1900101 - 0x3000D | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.<br>Update or uninstall the display driver. | Installation failed during the FIRST_BOOT phase while attempting the MIGRATE_DATA operation.<br>This can occur due to a problem with a display driver. |
|
||||||
<table cellspacing="0" cellpadding="0">
|
| 0xC1900101 - 0x4000D | Check supplemental rollback logs for a setupmem.dmp file, or event logs for any unexpected reboots or errors.<br>Review the rollback log and determine the stop code.<br>The rollback log is located in the <strong>$Windows.~BT\Sources\Rollback</strong> folder. An example analysis is shown below. This example is not representative of all cases:<br> <br>Info SP Crash 0x0000007E detected<br>Info SP Module name :<br>Info SP Bugcheck parameter 1 : 0xFFFFFFFFC0000005<br>Info SP Bugcheck parameter 2 : 0xFFFFF8015BC0036A<br>Info SP Bugcheck parameter 3 : 0xFFFFD000E5D23728<br>Info SP Bugcheck parameter 4 : 0xFFFFD000E5D22F40<br>Info SP Cannot recover the system.<br>Info SP Rollback: Showing splash window with restoring text: Restoring your previous version of Windows.<br> <br>Typically, there is a dump file for the crash to analyze. If you are not equipped to debug the dump, then attempt the following basic troubleshooting procedures:<br> <br>1. Make sure you have enough disk space.<br>2. If a driver is identified in the bug check message, disable the driver or check with the manufacturer for driver updates.<br>3. Try changing video adapters.<br>4. Check with your hardware vendor for any BIOS updates.<br>5. Disable BIOS memory options such as caching or shadowing. | A rollback occurred due to a driver configuration issue.<br>Installation failed during the second boot phase while attempting the MIGRATE_DATA operation.<br>This can occur because of incompatible drivers. |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
| 0xC1900101 - 0x40017 | Clean boot into Windows, and then attempt the upgrade to Windows 10. For more information, see [How to perform a clean boot in Windows](https://support.microsoft.com/kb/929135).<br> <br>Ensure that you select the option to "Download and install updates (recommended)." <br> <br><b>Computers that run Citrix VDA</b> <br>You may see this message after you upgrade a computer from Windows 10, version 1511 to Windows 10, version 1607. After the second system restart, the system generates this error and then rolls back to the previous version. This problem has also been observed in upgrades to Windows 8.1 and Windows 8. <br> <br>This problem occurs because the computer has Citrix Virtual Delivery Agent (VDA) installed. Citrix VDA installs device drivers and a file system filter driver (CtxMcsWbc). This Citrix filter driver prevents the upgrade from writing changes to the disk, so the upgrade cannot complete and the system rolls back. <br> <br>**Resolution**<br> <br>To resolve this problem, install [Cumulative update for Windows 10 Version 1607 and Windows Server 2016: November 8, 2016](https://support.microsoft.com/help/3200970/cumulative-update-for-windows-10-version-1607-and-windows-server-2016).<br> <br>You can work around this problem in two ways:<br> <br>**Workaround 1**<br> <br>1. Use the VDA setup application (VDAWorkstationSetup_7.11) to uninstall Citrix VDA.<br>2. Run the Windows upgrade again.<br>3. Reinstall Citrix VDA.<br> <br>**Workaround 2**<br> <br>If you cannot uninstall Citrix VDA, follow these steps to work around this problem: <br> <br>1. In Registry Editor, go to the following subkey:<br> **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\CtxMcsWbc**<br>2. Change the value of the **Start** entry from **0** to **4**. This change disables the Citrix MCS cache service.<br>3. Go to the following subkey:<br> **HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}**<br>4. Delete the **CtxMcsWbc** entry.<br>5. Restart the computer, and then try the upgrade again.<br> <br>**Non-Microsoft information disclaimer** <br>The non-Microsoft products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. | Windows 10 upgrade failed after the second reboot.<br>This is usually caused by a faulty driver. For example: antivirus filter drivers or encryption drivers. |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Windows Setup encountered an error during the SAFE_OS with the INSTALL_RECOVERY_ENVIRONMENT operation.
|
|
||||||
<br>This is generally caused by out-of-date drivers.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Uninstall antivirus applications.
|
|
||||||
<br>Remove all unused SATA devices.
|
|
||||||
<br>Remove all unused devices and drivers.
|
|
||||||
<br>Update drivers and BIOS.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x2000c
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Windows Setup encountered an unspecified error during Wim apply in the WinPE phase.
|
|
||||||
<br>This is generally caused by out-of-date drivers.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
|
|
||||||
<br>Contact your hardware vendor to obtain updated device drivers.
|
|
||||||
<br>Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x20017
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>A driver has caused an illegal operation.
|
|
||||||
<br>Windows was not able to migrate the driver, resulting in a rollback of the operating system.
|
|
||||||
<br>This is a SafeOS boot failure, typically caused by drivers or non-Microsoft disk encryption software.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
Ensure that all that drivers are updated.
|
|
||||||
<br />Open the Setuperr.log and Setupact.log files in the %windir%\Panther directory, and then locate the problem drivers.
|
|
||||||
<br />For more information, see <a href="https://support.microsoft.com/help/927521/windows-vista-windows-7-windows-server-2008-r2-windows-8-1-and-windows">Windows Vista, Windows 7, Windows Server 2008 R2, Windows 8.1, and Windows 10 setup log file locations</a>.
|
|
||||||
<br>Update or uninstall the problem drivers.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x30018
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>A device driver has stopped responding to setup.exe during the upgrade process.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
|
|
||||||
<br>Contact your hardware vendor to obtain updated device drivers.
|
|
||||||
<br>Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x3000D
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Installation failed during the FIRST_BOOT phase while attempting the MIGRATE_DATA operation.
|
|
||||||
<br>This can occur due to a problem with a display driver.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
|
|
||||||
<br>Update or uninstall the display driver.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x4000D
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>A rollback occurred due to a driver configuration issue.
|
|
||||||
<br>Installation failed during the second boot phase while attempting the MIGRATE_DATA operation.
|
|
||||||
<br>This can occur because of incompatible drivers.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
Check supplemental rollback logs for a setupmem.dmp file, or event logs for any unexpected reboots or errors.
|
|
||||||
<br>Review the rollback log and determine the stop code.
|
|
||||||
<br>The rollback log is located in the <strong>$Windows.~BT\Sources\Rollback</strong> folder. An example analysis is shown below. This example is not representative of all cases:
|
|
||||||
<pre>
|
|
||||||
Info SP Crash 0x0000007E detected
|
|
||||||
Info SP Module name :
|
|
||||||
Info SP Bugcheck parameter 1 : 0xFFFFFFFFC0000005
|
|
||||||
Info SP Bugcheck parameter 2 : 0xFFFFF8015BC0036A
|
|
||||||
Info SP Bugcheck parameter 3 : 0xFFFFD000E5D23728
|
|
||||||
Info SP Bugcheck parameter 4 : 0xFFFFD000E5D22F40
|
|
||||||
Info SP Cannot recover the system.
|
|
||||||
Info SP Rollback: Showing splash window with restoring text: Restoring your previous version of Windows.</pre>
|
|
||||||
|
|
||||||
Typically, there is a dump file for the crash to analyze. If you are not equipped to debug the dump, then attempt the following basic troubleshooting procedures:<br>
|
|
||||||
|
|
||||||
1. Make sure you have enough disk space.<br>
|
|
||||||
2. If a driver is identified in the bug check message, disable the driver or check with the manufacturer for driver updates.<br>
|
|
||||||
3. Try changing video adapters.<br>
|
|
||||||
4. Check with your hardware vendor for any BIOS updates.<br>
|
|
||||||
5. Disable BIOS memory options such as caching or shadowing.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>0xC1900101 - 0x40017
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>Windows 10 upgrade failed after the second reboot.
|
|
||||||
<br>This is usually caused by a faulty driver. For example: antivirus filter drivers or encryption drivers.
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
<b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
Clean boot into Windows, and then attempt the upgrade to Windows 10. For more information, see [How to perform a clean boot in Windows](https://support.microsoft.com/kb/929135).
|
|
||||||
|
|
||||||
Ensure that you select the option to "Download and install updates (recommended)."
|
|
||||||
|
|
||||||
<b>Computers that run Citrix VDA</b>
|
|
||||||
You may see this message after you upgrade a computer from Windows 10, version 1511 to Windows 10, version 1607. After the second system restart, the system generates this error and then rolls back to the previous version. This problem has also been observed in upgrades to Windows 8.1 and Windows 8.
|
|
||||||
|
|
||||||
This problem occurs because the computer has Citrix Virtual Delivery Agent (VDA) installed. Citrix VDA installs device drivers and a file system filter driver (CtxMcsWbc). This Citrix filter driver prevents the upgrade from writing changes to the disk, so the upgrade cannot complete and the system rolls back.
|
|
||||||
|
|
||||||
**Resolution**
|
|
||||||
|
|
||||||
To resolve this problem, install [Cumulative update for Windows 10 Version 1607 and Windows Server 2016: November 8, 2016](https://support.microsoft.com/help/3200970/cumulative-update-for-windows-10-version-1607-and-windows-server-2016).
|
|
||||||
|
|
||||||
You can work around this problem in two ways
|
|
||||||
|
|
||||||
**Workaround 1**
|
|
||||||
|
|
||||||
1. Use the VDA setup application (VDAWorkstationSetup_7.11) to uninstall Citrix VDA.
|
|
||||||
1. Run the Windows upgrade again.
|
|
||||||
1. Reinstall Citrix VDA.
|
|
||||||
|
|
||||||
**Workaround 2**
|
|
||||||
|
|
||||||
If you cannot uninstall Citrix VDA, follow these steps to work around this problem:
|
|
||||||
|
|
||||||
1. In Registry Editor, go to the following subkey:
|
|
||||||
```
|
|
||||||
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\CtxMcsWbc
|
|
||||||
```
|
|
||||||
1. Change the value of the **Start** entry from **0** to **4**. This change disables the Citrix MCS cache service.
|
|
||||||
1. Go to the following subkey:
|
|
||||||
```
|
|
||||||
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}
|
|
||||||
```
|
|
||||||
1. Delete the **CtxMcsWbc** entry.
|
|
||||||
1. Restart the computer, and then try the upgrade again.
|
|
||||||
|
|
||||||
> **Third-party information disclaimer**
|
|
||||||
> The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
## 0x800xxxxx
|
## 0x800xxxxx
|
||||||
|
|
||||||
@ -290,223 +57,15 @@ Result codes that start with the digits 0x800 are also important to understand.
|
|||||||
|
|
||||||
See the following general troubleshooting procedures associated with a result code of 0x800xxxxx:
|
See the following general troubleshooting procedures associated with a result code of 0x800xxxxx:
|
||||||
|
|
||||||
<br><table border="1" cellspacing="0" cellpadding="0">
|
| Code | Mitigation | Cause |
|
||||||
|
| :--- | :--- | :--- |
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
| 80040005 - 0x20007 | This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. | An unspecified error occurred with a driver during the SafeOS phase. |
|
||||||
|
| 0x80073BC3 - 0x20009<br>0x80070002 - 0x20009<br>0x80073B92 - 0x20009 | These errors occur during partition analysis and validation, and can be caused by the presence of multiple system partitions. For example, if you installed a new system drive but left the previous system drive connected, this can cause a conflict. To resolve the errors, disconnect or temporarily disable drives that contain the unused system partition. You can reconnect the drive after the upgrade has completed. Alternatively, you can delete the unused system partition. | The requested system device cannot be found, there is a sharing violation, or there are multiple devices matching the identification criteria. |
|
||||||
<table cellspacing="0" cellpadding="0">
|
| 800704B8 - 0x3001A | Disable or uninstall non-Microsoft antivirus applications, disconnect all unnecessary devices, and perform a [clean boot](https://support.microsoft.com/kb/929135). | An extended error has occurred during the first boot phase. |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
| 8007042B - 0x4000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the file, application, or driver that is not able to be migrated. Disconnect, update, remove, or replace the device or object. | The installation failed during the second boot phase while attempting the MIGRATE_DATA operation.<br>This issue can occur due to file system, application, or driver issues. |
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
| 8007001F - 0x3000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the files or registry entries that are blocking data migration.<br> <br>This error can be due to a problem with user profiles. It can occur due to corrupt registry entries under **HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList** or invalid files in the **\\Users** directory.<br> <br>**Note**: If a previous upgrade did not complete, invalid profiles might exist in the **Windows.old\\Users** directory.<br> <br>To repair this error, ensure that deleted accounts are not still present in the Windows registry and that files under the \\Users directory are valid. Delete the invalid files or user profiles that are causing this error. The specific files and profiles that are causing the error will be recorded in the Windows setup log files.| The installation failed in the FIRST_BOOT phase with an error during MIGRATE_DATA operation. |
|
||||||
80040005 - 0x20007
|
| 8007001F - 0x4000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the device that is not functioning properly. Disconnect, update, or replace the device. | General failure, a device attached to the system is not functioning. |
|
||||||
|
| 8007042B - 0x4001E | This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. | The installation failed during the second boot phase while attempting the PRE_OOBE operation. |
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
An unspecified error occurred with a driver during the SafeOS phase.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
0x80073BC3 - 0x20009<br>
|
|
||||||
0x80070002 - 0x20009<br>
|
|
||||||
0x80073B92 - 0x20009
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
The requested system device cannot be found, there is a sharing violation, or there are multiple devices matching the identification criteria.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
These errors occur during partition analysis and validation, and can be caused by the presence of multiple system partitions. For example, if you installed a new system drive but left the previous system drive connected, this can cause a conflict. To resolve the errors, disconnect or temporarily disable drives that contain the unused system partition. You can reconnect the drive after the upgrade has completed. Alternatively, you can delete the unused system partition.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
800704B8 - 0x3001A
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
An extended error has occurred during the first boot phase.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
Disable or uninstall non-Microsoft antivirus applications, disconnect all unnecessary devices, and perform a [clean boot](https://support.microsoft.com/kb/929135).
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
8007042B - 0x4000D
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
The installation failed during the second boot phase while attempting the MIGRATE_DATA operation.
|
|
||||||
<br>This issue can occur due to file system, application, or driver issues.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
[Analyze log files](log-files.md#analyze-log-files) in order to determine the file, application, or driver that is not able to be migrated. Disconnect, update, remove, or replace the device or object.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
8007001F - 0x3000D
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
The installation failed in the FIRST_BOOT phase with an error during MIGRATE_DATA operation.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
[Analyze log files](log-files.md#analyze-log-files) in order to determine the files or registry entries that are blocking data migration.
|
|
||||||
|
|
||||||
This error can be due to a problem with user profiles. It can occur due to corrupt registry entries under **HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList** or invalid files in the **\\Users** directory.
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> If a previous upgrade did not complete, invalid profiles might exist in the **Windows.old\\Users** directory.
|
|
||||||
|
|
||||||
To repair this error, ensure that deleted accounts are not still present in the Windows registry and that files under the \\Users directory are valid. Delete the invalid files or user profiles that are causing this error. The specific files and profiles that are causing the error will be recorded in the Windows setup log files.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
8007001F - 0x4000D
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
General failure, a device attached to the system is not functioning.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
[Analyze log files](log-files.md#analyze-log-files) in order to determine the device that is not functioning properly. Disconnect, update, or replace the device.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
<tr><td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Code</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
8007042B - 0x4001E
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Cause</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
The installation failed during the second boot phase while attempting the PRE_OOBE operation.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
|
|
||||||
<td align="left" valign="top" style='border:solid #000000 1.0pt;'>
|
|
||||||
|
|
||||||
<table cellspacing="0" cellpadding="0">
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'><b>Mitigation</b>
|
|
||||||
<tr><td style='padding:0in 4pt 0in 4pt;border:dotted #FFFFFF 0.0pt;'>
|
|
||||||
|
|
||||||
This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution.
|
|
||||||
|
|
||||||
</table>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
## Other result codes
|
## Other result codes
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ ms.topic: article
|
|||||||
|
|
||||||
If a Windows 10 upgrade is not successful, it can be very helpful to understand *when* an error occurred in the upgrade process.
|
If a Windows 10 upgrade is not successful, it can be very helpful to understand *when* an error occurred in the upgrade process.
|
||||||
|
|
||||||
Briefly, the upgrade process consists of four phases: **Downlevel**, **SafeOS**, **First boot**, and **Second boot**. The computer will reboot once between each phase. Note: Progress is tracked in the registry during the upgrade process using the following key: **HKLM\System\Setup\mosetup\volatile\SetupProgress**. This key is volatile and only present during the upgrade process; it contains a binary value in the range 0-100.
|
Briefly, the upgrade process consists of four phases that are controlled by [Windows Setup](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-technical-reference): **Downlevel**, **SafeOS**, **First boot**, and **Second boot**. The computer will reboot once between each phase. Note: Progress is tracked in the registry during the upgrade process using the following key: **HKLM\System\Setup\mosetup\volatile\SetupProgress**. This key is volatile and only present during the upgrade process; it contains a binary value in the range 0-100.
|
||||||
|
|
||||||
These phases are explained in greater detail [below](#the-windows-10-upgrade-process). First, let's summarize the actions performed during each phase because this affects the type of errors that can be encountered.
|
These phases are explained in greater detail [below](#the-windows-10-upgrade-process). First, let's summarize the actions performed during each phase because this affects the type of errors that can be encountered.
|
||||||
|
|
||||||
|
@ -25,6 +25,7 @@ To successfully deploy the Windows 10 operating system in your organization, it
|
|||||||
|
|
||||||
The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories.
|
The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories.
|
||||||
- Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and Microsoft Endpoint Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home).
|
- Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and Microsoft Endpoint Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home).
|
||||||
|
- Note: Once you have deployed Windows 10 in your organization, it is important to stay up to date by [creating a deployment plan](update/create-deployment-plan.md) for Windows 10 feature updates.
|
||||||
- Dynamic deployment methods enable you to configure applications and settings for specific use cases.
|
- Dynamic deployment methods enable you to configure applications and settings for specific use cases.
|
||||||
- Traditional deployment methods use existing tools to deploy operating system images.<br>
|
- Traditional deployment methods use existing tools to deploy operating system images.<br>
|
||||||
|
|
||||||
|
@ -1,156 +1,191 @@
|
|||||||
### YamlMime:YamlDocument
|
### YamlMime:Hub
|
||||||
|
|
||||||
documentType: LandingData
|
|
||||||
|
|
||||||
title: Windows Privacy
|
title: Windows Privacy
|
||||||
|
summary: Get ready for General Data Protection Regulation (GDPR) by viewing and configuring Windows diagnostic data in your organization.
|
||||||
|
brand: m365
|
||||||
|
|
||||||
metadata:
|
metadata:
|
||||||
|
|
||||||
document_id:
|
|
||||||
|
|
||||||
title: Windows Privacy
|
title: Windows Privacy
|
||||||
|
|
||||||
description: Learn about how privacy is managed in Windows.
|
description: Learn about how privacy is managed in Windows.
|
||||||
|
services: windows
|
||||||
keywords: Windows 10, Windows Server, Windows Server 2016, privacy, GDPR, compliance, endpoints
|
ms.product: windows
|
||||||
|
ms.topic: hub-page # Required
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
author: danihalfin
|
||||||
|
ms.author: daniha
|
||||||
|
manager: dansimp
|
||||||
|
ms.date: 02/21/2019 #Required; mm/dd/yyyy format.
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
|
||||||
author: danihalfin
|
# highlightedContent section (optional)
|
||||||
|
# Maximum of 8 items
|
||||||
ms.author: daniha
|
highlightedContent:
|
||||||
|
# itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
|
||||||
ms.date: 04/25/2018
|
|
||||||
|
|
||||||
ms.topic: conceptual
|
|
||||||
|
|
||||||
audience: ITPro
|
|
||||||
|
|
||||||
manager: dansimp
|
|
||||||
|
|
||||||
ms.collection: M365-security-compliance
|
|
||||||
|
|
||||||
ms.devlang: na
|
|
||||||
|
|
||||||
sections:
|
|
||||||
|
|
||||||
- items:
|
|
||||||
|
|
||||||
- type: markdown
|
|
||||||
|
|
||||||
text: Get ready for General Data Protection Regulation (GDPR) by viewing and configuring Windows diagnostic data in your organization.
|
|
||||||
|
|
||||||
- items:
|
|
||||||
|
|
||||||
- type: list
|
|
||||||
|
|
||||||
style: cards
|
|
||||||
|
|
||||||
className: cardsM
|
|
||||||
|
|
||||||
columns: 3
|
|
||||||
|
|
||||||
items:
|
|
||||||
|
|
||||||
- href: \windows\privacy\gdpr-it-guidance
|
|
||||||
|
|
||||||
html: <p>Learn about GDPR and how Microsoft helps you get started towards compliance</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_advanced.svg
|
|
||||||
|
|
||||||
title: Start with GDPR basics
|
|
||||||
|
|
||||||
- href: \windows\privacy\configure-windows-diagnostic-data-in-your-organization
|
|
||||||
|
|
||||||
html: <p>Make informed decisions about how you can configure diagnostic data in your organization</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_filter.svg
|
|
||||||
|
|
||||||
title: Configure Windows diagnostic data
|
|
||||||
|
|
||||||
- href: \windows\privacy\diagnostic-data-viewer-overview
|
|
||||||
|
|
||||||
html: <p>Review the Windows diagnostic data sent to Microsoft by device in your organization</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_investigate.svg
|
|
||||||
|
|
||||||
title: View Windows diagnostic data
|
|
||||||
|
|
||||||
- title: Understand Windows diagnostic data in Windows 10
|
|
||||||
|
|
||||||
items:
|
items:
|
||||||
|
# Card
|
||||||
|
- title: Start with GDPR basics
|
||||||
|
itemType: get-started
|
||||||
|
url: gdpr-it-guidance.md
|
||||||
|
# Card
|
||||||
|
- title: Configure Windows diagnostic data
|
||||||
|
itemType: how-to-guide
|
||||||
|
url: configure-windows-diagnostic-data-in-your-organization.md
|
||||||
|
# Card
|
||||||
|
- title: View Windows diagnostic data
|
||||||
|
itemType: how-to-guide
|
||||||
|
url: diagnostic-data-viewer-overview.md
|
||||||
|
|
||||||
- type: paragraph
|
# productDirectory section (optional)
|
||||||
|
productDirectory:
|
||||||
|
title: Understand Windows diagnostic data in Windows 10
|
||||||
|
summary: For the latest Windows 10 version, learn more about what Windows diagnostic data is collected at various diagnostics levels.
|
||||||
|
items:
|
||||||
|
# Card
|
||||||
|
- title: Basic level events and fields
|
||||||
|
# imageSrc should be square in ratio with no whitespace
|
||||||
|
imageSrc: https://docs.microsoft.com/media/common/i_extend.svg
|
||||||
|
summary: Learn more about basic Windows diagnostic data events and fields collected.
|
||||||
|
url: basic-level-windows-diagnostic-events-and-fields.md
|
||||||
|
# Card
|
||||||
|
- title: Enhanced level events and fields
|
||||||
|
imageSrc: https://docs.microsoft.com/media/common/i_delivery.svg
|
||||||
|
summary: Learn more about Windows diagnostic data events and fields used by Windows Analytics.
|
||||||
|
url: enhanced-diagnostic-data-windows-analytics-events-and-fields.md
|
||||||
|
# Card
|
||||||
|
- title: Full level data categories
|
||||||
|
imageSrc: https://docs.microsoft.com/media/common/i_get-started.svg
|
||||||
|
summary: Learn more about all Windows diagnostic data collected.
|
||||||
|
url: windows-diagnostic-data.md
|
||||||
|
|
||||||
text: 'For the latest Windows 10 version, learn more about what Windows diagnostic data is collected at various diagnostics levels.'
|
# conceptualContent section (optional)
|
||||||
|
# conceptualContent:
|
||||||
|
# # itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
|
||||||
|
# title: sectiontitle # < 60 chars (optional)
|
||||||
|
# summary: sectionsummary # < 160 chars (optional)
|
||||||
|
# items:
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle1
|
||||||
|
# links:
|
||||||
|
# - url: file1.md OR https://docs.microsoft.com/file1
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext1
|
||||||
|
# - url: file2.md OR https://docs.microsoft.com/file2
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext2
|
||||||
|
# - url: file3.md OR https://docs.microsoft.com/file3
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext3
|
||||||
|
# # footerLink (optional)
|
||||||
|
# footerLink:
|
||||||
|
# url: filefooter.md OR https://docs.microsoft.com/filefooter
|
||||||
|
# text: See more
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle2
|
||||||
|
# links:
|
||||||
|
# - url: file1.md OR https://docs.microsoft.com/file1
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext1
|
||||||
|
# - url: file2.md OR https://docs.microsoft.com/file2
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext2
|
||||||
|
# - url: file3.md OR https://docs.microsoft.com/file3
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext3
|
||||||
|
# # footerLink (optional)
|
||||||
|
# footerLink:
|
||||||
|
# url: filefooter.md OR https://docs.microsoft.com/filefooter
|
||||||
|
# text: See more
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle3
|
||||||
|
# links:
|
||||||
|
# - url: file1.md OR https://docs.microsoft.com/file1
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext1
|
||||||
|
# - url: file2.md OR https://docs.microsoft.com/file2
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext2
|
||||||
|
# - url: file3.md OR https://docs.microsoft.com/file3
|
||||||
|
# itemType: itemType
|
||||||
|
# text: linktext3
|
||||||
|
# # footerLink (optional)
|
||||||
|
# footerLink:
|
||||||
|
# url: filefooter.md OR https://docs.microsoft.com/filefooter
|
||||||
|
# text: See more
|
||||||
|
|
||||||
- type: list
|
# # tools section (optional)
|
||||||
|
# tools:
|
||||||
|
# title: sectiontitle # < 60 chars (optional)
|
||||||
|
# summary: sectionsummary # < 160 chars (optional)
|
||||||
|
# items:
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle1
|
||||||
|
# # imageSrc should be square in ratio with no whitespace
|
||||||
|
# imageSrc: ./media/index/image1.svg OR https://docs.microsoft.com/media/logos/image1.svg
|
||||||
|
# url: file1.md
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle2
|
||||||
|
# imageSrc: ./media/index/image2.svg OR https://docs.microsoft.com/media/logos/image2.svg
|
||||||
|
# url: file2.md
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle3
|
||||||
|
# imageSrc: ./media/index/image3.svg OR https://docs.microsoft.com/media/logos/image3.svg
|
||||||
|
# url: file3.md
|
||||||
|
|
||||||
style: cards
|
# additionalContent section (optional)
|
||||||
|
# Card with summary style
|
||||||
|
# additionalContent:
|
||||||
|
# # Supports up to 3 sections
|
||||||
|
# sections:
|
||||||
|
# - title: sectiontitle # < 60 chars (optional)
|
||||||
|
# summary: sectionsummary # < 160 chars (optional)
|
||||||
|
# items:
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle1
|
||||||
|
# summary: cardsummary1
|
||||||
|
# url: file1.md OR https://docs.microsoft.com/file1
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle2
|
||||||
|
# summary: cardsummary2
|
||||||
|
# url: file1.md OR https://docs.microsoft.com/file2
|
||||||
|
# # Card
|
||||||
|
# - title: cardtitle3
|
||||||
|
# summary: cardsummary3
|
||||||
|
# url: file1.md OR https://docs.microsoft.com/file3
|
||||||
|
# # footer (optional)
|
||||||
|
# footer: "footertext [linktext](https://docs.microsoft.com/footerfile)"
|
||||||
|
|
||||||
className: cardsM
|
# additionalContent section (optional)
|
||||||
|
# Card with links style
|
||||||
columns: 3
|
additionalContent:
|
||||||
|
# Supports up to 3 sections
|
||||||
items:
|
sections:
|
||||||
|
- items:
|
||||||
- href: \windows\privacy\basic-level-windows-diagnostic-events-and-fields
|
# Card
|
||||||
|
- title: More Windows privacy
|
||||||
html: <p>Learn more about basic Windows diagnostic data events and fields collected</p>
|
links:
|
||||||
|
- text: "Windows 10 & Privacy Compliance: A Guide for IT and Compliance Professionals"
|
||||||
image:
|
url: Windows-10-and-privacy-compliance.md
|
||||||
|
- text: Windows 10 personal data services configuration
|
||||||
src: https://docs.microsoft.com/media/common/i_extend.svg
|
url: windows-personal-data-services-configuration.md
|
||||||
|
- text: Beginning your GDPR journey for Windows 10
|
||||||
title: Basic level events and fields
|
url: gdpr-win10-whitepaper.md
|
||||||
|
# Card
|
||||||
- href: \windows\privacy\enhanced-diagnostic-data-windows-analytics-events-and-fields
|
- title: View and manage Windows 10 connection endpoints
|
||||||
|
links:
|
||||||
html: <p>Learn more about Windows diagnostic data events and fields used by Windows Analytics</p>
|
- text: Manage Windows 10 connection endpoints
|
||||||
|
url: manage-windows-endpoints.md
|
||||||
image:
|
- text: Manage connection endpoints for non-Enterprise editions of Windows 10
|
||||||
|
url: windows-endpoints-2004-non-enterprise-editions.md
|
||||||
src: https://docs.microsoft.com/media/common/i_delivery.svg
|
- text: Manage connections from Windows to Microsoft services
|
||||||
|
url: manage-connections-from-windows-operating-system-components-to-microsoft-services.md
|
||||||
title: Enhanced level events and fields
|
# Card
|
||||||
|
- title: Additional resources
|
||||||
- href: \windows\privacy\windows-diagnostic-data
|
links:
|
||||||
|
- text: Windows 10 on Trust Center
|
||||||
html: <p>Learn more about all Windows diagnostic data collected</p>
|
url: https://www.microsoft.com/en-us/trustcenter/cloudservices/windows10
|
||||||
|
- text: GDPR on Microsoft 365 Compliance solutions
|
||||||
image:
|
url: https://docs.microsoft.com/microsoft-365/compliance/gdpr
|
||||||
|
- text: Support for GDPR Accountability on Service Trust Portal
|
||||||
src: https://docs.microsoft.com/media/common/i_get-started.svg
|
url: https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted
|
||||||
|
# footer (optional)
|
||||||
title: Full level data categories
|
# footer: "footertext [linktext](https://docs.microsoft.com/footerfile)"
|
||||||
|
|
||||||
- items:
|
|
||||||
|
|
||||||
- type: list
|
|
||||||
|
|
||||||
style: cards
|
|
||||||
|
|
||||||
className: cardsL
|
|
||||||
|
|
||||||
items:
|
|
||||||
|
|
||||||
- title: View and manage Windows 10 connection endpoints
|
|
||||||
|
|
||||||
html: <p><a class="barLink" href="/windows/privacy/manage-windows-endpoints">Manage Windows 10 connection endpoints</a></p>
|
|
||||||
|
|
||||||
<p><a class="barLink" href="/windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services">Manage connections from Windows to Microsoft services</a></p>
|
|
||||||
|
|
||||||
- title: Additional resources
|
|
||||||
|
|
||||||
html: <p><a class="barLink" href="https://www.microsoft.com/en-us/trustcenter/cloudservices/windows10">Windows 10 on Trust Center</a></p>
|
|
||||||
|
|
||||||
<p><a class="barLink" href="https://docs.microsoft.com/microsoft-365/compliance/gdpr">GDPR on Microsoft 365 Compliance solutions</a></p>
|
|
||||||
|
|
||||||
<p><a class="barLink" href="https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted">Support for GDPR Accountability on Service Trust Portal</a></p>
|
|
||||||
|
|
@ -1,80 +1,38 @@
|
|||||||
### YamlMime:YamlDocument
|
### YamlMime:Hub
|
||||||
|
|
||||||
documentType: LandingData
|
title: Windows 10 Enterprise Security # < 60 chars
|
||||||
|
summary: Secure corporate data and manage risk. # < 160 chars
|
||||||
title: Windows 10 Enterprise Security
|
# brand: aspnet | azure | dotnet | dynamics | m365 | ms-graph | office | power-bi | power-platform | sql | sql-server | vs | visual-studio | windows | xamarin
|
||||||
|
brand: windows
|
||||||
|
|
||||||
metadata:
|
metadata:
|
||||||
|
title: Windows 10 Enterprise Security # Required; page title displayed in search results. Include the brand. < 60 chars.
|
||||||
document_id:
|
description: Learn about enterprise-grade security features for Windows 10. # Required; article description that is displayed in search results. < 160 chars.
|
||||||
|
services: windows
|
||||||
title: Windows 10 Enterprise Security
|
ms.product: windows
|
||||||
|
ms.topic: hub-page # Required
|
||||||
description: Learn about enterprise-grade security features for Windows 10.
|
ms.collection: M365-security-compliance # Optional; Remove if no collection is used.
|
||||||
|
author: danihalfin #Required; your GitHub user alias, with correct capitalization.
|
||||||
keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3
|
ms.author: daniha #Required; microsoft alias of author; optional team alias.
|
||||||
|
ms.date: 01/08/2018 #Required; mm/dd/yyyy format.
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
|
|
||||||
author: brianlic-msft
|
# productDirectory section (optional)
|
||||||
|
productDirectory:
|
||||||
ms.author: brianlic
|
items:
|
||||||
|
# Card
|
||||||
manager: brianlic
|
- title: Identity and access management
|
||||||
|
# imageSrc should be square in ratio with no whitespace
|
||||||
ms.date: 08/01/2018
|
imageSrc: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
||||||
|
summary: Deploy secure enterprise-grade authentication and access control to protect accounts and data
|
||||||
ms.topic: article
|
url: ./identity-protection/index.md
|
||||||
|
# Card
|
||||||
ms.devlang: na
|
- title: Threat protection
|
||||||
|
imageSrc: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
||||||
sections:
|
summary: Stop cyberthreats and quickly identify and respond to breaches
|
||||||
|
url: ./threat-protection/index.md
|
||||||
- items:
|
# Card
|
||||||
|
- title: Information protection
|
||||||
- type: markdown
|
imageSrc: https://docs.microsoft.com/media/common/i_information-protection.svg
|
||||||
|
summary: Identify and secure critical data to prevent data loss
|
||||||
text: Secure corporate data and manage risk.
|
url: ./information-protection/index.md
|
||||||
|
|
||||||
- items:
|
|
||||||
|
|
||||||
- type: list
|
|
||||||
|
|
||||||
style: cards
|
|
||||||
|
|
||||||
className: cardsM
|
|
||||||
|
|
||||||
columns: 3
|
|
||||||
|
|
||||||
items:
|
|
||||||
|
|
||||||
- href: \windows\security\identity-protection\
|
|
||||||
|
|
||||||
html: <p>Deploy secure enterprise-grade authentication and access control to protect accounts and data</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_identity-protection.svg
|
|
||||||
|
|
||||||
title: Identity and access management
|
|
||||||
|
|
||||||
- href: \windows\security\threat-protection\
|
|
||||||
|
|
||||||
html: <p>Stop cyberthreats and quickly identify and respond to breaches</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_threat-protection.svg
|
|
||||||
|
|
||||||
title: Threat protection
|
|
||||||
|
|
||||||
- href: \windows\security\information-protection\
|
|
||||||
|
|
||||||
html: <p>Identify and secure critical data to prevent data loss</p>
|
|
||||||
|
|
||||||
image:
|
|
||||||
|
|
||||||
src: https://docs.microsoft.com/media/common/i_information-protection.svg
|
|
||||||
|
|
||||||
title: Information protection
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Collect diagnostic data for Update Compliance and Windows Defender Microsoft Defender Antivirus
|
title: Collect diagnostic data for Update Compliance and Windows Defender Microsoft Defender Antivirus
|
||||||
description: Use a tool to collect data to troubleshoot Update Compliance issues when using the Microsoft Defender Antivirus Assessment add in
|
description: Use a tool to collect data to troubleshoot Update Compliance issues when using the Microsoft Defender Antivirus Assessment add in
|
||||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av
|
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -17,13 +17,13 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Collect Update Compliance diagnostic data for Windows Defender AV Assessment
|
# Collect Update Compliance diagnostic data for Microsoft Defender AV Assessment
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in.
|
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in.
|
||||||
|
|
||||||
Before attempting this process, ensure you have read [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md), met all require prerequisites, and taken any other suggested troubleshooting steps.
|
Before attempting this process, ensure you have read [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md), met all require prerequisites, and taken any other suggested troubleshooting steps.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Collect diagnostic data of Microsoft Defender Antivirus
|
title: Collect diagnostic data of Microsoft Defender Antivirus
|
||||||
description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus
|
description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus
|
||||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av
|
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -17,13 +17,13 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Collect Windows Defender AV diagnostic data
|
# Collect Microsoft Defender AV diagnostic data
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV.
|
This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV.
|
||||||
|
|
||||||
On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps:
|
On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps:
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Manage Windows Defender in your business
|
title: Manage Windows Defender in your business
|
||||||
description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Windows Defender AV
|
description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Microsoft Defender AV
|
||||||
keywords: group policy, gpo, config manager, sccm, scep, powershell, wmi, intune, defender, antivirus, antimalware, security, protection
|
keywords: group policy, gpo, config manager, sccm, scep, powershell, wmi, intune, defender, antivirus, antimalware, security, protection
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure scanning options for Windows Defender AV
|
title: Configure scanning options for Microsoft Defender AV
|
||||||
description: You can configure Windows Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files).
|
description: You can configure Microsoft Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files).
|
||||||
keywords: advanced scans, scanning, email, archive, zip, rar, archive, reparse scanning
|
keywords: advanced scans, scanning, email, archive, zip, rar, archive, reparse scanning
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -34,7 +34,7 @@ You can [specify how long the file should be prevented from running](configure-c
|
|||||||
When Microsoft Defender Antivirus encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend applies heuristics, machine learning, and automated analysis of the file to determine whether the files are malicious or clean.
|
When Microsoft Defender Antivirus encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend applies heuristics, machine learning, and automated analysis of the file to determine whether the files are malicious or clean.
|
||||||
|
|
||||||
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
||||||

|

|
||||||
|
|
||||||
In Windows 10, version 1803, block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
In Windows 10, version 1803, block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure the Windows Defender AV cloud block timeout period
|
title: Configure the Microsoft Defender AV cloud block timeout period
|
||||||
description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination.
|
description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination.
|
||||||
keywords: Microsoft Defender Antivirus, antimalware, security, defender, cloud, timeout, block, period, seconds
|
keywords: Microsoft Defender Antivirus, antimalware, security, defender, cloud, timeout, block, period, seconds
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure how users can interact with Windows Defender AV
|
title: Configure how users can interact with Microsoft Defender AV
|
||||||
description: Configure how end-users interact with Windows Defender AV, what notifications they see, and if they can override settings.
|
description: Configure how end-users interact with Microsoft Defender AV, what notifications they see, and if they can override settings.
|
||||||
keywords: endpoint, user, interaction, notifications, ui lockdown mode, headless mode, hide interface
|
keywords: endpoint, user, interaction, notifications, ui lockdown mode, headless mode, hide interface
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Set up exclusions for Windows Defender AV scans
|
title: Set up exclusions for Microsoft Defender AV scans
|
||||||
description: You can exclude files (including files modified by specified processes) and folders from being scanned by Windows Defender AV. Validate your exclusions with PowerShell.
|
description: You can exclude files (including files modified by specified processes) and folders from being scanned by Microsoft Defender AV. Validate your exclusions with PowerShell.
|
||||||
keywords:
|
keywords:
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -140,7 +140,7 @@ All files under a folder (including files in subdirectories), or a specific file
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
||||||
|
|
||||||
For example, the following code snippet would cause Windows Defender AV scans to exclude any file with the `.test` file extension:
|
For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file with the `.test` file extension:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Add-MpPreference -ExclusionExtension ".test"
|
Add-MpPreference -ExclusionExtension ".test"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure local overrides for Windows Defender AV settings
|
title: Configure local overrides for Microsoft Defender AV settings
|
||||||
description: Enable or disable users from locally changing settings in Windows Defender AV.
|
description: Enable or disable users from locally changing settings in Microsoft Defender AV.
|
||||||
keywords: local override, local policy, group policy, gpo, lockdown,merge, lists
|
keywords: local override, local policy, group policy, gpo, lockdown,merge, lists
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -101,7 +101,7 @@ Remove items from the list | `Remove-MpPreference`
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
>If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list.
|
||||||
|
|
||||||
For example, the following code snippet would cause Windows Defender AV scans to exclude any file that is opened by the specified process:
|
For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file that is opened by the specified process:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Add-MpPreference -ExclusionProcess "c:\internal\test.exe"
|
Add-MpPreference -ExclusionProcess "c:\internal\test.exe"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Enable and configure Microsoft Defender Antivirus protection features
|
title: Enable and configure Microsoft Defender Antivirus protection features
|
||||||
description: Enable behavior-based, heuristic, and real-time protection in Windows Defender AV.
|
description: Enable behavior-based, heuristic, and real-time protection in Microsoft Defender AV.
|
||||||
keywords: heuristic, machine-learning, behavior monitor, real-time protection, always-on, Microsoft Defender Antivirus, antimalware, security, defender
|
keywords: heuristic, machine-learning, behavior monitor, real-time protection, always-on, Microsoft Defender Antivirus, antimalware, security, defender
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -44,7 +44,7 @@ This guide describes how to configure your VMs for optimal protection and perfor
|
|||||||
You can also download the whitepaper [Microsoft Defender Antivirus on Virtual Desktop Infrastructure](https://demo.wd.microsoft.com/Content/wdav-testing-vdi-ssu.pdf), which looks at the new shared security intelligence update feature, alongside performance testing and guidance on how you can test antivirus performance on your own VDI.
|
You can also download the whitepaper [Microsoft Defender Antivirus on Virtual Desktop Infrastructure](https://demo.wd.microsoft.com/Content/wdav-testing-vdi-ssu.pdf), which looks at the new shared security intelligence update feature, alongside performance testing and guidance on how you can test antivirus performance on your own VDI.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.<br/>There are performance and feature improvements to the way in which Windows Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607.
|
> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.<br/>There are performance and feature improvements to the way in which Microsoft Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607.
|
||||||
|
|
||||||
### Set up a dedicated VDI file share
|
### Set up a dedicated VDI file share
|
||||||
|
|
||||||
@ -194,7 +194,7 @@ If you would prefer to do everything manually, this what you would need to do to
|
|||||||
|
|
||||||
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
|
Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Windows Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan.
|
The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Microsoft Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan.
|
||||||
|
|
||||||
See [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) for other configuration options available for scheduled scans.
|
See [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) for other configuration options available for scheduled scans.
|
||||||
|
|
||||||
@ -219,7 +219,7 @@ Sometimes, Microsoft Defender Antivirus notifications may be sent to or persist
|
|||||||
|
|
||||||
3. Click **OK**.
|
3. Click **OK**.
|
||||||
|
|
||||||
This prevents notifications from Windows Defender AV appearing in the action center on Windows 10 when scans or remediation is performed.
|
This prevents notifications from Microsoft Defender AV appearing in the action center on Windows 10 when scans or remediation is performed.
|
||||||
|
|
||||||
### Disable scans after an update
|
### Disable scans after an update
|
||||||
|
|
||||||
@ -253,7 +253,7 @@ This forces a scan if the VM has missed two or more consecutive scheduled scans.
|
|||||||
|
|
||||||
2. Click **OK**.
|
2. Click **OK**.
|
||||||
|
|
||||||
This hides the entire Windows Defender AV user interface from users.
|
This hides the entire Microsoft Defender AV user interface from users.
|
||||||
|
|
||||||
### Exclusions
|
### Exclusions
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ ms.custom: nextgen
|
|||||||
> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
> The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates.
|
||||||
|
|
||||||
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
||||||

|

|
||||||
|
|
||||||
You can enable or disable Microsoft Defender Antivirus cloud-delivered protection with Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
You can enable or disable Microsoft Defender Antivirus cloud-delivered protection with Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app.
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ By default, Microsoft Defender Antivirus will enable itself on a Windows 10 devi
|
|||||||
|
|
||||||
If Microsoft Defender Antivirus is enabled, the usual options will appear to configure it on that device:
|
If Microsoft Defender Antivirus is enabled, the usual options will appear to configure it on that device:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
||||||
|
|
||||||
@ -47,7 +47,7 @@ Underneath any third party AV products, a new link will appear as **Microsoft De
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Sliding the switch to **On** will show the standard Windows Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -129,9 +129,9 @@ For more information, see [Windows Defender WMIv2 APIs](https://docs.microsoft.c
|
|||||||
|
|
||||||
## Allow ad hoc changes to protection based on cloud-delivered protection
|
## Allow ad hoc changes to protection based on cloud-delivered protection
|
||||||
|
|
||||||
Windows Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates.
|
Microsoft Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates.
|
||||||
|
|
||||||
If you have enabled cloud-delivered protection, Windows Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Windows Defender AV to automatically receive that protection update. Other important protection updates can also be applied.
|
If you have enabled cloud-delivered protection, Microsoft Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Microsoft Defender AV to automatically receive that protection update. Other important protection updates can also be applied.
|
||||||
|
|
||||||
### Use Group Policy to automatically download recent updates based on cloud-delivered protection
|
### Use Group Policy to automatically download recent updates based on cloud-delivered protection
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Apply Windows Defender AV protection updates to out of date endpoints
|
title: Apply Microsoft Defender AV protection updates to out of date endpoints
|
||||||
description: Define when and how updates should be applied for endpoints that have not updated in a while.
|
description: Define when and how updates should be applied for endpoints that have not updated in a while.
|
||||||
keywords: updates, protection, out-of-date, outdated, old, catch-up
|
keywords: updates, protection, out-of-date, outdated, old, catch-up
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
@ -56,7 +56,7 @@ If Microsoft Defender Antivirus did not download protection updates for a specif
|
|||||||
|
|
||||||
4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates**.
|
4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates**.
|
||||||
|
|
||||||
5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to check for and download the latest protection update.
|
5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to check for and download the latest protection update.
|
||||||
|
|
||||||
6. Click **OK**.
|
6. Click **OK**.
|
||||||
|
|
||||||
@ -96,11 +96,11 @@ You can also specify the number of days after which Microsoft Defender Antivirus
|
|||||||
|
|
||||||
5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings:
|
5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings:
|
||||||
|
|
||||||
1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider spyware Security intelligence to be out-of-date.
|
1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider spyware Security intelligence to be out-of-date.
|
||||||
|
|
||||||
2. Click **OK**.
|
2. Click **OK**.
|
||||||
|
|
||||||
3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider virus Security intelligence to be out-of-date.
|
3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider virus Security intelligence to be out-of-date.
|
||||||
|
|
||||||
4. Click **OK**.
|
4. Click **OK**.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Manage how and where Windows Defender AV receives updates
|
title: Manage how and where Microsoft Defender AV receives updates
|
||||||
description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates.
|
description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates.
|
||||||
keywords: updates, security baselines, protection, fallback order, ADL, MMPC, UNC, file path, share, wsus
|
keywords: updates, security baselines, protection, fallback order, ADL, MMPC, UNC, file path, share, wsus
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Define how mobile devices are updated by Windows Defender AV
|
title: Define how mobile devices are updated by Microsoft Defender AV
|
||||||
description: Manage how mobile devices, such as laptops, should be updated with Windows Defender AV protection updates.
|
description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender AV protection updates.
|
||||||
keywords: updates, protection, schedule updates, battery, mobile device, laptop, notebook, opt-in, microsoft update, wsus, override
|
keywords: updates, protection, schedule updates, battery, mobile device, laptop, notebook, opt-in, microsoft update, wsus, override
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Next-generation protection in Windows 10, Windows Server 2016, and Windows Server 2019
|
title: Next-generation protection in Windows 10, Windows Server 2016, and Windows Server 2019
|
||||||
description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016
|
description: Learn how to manage, configure, and use Microsoft Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016
|
||||||
keywords: Microsoft Defender Antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security
|
keywords: Microsoft Defender Antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Antivirus on Windows Server 2016 and 2019
|
title: Microsoft Defender Antivirus on Windows Server 2016 and 2019
|
||||||
description: Enable and configure Windows Defender AV on Windows Server 2016 and 2019
|
description: Enable and configure Microsoft Defender AV on Windows Server 2016 and 2019
|
||||||
keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012
|
keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -91,7 +91,7 @@ To use PowerShell to install Microsoft Defender Antivirus, run the following cmd
|
|||||||
Install-WindowsFeature -Name Windows-Defender
|
Install-WindowsFeature -Name Windows-Defender
|
||||||
```
|
```
|
||||||
|
|
||||||
Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Windows Defender AV Events](troubleshoot-microsoft-defender-antivirus.md).
|
Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender AV Events](troubleshoot-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
|
|
||||||
## Verify Microsoft Defender Antivirus is running
|
## Verify Microsoft Defender Antivirus is running
|
||||||
@ -190,14 +190,14 @@ If you determine you do want to uninstall Microsoft Defender Antivirus, follow t
|
|||||||
|
|
||||||
If you unselect **Windows Defender** by itself under the **Windows Defender Features** section, you will be prompted to remove the interface option **GUI for Windows Defender**.
|
If you unselect **Windows Defender** by itself under the **Windows Defender Features** section, you will be prompted to remove the interface option **GUI for Windows Defender**.
|
||||||
|
|
||||||
Windows Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature.
|
Microsoft Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature.
|
||||||
|
|
||||||
### Uninstall Microsoft Defender Antivirus using PowerShell
|
### Uninstall Microsoft Defender Antivirus using PowerShell
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You can't uninstall the Windows Security app, but you can disable the interface with these instructions.
|
>You can't uninstall the Windows Security app, but you can disable the interface with these instructions.
|
||||||
|
|
||||||
The following PowerShell cmdlet will also uninstall Windows Defender AV on Windows Server 2016 or 2019:
|
The following PowerShell cmdlet will also uninstall Microsoft Defender AV on Windows Server 2016 or 2019:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Uninstall-WindowsFeature -Name Windows-Defender
|
Uninstall-WindowsFeature -Name Windows-Defender
|
||||||
@ -216,6 +216,6 @@ Uninstall-WindowsFeature -Name Windows-Defender-GUI
|
|||||||
|
|
||||||
- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
- [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
||||||
|
|
||||||
- [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)
|
- [Configure exclusions in Microsoft Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -48,7 +48,7 @@ To run Microsoft Defender Offline from the endpoint, the user must be logged in
|
|||||||
Microsoft Defender Offline uses the most recent protection updates available on the endpoint; it's updated whenever Windows Defender Antivirus is updated.
|
Microsoft Defender Offline uses the most recent protection updates available on the endpoint; it's updated whenever Windows Defender Antivirus is updated.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Before running an offline scan, you should attempt to update Windows Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
> Before running an offline scan, you should attempt to update Microsoft Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx).
|
||||||
|
|
||||||
See the [Manage Microsoft Defender Antivirus Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) topic for more information.
|
See the [Manage Microsoft Defender Antivirus Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) topic for more information.
|
||||||
|
|
||||||
@ -75,7 +75,7 @@ Microsoft Defender Offline scans are indicated under **Malware remediation statu
|
|||||||
## Configure notifications
|
## Configure notifications
|
||||||
<a name="manage-notifications"></a>
|
<a name="manage-notifications"></a>
|
||||||
|
|
||||||
Microsoft Defender Offline notifications are configured in the same policy setting as other Windows Defender AV notifications.
|
Microsoft Defender Offline notifications are configured in the same policy setting as other Microsoft Defender AV notifications.
|
||||||
|
|
||||||
For more information about notifications in Windows Defender, see the [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) topic.
|
For more information about notifications in Windows Defender, see the [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) topic.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Microsoft Defender Antivirus in the Windows Security app
|
title: Microsoft Defender Antivirus in the Windows Security app
|
||||||
description: With Windows Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks.
|
description: With Microsoft Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks.
|
||||||
keywords: wdav, antivirus, firewall, security, windows
|
keywords: wdav, antivirus, firewall, security, windows
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -27,8 +27,8 @@ In Windows 10, version 1703 and later, the Windows Defender app is part of the W
|
|||||||
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.<br/>If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
> Disabling the Windows Security Center service will not disable Microsoft Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.<br/>If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||||
>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
>It may also prevent Microsoft Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||||
>This will significantly lower the protection of your device and could lead to malware infection.
|
>This will significantly lower the protection of your device and could lead to malware infection.
|
||||||
|
|
||||||
|
|
||||||
@ -108,7 +108,7 @@ This section describes how to perform some of the most common tasks when reviewi
|
|||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats.
|
>If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats.
|
||||||
>If you install another antivirus product, Windows Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md).
|
>If you install another antivirus product, Microsoft Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
|
|
||||||
<a id="exclusions"></a>
|
<a id="exclusions"></a>
|
||||||
|
@ -1,68 +0,0 @@
|
|||||||
|
|
||||||
# [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md)
|
|
||||||
|
|
||||||
## [Windows Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md)
|
|
||||||
|
|
||||||
## [Windows Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md)
|
|
||||||
|
|
||||||
## [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md)
|
|
||||||
### [Use limited periodic scanning in Windows Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Evaluate Microsoft Defender Antivirus protection](evaluate-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Deploy, manage updates, and report on Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md)
|
|
||||||
### [Deploy and enable Microsoft Defender Antivirus](deploy-microsoft-defender-antivirus.md)
|
|
||||||
#### [Deployment guide for VDI environments](deployment-vdi-microsoft-defender-antivirus.md)
|
|
||||||
### [Report on Microsoft Defender Antivirus protection](report-monitor-microsoft-defender-antivirus.md)
|
|
||||||
#### [Troubleshoot Microsoft Defender Antivirus reporting in Update Compliance](troubleshoot-reporting.md)
|
|
||||||
### [Manage updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md)
|
|
||||||
#### [Manage protection and Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md)
|
|
||||||
#### [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md)
|
|
||||||
#### [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md)
|
|
||||||
#### [Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md)
|
|
||||||
#### [Manage updates for mobile devices and VMs](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md)
|
|
||||||
### [Utilize Microsoft cloud-delivered protection](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md)
|
|
||||||
#### [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md)
|
|
||||||
#### [Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure and validate network connections](configure-network-connections-microsoft-defender-antivirus.md)
|
|
||||||
#### [Enable the Block at First Sight feature](configure-block-at-first-sight-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure the cloud block timeout period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
|
|
||||||
#### [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md)
|
|
||||||
#### [Enable and configure always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure end-user interaction with Windows Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md)
|
|
||||||
#### [Prevent users from seeing or interacting with the user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md)
|
|
||||||
#### [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure and validate exclusions in Windows Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)
|
|
||||||
#### [Configure exclusions in Windows Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure scanning options in Windows Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md)
|
|
||||||
### [Configure and run scans](run-scan-microsoft-defender-antivirus.md)
|
|
||||||
### [Review scan results](review-scan-results-microsoft-defender-antivirus.md)
|
|
||||||
### [Run and review the results of a Windows Defender Offline scan](microsoft-defender-offline.md)
|
|
||||||
|
|
||||||
|
|
||||||
## [Review event logs and error codes to troubleshoot issues](troubleshoot-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md)
|
|
||||||
### [Use Group Policy settings to configure and manage Windows Defender AV](use-group-policy-microsoft-defender-antivirus.md)
|
|
||||||
### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Windows Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md)
|
|
||||||
### [Use PowerShell cmdlets to configure and manage Windows Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md)
|
|
||||||
### [Use Windows Management Instrumentation (WMI) to configure and manage Windows Defender AV](use-wmi-microsoft-defender-antivirus.md)
|
|
||||||
### [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender AV](command-line-arguments-microsoft-defender-antivirus.md)
|
|
||||||
|
|
||||||
|
|
@ -44,7 +44,7 @@ In earlier versions of Windows 10, the setting will hide the Windows Defender cl
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Use Group Policy to hide the Windows Defender AV interface from users
|
## Use Group Policy to hide the Microsoft Defender AV interface from users
|
||||||
|
|
||||||
1. On your Group Policy management machine, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and click **Edit**.
|
1. On your Group Policy management machine, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Monitor and report on Microsoft Defender Antivirus protection
|
title: Monitor and report on Microsoft Defender Antivirus protection
|
||||||
description: Use Configuration Manager or security information and event management (SIEM) tools to consume reports, and monitor Windows Defender AV with PowerShell and WMI.
|
description: Use Configuration Manager or security information and event management (SIEM) tools to consume reports, and monitor Microsoft Defender AV with PowerShell and WMI.
|
||||||
keywords: siem, monitor, report, windows defender av
|
keywords: siem, monitor, report, Microsoft Defender AV
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Restore quarantined files in Windows Defender AV
|
title: Restore quarantined files in Microsoft Defender AV
|
||||||
description: You can restore files and folders that were quarantined by Windows Defender AV.
|
description: You can restore files and folders that were quarantined by Microsoft Defender AV.
|
||||||
keywords:
|
keywords:
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
@ -17,7 +17,7 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Restore quarantined files in Windows Defender AV
|
# Restore quarantined files in Microsoft Defender AV
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Review the results of Windows Defender AV scans
|
title: Review the results of Microsoft Defender AV scans
|
||||||
description: Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app
|
description: Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app
|
||||||
keywords: scan results, remediation, full scan, quick scan
|
keywords: scan results, remediation, full scan, quick scan
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Run and customize on-demand scans in Windows Defender AV
|
title: Run and customize on-demand scans in Microsoft Defender AV
|
||||||
description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
|
description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app
|
||||||
keywords: scan, on-demand, dos, intune, instant scan
|
keywords: scan, on-demand, dos, intune, instant scan
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Schedule regular quick and full scans with Windows Defender AV
|
title: Schedule regular quick and full scans with Microsoft Defender AV
|
||||||
description: Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans
|
description: Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans
|
||||||
keywords: quick scan, full scan, quick vs full, schedule scan, daily, weekly, time, scheduled, recurring, regular
|
keywords: quick scan, full scan, quick vs full, schedule scan, daily, weekly, time, scheduled, recurring, regular
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Windows Defender AV event IDs and error codes
|
title: Microsoft Defender AV event IDs and error codes
|
||||||
description: Look up the causes and solutions for Microsoft Defender Antivirus event IDs and errors
|
description: Look up the causes and solutions for Microsoft Defender Antivirus event IDs and errors
|
||||||
keywords: event, error code, siem, logging, troubleshooting, wef, windows event forwarding
|
keywords: event, error code, siem, logging, troubleshooting, wef, windows event forwarding
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Troubleshoot problems with reporting tools for Windows Defender AV
|
title: Troubleshoot problems with reporting tools for Microsoft Defender AV
|
||||||
description: Identify and solve common problems when attempting to report in Windows Defender AV protection status in Update Compliance
|
description: Identify and solve common problems when attempting to report in Microsoft Defender AV protection status in Update Compliance
|
||||||
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av
|
keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -51,9 +51,9 @@ There are three steps to troubleshooting these problems:
|
|||||||
In order for devices to properly show up in Update Compliance, you have to meet certain prerequisites for both the Update Compliance service and for Microsoft Defender Antivirus:
|
In order for devices to properly show up in Update Compliance, you have to meet certain prerequisites for both the Update Compliance service and for Microsoft Defender Antivirus:
|
||||||
|
|
||||||
>[!div class="checklist"]
|
>[!div class="checklist"]
|
||||||
>- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](microsoft-defender-antivirus-compatibility.md) and the endpoint will not be reported in Update Compliance.
|
>- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](microsoft-defender-antivirus-compatibility.md) and the endpoint will not be reported in Update Compliance.
|
||||||
> - [Cloud-delivered protection is enabled](enable-cloud-protection-microsoft-defender-antivirus.md).
|
> - [Cloud-delivered protection is enabled](enable-cloud-protection-microsoft-defender-antivirus.md).
|
||||||
> - Endpoints can [connect to the Windows Defender AV cloud](configure-network-connections-microsoft-defender-antivirus.md#validate-connections-between-your-network-and-the-cloud)
|
> - Endpoints can [connect to the Microsoft Defender AV cloud](configure-network-connections-microsoft-defender-antivirus.md#validate-connections-between-your-network-and-the-cloud)
|
||||||
> - If the endpoint is running Windows 10 version 1607 or earlier, [Windows 10 diagnostic data must be set to the Enhanced level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level).
|
> - If the endpoint is running Windows 10 version 1607 or earlier, [Windows 10 diagnostic data must be set to the Enhanced level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level).
|
||||||
> - It has been 3 days since all requirements have been met
|
> - It has been 3 days since all requirements have been met
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Microsoft Defender Antivirus with Configuration Manager and Intune
|
title: Configure Microsoft Defender Antivirus with Configuration Manager and Intune
|
||||||
description: Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure Windows Defender AV and Endpoint Protection
|
description: Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure Microsoft Defender AV and Endpoint Protection
|
||||||
keywords: scep, intune, endpoint protection, configuration
|
keywords: scep, intune, endpoint protection, configuration
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Use PowerShell cmdlets to configure and run Windows Defender AV
|
title: Use PowerShell cmdlets to configure and run Microsoft Defender AV
|
||||||
description: In Windows 10, you can use PowerShell cmdlets to run scans, update Security intelligence, and change settings in Microsoft Defender Antivirus.
|
description: In Windows 10, you can use PowerShell cmdlets to run scans, update Security intelligence, and change settings in Microsoft Defender Antivirus.
|
||||||
keywords: scan, command line, mpcmdrun, defender
|
keywords: scan, command line, mpcmdrun, defender
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Configure Microsoft Defender Antivirus with WMI
|
title: Configure Microsoft Defender Antivirus with WMI
|
||||||
description: Use WMI scripts to configure Windows Defender AV.
|
description: Use WMI scripts to configure Microsoft Defender AV.
|
||||||
keywords: wmi, scripts, windows management instrumentation, configuration
|
keywords: wmi, scripts, windows management instrumentation, configuration
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
|
@ -25,7 +25,7 @@ ms.custom: nextgen
|
|||||||
Microsoft next-generation technologies in Microsoft Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models.
|
Microsoft next-generation technologies in Microsoft Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models.
|
||||||
|
|
||||||
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/).
|
||||||

|

|
||||||
|
|
||||||
To take advantage of the power and speed of these next-generation technologies, Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhances standard real-time protection, providing arguably the best antivirus defense.
|
To take advantage of the power and speed of these next-generation technologies, Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhances standard real-time protection, providing arguably the best antivirus defense.
|
||||||
|
|
||||||
|
@ -91,8 +91,7 @@ Yes, both the Enterprise Resource domains hosted in the cloud and the Domains ca
|
|||||||
|
|
||||||
### Why does my encryption driver break Microsoft Defender Application Guard?
|
### Why does my encryption driver break Microsoft Defender Application Guard?
|
||||||
|
|
||||||
|
Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT").
|
||||||
Microsoft Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT").
|
|
||||||
|
|
||||||
### Why do the Network Isolation policies in Group Policy and CSP look different?
|
### Why do the Network Isolation policies in Group Policy and CSP look different?
|
||||||
|
|
||||||
|
@ -58,16 +58,16 @@ Informational </br>(Grey) | Alerts that might not be considered harmful to the n
|
|||||||
|
|
||||||
#### Understanding alert severity
|
#### Understanding alert severity
|
||||||
|
|
||||||
Microsoft Defender Antivirus (Windows Defender AV) and Microsoft Defender ATP alert severities are different because they represent different scopes.
|
Microsoft Defender Antivirus (Microsoft Defender AV) and Microsoft Defender ATP alert severities are different because they represent different scopes.
|
||||||
|
|
||||||
The Windows Defender AV threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual machine, if infected.
|
The Microsoft Defender AV threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual machine, if infected.
|
||||||
|
|
||||||
The Microsoft Defender ATP alert severity represents the severity of the detected behavior, the actual risk to the machine but more importantly the potential risk to the organization.
|
The Microsoft Defender ATP alert severity represents the severity of the detected behavior, the actual risk to the machine but more importantly the potential risk to the organization.
|
||||||
|
|
||||||
So, for example:
|
So, for example:
|
||||||
|
|
||||||
- The severity of a Microsoft Defender ATP alert about a Windows Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage.
|
- The severity of a Microsoft Defender ATP alert about a Microsoft Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage.
|
||||||
- An alert about a commercial malware was detected while executing, but blocked and remediated by Windows Defender AV, is categorized as "Low" because it may have caused some damage to the individual machine but poses no organizational threat.
|
- An alert about a commercial malware was detected while executing, but blocked and remediated by Microsoft Defender AV, is categorized as "Low" because it may have caused some damage to the individual machine but poses no organizational threat.
|
||||||
- An alert about malware detected while executing which can pose a threat not only to the individual machine but to the organization, regardless if it was eventually blocked, may be ranked as "Medium" or "High".
|
- An alert about malware detected while executing which can pose a threat not only to the individual machine but to the organization, regardless if it was eventually blocked, may be ranked as "Medium" or "High".
|
||||||
- Suspicious behavioral alerts, which weren't blocked or remediated will be ranked "Low", "Medium" or "High" following the same organizational threat considerations.
|
- Suspicious behavioral alerts, which weren't blocked or remediated will be ranked "Low", "Medium" or "High" following the same organizational threat considerations.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Field numbers match the numbers in the images below.
|
|||||||
>
|
>
|
||||||
> | Portal label | SIEM field name | ArcSight field | Example value | Description |
|
> | Portal label | SIEM field name | ArcSight field | Example value | Description |
|
||||||
> |------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
> |------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||||
> | 1 | AlertTitle | name | Windows Defender AV detected 'Mikatz' high-severity malware | Value available for every Detection. |
|
> | 1 | AlertTitle | name | Microsoft Defender AV detected 'Mikatz' high-severity malware | Value available for every Detection. |
|
||||||
> | 2 | Severity | deviceSeverity | High | Value available for every Detection. |
|
> | 2 | Severity | deviceSeverity | High | Value available for every Detection. |
|
||||||
> | 3 | Category | deviceEventCategory | Malware | Value available for every Detection. |
|
> | 3 | Category | deviceEventCategory | Malware | Value available for every Detection. |
|
||||||
> | 4 | Detection source | sourceServiceName | Antivirus | Microsoft Defender Antivirus or Microsoft Defender ATP. Value available for every Detection. |
|
> | 4 | Detection source | sourceServiceName | Antivirus | Microsoft Defender Antivirus or Microsoft Defender ATP. Value available for every Detection. |
|
||||||
@ -53,13 +53,13 @@ Field numbers match the numbers in the images below.
|
|||||||
> | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based detections. |
|
> | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based detections. |
|
||||||
> | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based detections. |
|
> | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based detections. |
|
||||||
> | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for detections associated with a file or process. |
|
> | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for detections associated with a file or process. |
|
||||||
> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Windows Defender AV detections. |
|
> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Microsoft Defender AV detections. |
|
||||||
> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Windows Defender AV detections. |
|
> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Microsoft Defender AV detections. |
|
||||||
> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Windows Defender AV detections. |
|
> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Microsoft Defender AV detections. |
|
||||||
> | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. |
|
> | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. |
|
||||||
> | 15 | Url | requestUrl | down.esales360.cn | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. |
|
> | 15 | Url | requestUrl | down.esales360.cn | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. |
|
||||||
> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. |
|
> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Microsoft Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. |
|
||||||
> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. |
|
> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Microsoft Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. |
|
||||||
> | 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every Detection. |
|
> | 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every Detection. |
|
||||||
> | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every Detection. |
|
> | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every Detection. |
|
||||||
> | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the event occurred. Value available for every Detection. |
|
> | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the event occurred. Value available for every Detection. |
|
||||||
|
@ -31,7 +31,7 @@ While the features will not block or prevent apps, scripts, or files from being
|
|||||||
|
|
||||||
To find the audited entries, go to **Applications and Services** > **Microsoft** > **Windows** > **Windows Defender** > **Operational**.
|
To find the audited entries, go to **Applications and Services** > **Microsoft** > **Windows** > **Windows Defender** > **Operational**.
|
||||||
|
|
||||||
You can use Windows Defender Advanced Threat Protection to get greater details for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
You can use Microsoft Defender Advanced Threat Protection to get greater details for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
||||||
|
|
||||||
This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer.
|
This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer.
|
||||||
|
|
||||||
|
@ -38,7 +38,7 @@ The Windows Intune security baseline provides a comprehensive set of recommended
|
|||||||
- [Windows security baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-windows)
|
- [Windows security baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-windows)
|
||||||
- [Microsoft Defender ATP baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-defender-atp)
|
- [Microsoft Defender ATP baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-defender-atp)
|
||||||
|
|
||||||
Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls.
|
Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls. To benefit from the latest data on risks and threats and to minimize conflicts as baselines evolve, always apply the latest versions of the baselines across all products as soon as they are released.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Microsoft Defender ATP security baseline has been optimized for physical devices and is currently not recommended for use on virtual machines (VMs) or VDI endpoints. Certain baseline settings can impact remote interactive sessions on virtualized environments.
|
>The Microsoft Defender ATP security baseline has been optimized for physical devices and is currently not recommended for use on virtual machines (VMs) or VDI endpoints. Certain baseline settings can impact remote interactive sessions on virtualized environments.
|
||||||
|
@ -151,7 +151,7 @@ Support for Windows Server, provide deeper insight into activities happening on
|
|||||||
|
|
||||||
1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md).
|
1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md).
|
||||||
|
|
||||||
2. If you're running a third-party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings. Verify that it was configured correctly:
|
2. If you're running a third-party antimalware solution, you'll need to apply the following Microsoft Defender AV passive mode settings. Verify that it was configured correctly:
|
||||||
|
|
||||||
1. Set the following registry entry:
|
1. Set the following registry entry:
|
||||||
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
- Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`
|
||||||
@ -168,11 +168,11 @@ Support for Windows Server, provide deeper insight into activities happening on
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Run the following command to check if Windows Defender AV is installed:
|
3. Run the following command to check if Microsoft Defender AV is installed:
|
||||||
|
|
||||||
```sc.exe query Windefend```
|
```sc.exe query Windefend```
|
||||||
|
|
||||||
If the result is 'The specified service does not exist as an installed service', then you'll need to install Windows Defender AV. For more information, see [Microsoft Defender Antivirus in Windows 10](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10).
|
If the result is 'The specified service does not exist as an installed service', then you'll need to install Microsoft Defender AV. For more information, see [Microsoft Defender Antivirus in Windows 10](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10).
|
||||||
|
|
||||||
|
|
||||||
## Integration with Azure Security Center
|
## Integration with Azure Security Center
|
||||||
|
@ -41,7 +41,7 @@ Group Policy settings that disable local administrator list merging will overrid
|
|||||||
* Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
|
* Microsoft Defender Antivirus **Configure local administrator merge behavior for lists**
|
||||||
* System Center Endpoint Protection **Allow users to add exclusions and overrides**
|
* System Center Endpoint Protection **Allow users to add exclusions and overrides**
|
||||||
|
|
||||||
For more information about disabling local list merging, see [Prevent or allow users to locally modify Windows Defender AV policy settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged).
|
For more information about disabling local list merging, see [Prevent or allow users to locally modify Microsoft Defender AV policy settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged).
|
||||||
|
|
||||||
## Windows Security app
|
## Windows Security app
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 52 KiB After Width: | Height: | Size: 65 KiB |
@ -61,7 +61,7 @@ For more information on these actions, see [Take response action on a file](resp
|
|||||||
|
|
||||||
The file details, incident, malware detection, and file prevalence cards display various attributes about the file.
|
The file details, incident, malware detection, and file prevalence cards display various attributes about the file.
|
||||||
|
|
||||||
You'll see details such as the file’s MD5, the Virus Total detection ratio, and Windows Defender AV detection if available, and the file’s prevalence, both worldwide and within your organizations.
|
You'll see details such as the file’s MD5, the Virus Total detection ratio, and Microsoft Defender AV detection if available, and the file’s prevalence, both worldwide and within your organizations.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -30,13 +30,13 @@ Indicator of compromise (IoCs) matching is an essential feature in every endpoin
|
|||||||
|
|
||||||
Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action as well as the scope of the machine group to apply it to.
|
Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action as well as the scope of the machine group to apply it to.
|
||||||
|
|
||||||
Currently supported sources are the cloud detection engine of Microsoft Defender ATP, the automated investigation and remediation engine, and the endpoint prevention engine (Windows Defender AV).
|
Currently supported sources are the cloud detection engine of Microsoft Defender ATP, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender AV).
|
||||||
|
|
||||||
**Cloud detection engine**<br>
|
**Cloud detection engine**<br>
|
||||||
The cloud detection engine of Microsoft Defender ATP regularly scans collected data and tries to match the indicators you set. When there is a match, action will be taken according to the settings you specified for the IoC.
|
The cloud detection engine of Microsoft Defender ATP regularly scans collected data and tries to match the indicators you set. When there is a match, action will be taken according to the settings you specified for the IoC.
|
||||||
|
|
||||||
**Endpoint prevention engine**<br>
|
**Endpoint prevention engine**<br>
|
||||||
The same list of indicators is honored by the prevention agent. Meaning, if Windows Defender AV is the primary AV configured, the matched indicators will be treated according to the settings. For example, if the action is "Alert and Block", Windows Defender AV will prevent file executions (block and remediate) and a corresponding alert will be raised. On the other hand, if the Action is set to "Allow", Windows Defender AV will not detect nor block the file from being run.
|
The same list of indicators is honored by the prevention agent. Meaning, if Microsoft Defender AV is the primary AV configured, the matched indicators will be treated according to the settings. For example, if the action is "Alert and Block", Microsoft Defender AV will prevent file executions (block and remediate) and a corresponding alert will be raised. On the other hand, if the Action is set to "Allow", Microsoft Defender AV will not detect nor block the file from being run.
|
||||||
|
|
||||||
**Automated investigation and remediation engine**<BR>
|
**Automated investigation and remediation engine**<BR>
|
||||||
The automated investigation and remediation behave the same. If an indicator is set to "Allow", Automated investigation and remediation will ignore a "bad" verdict for it. If set to "Block", Automated investigation and remediation will treat it as "bad".
|
The automated investigation and remediation behave the same. If an indicator is set to "Allow", Automated investigation and remediation will ignore a "bad" verdict for it. If set to "Block", Automated investigation and remediation will treat it as "bad".
|
||||||
@ -153,7 +153,7 @@ It's important to understand the following prerequisites prior to creating indic
|
|||||||
You can create indicators for certificates. Some common use cases include:
|
You can create indicators for certificates. Some common use cases include:
|
||||||
|
|
||||||
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
|
- Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list.
|
||||||
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
|
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Microsoft Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same.
|
||||||
|
|
||||||
|
|
||||||
### Before you begin
|
### Before you begin
|
||||||
|
@ -44,11 +44,11 @@ You can also use [audit mode](audit-windows-defender.md) to evaluate how Network
|
|||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
Network protection requires Windows 10 Pro, Enterprise E3, E5 and Windows Defender AV real-time protection.
|
Network protection requires Windows 10 Pro, Enterprise E3, E5 and Microsoft Defender AV real-time protection.
|
||||||
|
|
||||||
Windows 10 version | Microsoft Defender Antivirus
|
Windows 10 version | Microsoft Defender Antivirus
|
||||||
-|-
|
-|-
|
||||||
Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled
|
Windows 10 version 1709 or later | [Microsoft Defender AV real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled
|
||||||
|
|
||||||
## Review network protection events in the Microsoft Defender ATP Security Center
|
## Review network protection events in the Microsoft Defender ATP Security Center
|
||||||
|
|
||||||
|
@ -95,7 +95,7 @@ below to onboard systems with Configuration Manager.
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is equal to** and value **10240** and click on **OK**.
|
7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is greater than or equal to** and value **14393** and click on **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -28,6 +28,8 @@ Microsoft Defender ATP endpoint detection and response capabilities provide adva
|
|||||||
|
|
||||||
When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an _incident_. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats.
|
When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an _incident_. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats.
|
||||||
|
|
||||||
|
>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4o1j5]
|
||||||
|
|
||||||
Inspired by the "assume breach" mindset, Microsoft Defender ATP continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors.
|
Inspired by the "assume breach" mindset, Microsoft Defender ATP continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors.
|
||||||
|
|
||||||
The response capabilities give you the power to promptly remediate threats by acting on the affected entities.
|
The response capabilities give you the power to promptly remediate threats by acting on the affected entities.
|
||||||
|
@ -81,7 +81,7 @@ Icon | Description
|
|||||||
| Not remediated – Threat not removed from the machine.
|
| Not remediated – Threat not removed from the machine.
|
||||||
| Indicates events that triggered an alert in the **Alert process tree**.
|
| Indicates events that triggered an alert in the **Alert process tree**.
|
||||||
| Machine icon
|
| Machine icon
|
||||||
| Microsoft Defender Antivirus events
|
| Microsoft Defender Antivirus events
|
||||||
| Windows Defender Application Guard events
|
| Windows Defender Application Guard events
|
||||||
| Windows Defender Device Guard events
|
| Windows Defender Device Guard events
|
||||||
| Windows Defender Exploit Guard events
|
| Windows Defender Exploit Guard events
|
||||||
|
@ -116,13 +116,13 @@ As part of the investigation or response process, you can remotely initiate an a
|
|||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>- This action is available for machines on Windows 10, version 1709 or later.
|
>- This action is available for machines on Windows 10, version 1709 or later.
|
||||||
>- A Microsoft Defender Antivirus (Windows Defender AV) scan can run alongside other antivirus solutions, whether Windows Defender AV is the active antivirus solution or not. Windows Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
>- A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender AV is the active antivirus solution or not. Microsoft Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
||||||
|
|
||||||
One you have selected **Run antivirus scan**, select the scan type that you'd like to run (quick or full) and add a comment before confirming the scan.
|
One you have selected **Run antivirus scan**, select the scan type that you'd like to run (quick or full) and add a comment before confirming the scan.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
The Action center will show the scan information and the machine timeline will include a new event, reflecting that a scan action was submitted on the machine. Windows Defender AV alerts will reflect any detections that surfaced during the scan.
|
The Action center will show the scan information and the machine timeline will include a new event, reflecting that a scan action was submitted on the machine. Microsoft Defender AV alerts will reflect any detections that surfaced during the scan.
|
||||||
|
|
||||||
## Restrict app execution
|
## Restrict app execution
|
||||||
|
|
||||||
|
@ -46,7 +46,7 @@ Attack surface reduction rules will only work on devices with the following cond
|
|||||||
|
|
||||||
- Endpoints are running Windows 10 Enterprise, version 1709 (also known as the Fall Creators Update).
|
- Endpoints are running Windows 10 Enterprise, version 1709 (also known as the Fall Creators Update).
|
||||||
|
|
||||||
- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
||||||
|
|
||||||
- [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled.
|
- [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled.
|
||||||
|
|
||||||
|
@ -43,7 +43,7 @@ Network protection will only work on devices with the following conditions:
|
|||||||
|
|
||||||
>[!div class="checklist"]
|
>[!div class="checklist"]
|
||||||
> * Endpoints are running Windows 10 Enterprise edition, version 1709 or higher (also known as the Fall Creators Update).
|
> * Endpoints are running Windows 10 Enterprise edition, version 1709 or higher (also known as the Fall Creators Update).
|
||||||
> * Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
> * Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
||||||
> * [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled.
|
> * [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled.
|
||||||
> * [Cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) is enabled.
|
> * [Cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) is enabled.
|
||||||
> * Audit mode is not enabled. Use [Group Policy](enable-network-protection.md#group-policy) to set the rule to **Disabled** (value: **0**).
|
> * Audit mode is not enabled. Use [Group Policy](enable-network-protection.md#group-policy) to set the rule to **Disabled** (value: **0**).
|
||||||
|
@ -1,66 +0,0 @@
|
|||||||
---
|
|
||||||
title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows 10)
|
|
||||||
description: Learn about the available Group Policy settings for Microsoft Defender Application Guard.
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: security
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
author: denisebmsft
|
|
||||||
ms.author: deniseb
|
|
||||||
ms.date: 05/27/2020
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
ms.custom: asr
|
|
||||||
---
|
|
||||||
|
|
||||||
# Configure Microsoft Defender Application Guard policy settings
|
|
||||||
|
|
||||||
**Applies to:**
|
|
||||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
|
||||||
|
|
||||||
Microsoft Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain.
|
|
||||||
|
|
||||||
Application Guard uses both network isolation and application-specific settings.
|
|
||||||
|
|
||||||
## Network isolation settings
|
|
||||||
|
|
||||||
These settings, located at **Computer Configuration\Administrative Templates\Network\Network Isolation**, help you define and manage your company's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>You must configure either the Enterprise resource domains hosted in the cloud or Private network ranges for apps settings on your employee devices to successfully turn on Application Guard using enterprise mode. Proxy servers must be a neutral resource listed in the "Domains categorized as both work and personal" policy.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|Policy name|Supported versions|Description|
|
|
||||||
|-----------|------------------|-----------|
|
|
||||||
|Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.|
|
|
||||||
|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.|
|
|
||||||
|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Proxies should be added to this list. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.|
|
|
||||||
|
|
||||||
## Network isolation settings wildcards
|
|
||||||
|
|
||||||
|Value|Number of dots to the left|Meaning|
|
|
||||||
|-----|--------------------------|-------|
|
|
||||||
|`contoso.com`|0|Trust only the literal value of `contoso.com`.|
|
|
||||||
|`www.contoso.com`|0|Trust only the literal value of `www.contoso.com`.|
|
|
||||||
|`.contoso.com`|1|Trust any domain that ends with the text `contoso.com`. Matching sites include `spearphishingcontoso.com`, `contoso.com`, and `www.contoso.com`.|
|
|
||||||
|`..contoso.com`|2|Trust all levels of the domain hierarchy that are to the left of the dot. Matching sites include `shop.contoso.com`, `us.shop.contoso.com`, `www.us.shop.contoso.com`, but NOT `contoso.com` itself.|
|
|
||||||
|
|
||||||
## Application-specific settings
|
|
||||||
These settings, located at **Computer Configuration\Administrative Templates\Windows Components\Windows Defender Application Guard**, can help you to manage your company's implementation of Application Guard.
|
|
||||||
|
|
||||||
|Name|Supported versions|Description|Options|
|
|
||||||
|-----------|------------------|-----------|-------|
|
|
||||||
|Configure Windows Defender Application Guard clipboard settings|Windows 10 Enterprise, 1709 or higher<br><br>Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the clipboard functionality.|**Enabled.** Turns On the clipboard functionality and lets you choose whether to additionally:<br/>-Disable the clipboard functionality completely when Virtualization Security is enabled.<br/>- Enable copying of certain content from Application Guard into Microsoft Edge.<br/>- Enable copying of certain content from Microsoft Edge into Application Guard. **Important:** Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.<br/><br/>**Disabled or not configured.** Completely turns Off the clipboard functionality for Application Guard.|
|
|
||||||
|Configure Windows Defender Application Guard print settings|Windows 10 Enterprise, 1709 or higher<br><br>Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the print functionality.|**Enabled.** Turns On the print functionality and lets you choose whether to additionally:<br/>- Enable Application Guard to print into the XPS format.<br/>- Enable Application Guard to print into the PDF format.<br/>- Enable Application Guard to print to locally attached printers.<br/>- Enable Application Guard to print from previously connected network printers. Employees can't search for additional printers.<br/><br/>**Disabled or not configured.** Completely turns Off the print functionality for Application Guard.<br><br>**Note**<br>Network printers must be published by Active Directory to work in Application Guard.|
|
|
||||||
|Block enterprise websites to load non-enterprise content in IE and Edge|Windows 10 Enterprise, 1709 or higher|Determines whether to allow Internet access for apps not included on the **Allowed Apps** list.|**Enabled.** Prevents network traffic from both Internet Explorer and Microsoft Edge to non-enterprise sites that can't render in the Application Guard container. **Note:** This may also block assets cached by CDNs and references to analytics sites. Please add them to the trusted enterprise resources to avoid broken pages.<br><br>**Disabled or not configured.** Prevents Microsoft Edge to render network traffic to non-enterprise sites that can't render in Application Guard.<br><br>**Note**<br>This policy is no longer supported in the 2004 update and later.|
|
|
||||||
|Allow Persistence|Windows 10 Enterprise, 1709 or higher<br><br>Windows 10 Pro, 1803 or higher|Determines whether data persists across different sessions in Windows Defender Application Guard.|**Enabled.** Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.<br><br>**Disabled or not configured.** All user data within Application Guard is reset between sessions.<br><br>**Note**<br>If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.<br><br>**To reset the container:**<br/>1. Open a command-line program and navigate to `Windows/System32`.<br/>2. Type `wdagtool.exe cleanup`. The container environment is reset, retaining only the employee-generated data.<br/>3. Type `wdagtool.exe cleanup RESET_PERSISTENCE_LAYER`. The container environment is reset, including discarding all employee-generated data.|
|
|
||||||
|Turn on Windows Defender Application Guard in Managed Mode|Windows 10 Enterprise, 1809 or higher|Determines whether to turn on Application Guard for Microsoft Edge and Microsoft Office.|**Enabled.** Turns on Application Guard for Microsoft Edge and/or Microsoft Office, honoring the network isolation settings, rendering non-enterprise domains in the Application Guard container. Be aware that Application Guard won't actually be turned On unless the required prerequisites and network isolation settings are already set on the device. Available options:<br/>- Enable Windows Defender Application Guard only for Microsoft Edge<br/>- Enable Windows Defender Application Guard only for Microsoft Office<br/>- Enable Windows Defender Application Guard for both Microsoft Edge and Microsoft Office<br/><br/>**Disabled.** Turns Off Application Guard, allowing all apps to run in Microsoft Edge and Microsoft Office.|
|
|
||||||
|Allow files to download to host operating system|Windows 10 Enterprise, 1803 or higher|Determines whether to save downloaded files to the host operating system from the Windows Defender Application Guard container.|**Enabled.** Allows users to save downloaded files from the Windows Defender Application Guard container to the host operating system.<br><br>**Disabled or not configured.** Users are not able to saved downloaded files from Application Guard to the host operating system.|
|
|
||||||
|Allow hardware-accelerated rendering for Windows Defender Application Guard|Windows 10 Enterprise, 1803 or higher<br><br>Windows 10 Pro, 1803 or higher|Determines whether Windows Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** Windows Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Windows Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Windows Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Be aware that enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.<br><br>**Disabled or not configured.** Windows Defender Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.|
|
|
||||||
|Allow camera and microphone access in Windows Defender Application Guard|Windows 10 Enterprise, 1809 or higher<br><br>Windows 10 Pro, 1809 or higher|Determines whether to allow camera and microphone access inside Windows Defender Application Guard.|**Enabled.** Applications inside Windows Defender Application Guard are able to access the camera and microphone on the user's device. **Important:** Be aware that enabling this policy with a potentially compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge.<br><br>**Disabled or not configured.** Applications inside Windows Defender Application Guard are unable to access the camera and microphone on the user's device.|
|
|
||||||
|Allow Windows Defender Application Guard to use Root Certificate Authorities from a user's device|Windows 10 Enterprise, 1809 or higher<br><br>Windows 10 Pro, 1809 or higher|Determines whether Root Certificates are shared with Windows Defender Application Guard.|**Enabled.** Certificates matching the specified thumbprint are transferred into the container. Use a comma to separate multiple certificates.<br><br>**Disabled or not configured.** Certificates are not shared with Windows Defender Application Guard.|
|
|
||||||
|Allow users to trust files that open in Windows Defender Application Guard|Windows 10 Enterprise, 1809 or higher|Determines whether users are able to manually trust untrusted files to open them on the host.|**Enabled.** Users are able to manually trust files or trust files after an antivirus check.<br><br>**Disabled or not configured.** Users are unable to manually trust files and files continue to open in Windows Defender Application Guard.|
|
|
||||||
|
|
||||||
|
|
@ -42,7 +42,7 @@ You can't uninstall the Windows Security app, but you can do one of the followin
|
|||||||
|
|
||||||
- Disable the interface on Windows Server 2016. See [Microsoft Defender Antivirus on Windows Server 2016](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016).
|
- Disable the interface on Windows Server 2016. See [Microsoft Defender Antivirus on Windows Server 2016](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016).
|
||||||
- Hide all of the sections on client computers (see below).
|
- Hide all of the sections on client computers (see below).
|
||||||
- Disable Microsoft Defender Antivirus, if needed. See [Enable and configure Windows Defender AV always-on protection and monitoring](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
- Disable Microsoft Defender Antivirus, if needed. See [Enable and configure Microsoft Defender AV always-on protection and monitoring](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
||||||
|
|
||||||
You can find more information about each section, including options for configuring the sections - such as hiding each of the sections - at the following topics:
|
You can find more information about each section, including options for configuring the sections - such as hiding each of the sections - at the following topics:
|
||||||
|
|
||||||
@ -77,20 +77,20 @@ You can find more information about each section, including options for configur
|
|||||||
## How the Windows Security app works with Windows security features
|
## How the Windows Security app works with Windows security features
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Windows Defender AV and the Windows Security app use similarly named services for specific purposes.
|
> Microsoft Defender AV and the Windows Security app use similarly named services for specific purposes.
|
||||||
>
|
>
|
||||||
> The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
|
> The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection.
|
||||||
>
|
>
|
||||||
>These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product.
|
>These services do not affect the state of Microsoft Defender AV. Disabling or modifying these services will not disable Microsoft Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product.
|
||||||
>
|
>
|
||||||
>Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
>Microsoft Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md).
|
||||||
>
|
>
|
||||||
> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security).
|
> Disabling the Windows Security Center service will not disable Microsoft Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security).
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device.
|
||||||
>
|
>
|
||||||
> It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
> It may also prevent Microsoft Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed.
|
||||||
>
|
>
|
||||||
> This will significantly lower the protection of your device and could lead to malware infection.
|
> This will significantly lower the protection of your device and could lead to malware infection.
|
||||||
|
|
||||||
|
@ -83,9 +83,9 @@ Endpoint detection and response is improved. Enterprise customers can now take a
|
|||||||
- [Configuring features](/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features)
|
- [Configuring features](/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features)
|
||||||
- [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus)
|
- [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus)
|
||||||
|
|
||||||
Some of the highlights of the new library include [Evaluation guide for Windows Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) and [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus).
|
Some of the highlights of the new library include [Evaluation guide for Microsoft Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) and [Deployment guide for Microsoft Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus).
|
||||||
|
|
||||||
New features for Windows Defender AV in Windows 10 Enterprise 2019 LTSC include:
|
New features for Microsoft Defender AV in Windows 10 Enterprise 2019 LTSC include:
|
||||||
- [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus)
|
- [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus)
|
||||||
- [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus)
|
- [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus)
|
||||||
- [Microsoft Defender Antivirus protection in the Windows Defender Security Center app](/windows/threat-protection/microsoft-defender-antivirus/windows-defender-security-center-antivirus)
|
- [Microsoft Defender Antivirus protection in the Windows Defender Security Center app](/windows/threat-protection/microsoft-defender-antivirus/windows-defender-security-center-antivirus)
|
||||||
|
@ -138,10 +138,10 @@ The new library includes information on:
|
|||||||
- [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus)
|
- [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus)
|
||||||
|
|
||||||
Some of the highlights of the new library include:
|
Some of the highlights of the new library include:
|
||||||
- [Evaluation guide for Windows Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus)
|
- [Evaluation guide for Microsoft Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus)
|
||||||
- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus)
|
- [Deployment guide for Microsoft Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus)
|
||||||
|
|
||||||
New features for Windows Defender AV in Windows 10, version 1703 include:
|
New features for Microsoft Defender AV in Windows 10, version 1703 include:
|
||||||
|
|
||||||
- [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus)
|
- [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus)
|
||||||
- [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus)
|
- [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus)
|
||||||
@ -150,7 +150,7 @@ New features for Windows Defender AV in Windows 10, version 1703 include:
|
|||||||
|
|
||||||
In Windows 10, version 1607, we [invested heavily in helping to protect against ransomware](https://blogs.windows.com/business/2016/11/11/defending-against-ransomware-with-windows-10-anniversary-update/#UJlHc6SZ2Zm44jCt.97), and we continue that investment in version 1703 with [updated behavior monitoring and always-on real-time protection](/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
In Windows 10, version 1607, we [invested heavily in helping to protect against ransomware](https://blogs.windows.com/business/2016/11/11/defending-against-ransomware-with-windows-10-anniversary-update/#UJlHc6SZ2Zm44jCt.97), and we continue that investment in version 1703 with [updated behavior monitoring and always-on real-time protection](/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
||||||
|
|
||||||
You can read more about ransomware mitigations and detection capability in Windows Defender AV in the [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/).
|
You can read more about ransomware mitigations and detection capability in Microsoft Defender AV in the [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/).
|
||||||
|
|
||||||
### Device Guard and Credential Guard
|
### Device Guard and Credential Guard
|
||||||
|
|
||||||
|
@ -18,7 +18,7 @@ ms.topic: article
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, version 2004
|
- Windows 10, version 2004
|
||||||
|
|
||||||
This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909.
|
This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909. To download and install Windows 10, version 2004, use Windows Update (**Settings > Update & Security > Windows Update**). For more information, see this [video](https://aka.ms/Windows-10-May-2020-Update).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The month indicator for this release is 04 instead of 03 to avoid confusion with Windows releases in the year 2003.
|
> The month indicator for this release is 04 instead of 03 to avoid confusion with Windows releases in the year 2003.
|
||||||
@ -207,7 +207,7 @@ The following items are added to Task Manager in this release:
|
|||||||
|
|
||||||
### 2-in-1 PCs
|
### 2-in-1 PCs
|
||||||
|
|
||||||
A [new tablet experience](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#new-tablet-experience-for-2-in-1-convertible-pcs-build-18970) for two-in-one convertible PCs is available. The screen will be optimized for touch When you detach your two-in-one's keyboard, but you'll still keep the familiar look of your desktop without interruption.
|
A [new tablet experience](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#new-tablet-experience-for-2-in-1-convertible-pcs-build-18970) for two-in-one convertible PCs is available. The screen will be optimized for touch when you detach your two-in-one's keyboard, but you'll still keep the familiar look of your desktop without interruption.
|
||||||
|
|
||||||
### Specialized displays
|
### Specialized displays
|
||||||
|
|
||||||
|