Merge branch 'master' into PubOps-repo-health
@ -14085,6 +14085,11 @@
|
|||||||
"redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business",
|
"redirect_url": "/microsoft-store/prerequisites-microsoft-store-for-business",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "store-for-business/manage-mpsa-software-microsoft-store-for-business.md",
|
||||||
|
"redirect_url": "/microsoft-store/index",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/manage/reset-a-windows-10-mobile-device.md",
|
"source_path": "windows/manage/reset-a-windows-10-mobile-device.md",
|
||||||
"redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device",
|
"redirect_url": "/windows/client-management/reset-a-windows-10-mobile-device",
|
||||||
@ -17957,27 +17962,27 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-endpoint-post-migration",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-atp-post-migration",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-configuration-manager.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-endpoint-post-migration-configuration-manager",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-atp-post-migration-configuration-manager",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-group-policy-objects.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-endpoint-post-migration-group-policy-objects",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-atp-post-migration-group-policy-objects",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-intune.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-endpoint-post-migration-intune",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-atp-post-migration-intune",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/manage-atp-post-migration-other-tools.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-endpoint-post-migration-other-tools",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/manage-atp-post-migration-other-tools",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -18022,22 +18027,22 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-migration.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/mcafee-to-microsoft-defender-migration",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-migration",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-onboard.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/mcafee-to-microsoft-defender-onboard",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-onboard",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-prepare.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/mcafee-to-microsoft-defender-prepare",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-prepare",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/mcafee-to-microsoft-defender-setup.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/mcafee-to-microsoft-defender-setup",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-setup",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
@ -18367,22 +18372,22 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-migration.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/symantec-to-microsoft-defender-endpoint-migration",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-migration",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-onboard.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/symantec-to-microsoft-defender-endpoint-onboard",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-onboard",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-prepare.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/symantec-to-microsoft-defender-endpoint-prepare",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-prepare",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/symantec-to-microsoft-defender-atp-setup.md",
|
||||||
"redirect_url": "/microsoft-365/security/defender-endpoint/symantec-to-microsoft-defender-endpoint-setup",
|
"redirect_url": "/microsoft-365/security/defender-endpoint/switch-to-microsoft-defender-setup",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -51,8 +51,6 @@
|
|||||||
href: add-profile-to-devices.md
|
href: add-profile-to-devices.md
|
||||||
- name: Microsoft Store for Business and Education PowerShell module - preview
|
- name: Microsoft Store for Business and Education PowerShell module - preview
|
||||||
href: microsoft-store-for-business-education-powershell-module.md
|
href: microsoft-store-for-business-education-powershell-module.md
|
||||||
- name: Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
|
||||||
href: manage-mpsa-software-microsoft-store-for-business.md
|
|
||||||
- name: Working with solution providers
|
- name: Working with solution providers
|
||||||
href: /microsoft-365/commerce/manage-partners
|
href: /microsoft-365/commerce/manage-partners
|
||||||
- name: Billing and payments
|
- name: Billing and payments
|
||||||
|
@ -11,11 +11,14 @@ manager: scotv
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Acquire apps in Microsoft Store for Business and Education
|
# Acquire apps in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
|
@ -7,7 +7,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: store
|
ms.pagetype: store
|
||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.date: 2/9/2018
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
@ -19,6 +19,9 @@ ms.localizationpriority: medium
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Windows Autopilot simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows Autopilot](/windows/deployment/windows-autopilot/windows-10-autopilot).
|
Windows Autopilot simplifies device set up for IT Admins. For an overview of benefits, scenarios, and prerequisites, see [Overview of Windows Autopilot](/windows/deployment/windows-autopilot/windows-10-autopilot).
|
||||||
|
|
||||||
Watch this video to learn more about Windows Autopilot in Microsoft Store for Business. </br>
|
Watch this video to learn more about Windows Autopilot in Microsoft Store for Business. </br>
|
||||||
|
@ -12,11 +12,14 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Add unsigned app to code integrity policy
|
# Add unsigned app to code integrity policy
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
||||||
>
|
>
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: store
|
|||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/23/2018
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# App inventory management for Microsoft Store for Business and Education
|
# App inventory management for Microsoft Store for Business and Education
|
||||||
@ -21,6 +21,9 @@ ms.date: 10/23/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
You can manage all apps that you've acquired on your **Apps & software** page. This page shows all of the content you've acquired, including apps that from Microsoft Store, and line-of-business (LOB) apps that you've accepted into your inventory. After LOB apps are submitted to your organization, you'll see a notification on your **Apps & software** page. On the **New LOB apps** tab, you can accept, or reject the LOB apps. For more information on LOB apps, see [Working with line-of-business apps](working-with-line-of-business-apps.md). The inventory page includes apps acquired by all people in your organization with the Store for Business Admin role.
|
You can manage all apps that you've acquired on your **Apps & software** page. This page shows all of the content you've acquired, including apps that from Microsoft Store, and line-of-business (LOB) apps that you've accepted into your inventory. After LOB apps are submitted to your organization, you'll see a notification on your **Apps & software** page. On the **New LOB apps** tab, you can accept, or reject the LOB apps. For more information on LOB apps, see [Working with line-of-business apps](working-with-line-of-business-apps.md). The inventory page includes apps acquired by all people in your organization with the Store for Business Admin role.
|
||||||
|
|
||||||
All of these apps are treated the same once they are in your inventory and you can perform app lifecycle tasks for them: distribute apps, add apps to private store, review license details, and reclaim app licenses.
|
All of these apps are treated the same once they are in your inventory and you can perform app lifecycle tasks for them: distribute apps, add apps to private store, review license details, and reclaim app licenses.
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Apps in Microsoft Store for Business and Education
|
# Apps in Microsoft Store for Business and Education
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Education has thousands of apps from many different categories.
|
Microsoft Store for Business and Education has thousands of apps from many different categories.
|
||||||
|
|
||||||
These app types are supported in Microsoft Store for Business and Education:
|
These app types are supported in Microsoft Store for Business and Education:
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/13/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Assign apps to employees
|
# Assign apps to employees
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/13/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Admins, Purchasers, and Basic Purchasers can assign online-licensed apps to employees or students in their organization.
|
Admins, Purchasers, and Basic Purchasers can assign online-licensed apps to employees or students in their organization.
|
||||||
|
|
||||||
**To assign an app to an employee**
|
**To assign an app to an employee**
|
||||||
|
@ -10,13 +10,16 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Billing and payments
|
# Billing and payments
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Access invoices and managed your payment methods.
|
Access invoices and managed your payment methods.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -10,12 +10,16 @@ author: trudyha
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Understand billing profiles
|
# Understand billing profiles
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
For commercial customers purchasing software or hardware products from Microsoft using a Microsoft customer agreement, billing profiles let you customize what products are included on your invoice, and how you pay your invoices.
|
For commercial customers purchasing software or hardware products from Microsoft using a Microsoft customer agreement, billing profiles let you customize what products are included on your invoice, and how you pay your invoices.
|
||||||
|
|
||||||
Billing profiles include:
|
Billing profiles include:
|
||||||
|
@ -9,13 +9,16 @@ author: trudyha
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Understand your Microsoft Customer Agreement invoice
|
# Understand your Microsoft Customer Agreement invoice
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
The invoice provides a summary of your charges and provides instructions for payment. It’s available for
|
The invoice provides a summary of your charges and provides instructions for payment. It’s available for
|
||||||
download in the Portable Document Format (.pdf) for commercial customers from Microsoft Store for Business [Microsoft Store for Business - Invoice](https://businessstore.microsoft.com/manage/payments-billing/invoices) or can be sent via email. This article applies to invoices generated for a Microsoft Customer Agreement billing account. Check if you have a [Microsoft Customer Agreement](https://businessstore.microsoft.com/manage/organization/agreements).
|
download in the Portable Document Format (.pdf) for commercial customers from Microsoft Store for Business [Microsoft Store for Business - Invoice](https://businessstore.microsoft.com/manage/payments-billing/invoices) or can be sent via email. This article applies to invoices generated for a Microsoft Customer Agreement billing account. Check if you have a [Microsoft Customer Agreement](https://businessstore.microsoft.com/manage/organization/agreements).
|
||||||
|
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 1/6/2018
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure an MDM provider
|
# Configure an MDM provider
|
||||||
@ -21,6 +21,9 @@ ms.date: 1/6/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content.
|
||||||
|
|
||||||
Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business
|
||||||
|
@ -12,11 +12,14 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Device Guard signing
|
# Device Guard signing
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
||||||
>
|
>
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/31/2018
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Distribute apps using your private store
|
# Distribute apps using your private store
|
||||||
@ -22,6 +22,9 @@ ms.date: 10/31/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
The private store is a feature in Microsoft Store for Business and Education that organizations receive during the signup process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in Microsoft Store app, and is usually named for your company or organization. Only apps with online licenses can be added to the private store.
|
The private store is a feature in Microsoft Store for Business and Education that organizations receive during the signup process. When admins add apps to the private store, all employees in the organization can view and download the apps. Your private store is available as a tab in Microsoft Store app, and is usually named for your company or organization. Only apps with online licenses can be added to the private store.
|
||||||
|
|
||||||
You can make an app available in your private store when you acquire the app, or you can do it later from your inventory. Once the app is in your private store, employees can claim and install the app.
|
You can make an app available in your private store when you acquire the app, or you can do it later from your inventory. Once the app is in your private store, employees can claim and install the app.
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/13/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Distribute apps to your employees from Microsoft Store for Business and Education
|
# Distribute apps to your employees from Microsoft Store for Business and Education
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/13/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Distribute apps to your employees from Microsoft Store for Business and Microsoft Store for Education. You can assign apps to employees, or let employees install them from your private store.
|
Distribute apps to your employees from Microsoft Store for Business and Microsoft Store for Education. You can assign apps to employees, or let employees install them from your private store.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Distribute apps with a management tool
|
# Distribute apps with a management tool
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content.
|
You can configure a mobile device management (MDM) tool to synchronize your Microsoft Store for Business or Microsoft Store for Education inventory. Microsoft Store management tool services work with MDM tools to manage content.
|
||||||
|
|
||||||
Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store.
|
Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store.
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Distribute offline apps
|
# Distribute offline apps
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Offline licensing is a new licensing option for Windows 10 with Microsoft Store for Business and Microsoft Store for Education. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. ISVs or devs can opt-in their apps for offline licensing when they submit them to the Windows Dev Center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in Microsoft Store for Business and Microsoft Store for Education. This model allows organizations to deploy apps when users or devices do not have connectivity to the Store.
|
Offline licensing is a new licensing option for Windows 10 with Microsoft Store for Business and Microsoft Store for Education. With offline licenses, organizations can download apps and their licenses to deploy within their network, or on devices that are not connected to the Internet. ISVs or devs can opt-in their apps for offline licensing when they submit them to the Windows Dev Center. Only apps that are opted in to offline licensing will show that they are available for offline licensing in Microsoft Store for Business and Microsoft Store for Education. This model allows organizations to deploy apps when users or devices do not have connectivity to the Store.
|
||||||
|
|
||||||
## Why offline-licensed apps?
|
## Why offline-licensed apps?
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Find and acquire apps
|
# Find and acquire apps
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization.
|
Use the Microsoft Store for Business and Education to find apps for your organization. You can also work with developers to create line-of-business apps that are only available to your organization.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -11,7 +11,7 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Store for Business and Education
|
# Microsoft Store for Business and Education
|
||||||
@ -21,6 +21,9 @@ ms.date: 03/10/2021
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Welcome to the Microsoft Store for Business and Education! You can use Microsoft Store to find, acquire, distribute, and manage apps for your organization or school.
|
Welcome to the Microsoft Store for Business and Education! You can use Microsoft Store to find, acquire, distribute, and manage apps for your organization or school.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: store
|
|||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage access to private store
|
# Manage access to private store
|
||||||
@ -22,6 +22,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
You can manage access to your private store in Microsoft Store for Business and Microsoft Store for Education.
|
You can manage access to your private store in Microsoft Store for Business and Microsoft Store for Education.
|
||||||
|
|
||||||
You can control the set of apps that are available to your employees and students, and not show the full set of applications that are in Microsoft Store. Using the private store with the Microsoft Store for Business and Education, admins can curate the set of apps that are available.
|
You can control the set of apps that are available to your employees and students, and not show the full set of applications that are in Microsoft Store. Using the private store with the Microsoft Store for Business and Education, admins can curate the set of apps that are available.
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage apps in Microsoft Store for Business and Education
|
# Manage apps in Microsoft Store for Business and Education
|
||||||
@ -22,6 +22,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Manage products and services in Microsoft Store for Business and Microsoft Store for Education. This includes apps, software, products, devices, and services available under **Products & services**.
|
Manage products and services in Microsoft Store for Business and Microsoft Store for Education. This includes apps, software, products, devices, and services available under **Products & services**.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -1,63 +0,0 @@
|
|||||||
---
|
|
||||||
title: Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
|
||||||
description: Software purchased under Microsoft Products and Services Agreement (MPSA) can be managed in Microsoft Store for Business
|
|
||||||
ms.prod: w10
|
|
||||||
ms.mktglfcycl: manage
|
|
||||||
ms.sitesec: library
|
|
||||||
ms.pagetype: store
|
|
||||||
author: TrudyHa
|
|
||||||
ms.author: TrudyHa
|
|
||||||
ms.topic: conceptual
|
|
||||||
ms.localizationpriority: medium
|
|
||||||
ms.date: 3/20/2018
|
|
||||||
ms.reviewer:
|
|
||||||
manager: dansimp
|
|
||||||
---
|
|
||||||
|
|
||||||
# Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
|
||||||
|
|
||||||
**Applies to**
|
|
||||||
|
|
||||||
- Windows 10
|
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
Software purchased with the Microsoft Products and Services Agreement (MPSA) can now be managed in Microsoft Store for Business. This allows customers to manage online software purchases in one location.
|
|
||||||
|
|
||||||
There are a couple of things you might need to set up to manage MPSA software purchases in Store for Business.
|
|
||||||
|
|
||||||
**To manage MPSA software in Microsoft Store for Business**
|
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com).
|
|
||||||
2. Click **Manage**, and then click **My Organization**.
|
|
||||||
3. Click **Connected tenants** to see purchasing accounts and the tenants that they are connected to.
|
|
||||||
|
|
||||||
## Add tenant
|
|
||||||
The tenant or tenants that are added to your purchasing account control how you can distribute software to people in your organization. If there isn't a tenant listed for your purchasing account, you'll need to add one before you can use or manage the software you've purchased. When we give you a list to choose from, tenants are grouped by domain.
|
|
||||||
|
|
||||||
**To add a tenant to a purchasing account**
|
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com).
|
|
||||||
2. Click **Manage**, and then click **My Organization**.
|
|
||||||
3. Click **Connected tenants**, and then click the ellipses for a purchasing account without a tenant listed.
|
|
||||||
4. Click **Choose a tenant**, and then click **Submit**.
|
|
||||||
|
|
||||||
If you don't see your tenant in the list, you can add the name of your tenant
|
|
||||||
|
|
||||||
**To add the name of your tenant**
|
|
||||||
1. On **Add a tenant**, click **Don't see your tenant?**.
|
|
||||||
2. Enter a domain name, and then click **Next**, and then click **Done**.
|
|
||||||
|
|
||||||
You'll need to get permissions for the admin that manages the domain you want to add. We'll take you to Business Center Portal where you can manage permissions and roles. The admin will need to be the **Account Manager**.
|
|
||||||
|
|
||||||
## Add global admin
|
|
||||||
In some cases, we might not have info on who the global admin is for the tenant that you select. It might be that the tenant is unmanaged, and you'll need to identify a global admin. Or, you might only need to share account info for the global admin.
|
|
||||||
|
|
||||||
If you need to nominate someone to be the global admin, they need sufficient permissions:
|
|
||||||
- someone who can distribute software
|
|
||||||
- in Business Center Portal (BCP), it should be someone with **Agreement Admin** role
|
|
||||||
|
|
||||||
**To add a global admin to a tenant**
|
|
||||||
|
|
||||||
We'll ask for a global admin if we need that info when you add a tenant to a purchasing account. You'd see the request for a global admin before returning to **Store for Business**.
|
|
||||||
|
|
||||||
- On **Add a Global Admin**, click **Make me the Global Admin**, and then click **Submit**.
|
|
||||||
-or-
|
|
||||||
- On **Add a Global Admin**, type a name in **Invite someone else**, and then click **Submit**.
|
|
@ -9,13 +9,16 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 11/10/2017
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage app orders in Microsoft Store for Business and Education
|
# Manage app orders in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
After you've acquired apps, you can review order information and invoices on **Order history**. On this page, you can view invoices, and request refunds.
|
After you've acquired apps, you can review order information and invoices on **Order history**. On this page, you can view invoices, and request refunds.
|
||||||
|
|
||||||
**Order history** lists orders in chronological order and shows:
|
**Order history** lists orders in chronological order and shows:
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: store
|
|||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 3/29/2018
|
ms.date: 07/21/2021
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -22,6 +22,9 @@ ms.localizationpriority: medium
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
The private store is a feature in Microsoft Store for Business and Education that organizations receive during the sign up process. When admins add apps to the private store, all people in the organization can view and download the apps. Only online-licensed apps can be distributed from your private store.
|
The private store is a feature in Microsoft Store for Business and Education that organizations receive during the sign up process. When admins add apps to the private store, all people in the organization can view and download the apps. Only online-licensed apps can be distributed from your private store.
|
||||||
|
|
||||||
The name of your private store is shown on a tab in Microsoft Store app, or on [Microsoft Store for Business](https://businessstore.microsoft.com), or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
The name of your private store is shown on a tab in Microsoft Store app, or on [Microsoft Store for Business](https://businessstore.microsoft.com), or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 2/19/2018
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage settings for Microsoft Store for Business and Education
|
# Manage settings for Microsoft Store for Business and Education
|
||||||
@ -22,6 +22,9 @@ ms.date: 2/19/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
You can add users and groups, as well as update some of the settings associated with the Azure Active Directory (AD) tenant.
|
||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage user accounts in Microsoft Store for Business and Education
|
# Manage user accounts in Microsoft Store for Business and Education
|
||||||
@ -23,6 +23,9 @@ ms.date: 10/17/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups.
|
Microsoft Store for Business and Education manages permissions with a set of roles. Currently, you can [assign these roles to individuals in your organization](roles-and-permissions-microsoft-store-for-business.md), but not to groups.
|
||||||
|
|
||||||
## Why Azure AD accounts?
|
## Why Azure AD accounts?
|
||||||
|
@ -9,7 +9,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/22/2017
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -19,6 +19,9 @@ manager: dansimp
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Education PowerShell module (preview) is now available on [PowerShell Gallery](https://go.microsoft.com/fwlink/?linkid=853459).
|
Microsoft Store for Business and Education PowerShell module (preview) is now available on [PowerShell Gallery](https://go.microsoft.com/fwlink/?linkid=853459).
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
@ -12,7 +12,7 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Store for Business and Microsoft Store for Education overview
|
# Microsoft Store for Business and Microsoft Store for Education overview
|
||||||
@ -22,6 +22,9 @@ ms.date: 03/10/2021
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
|
@ -13,7 +13,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/27/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Notifications in Microsoft Store for Business and Education
|
# Notifications in Microsoft Store for Business and Education
|
||||||
@ -24,6 +24,9 @@ ms.date: 07/27/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Microsoft Store for Education use a set of notifications to alert admins if there is an issue or outage with Microsoft Store.
|
Microsoft Store for Business and Microsoft Store for Education use a set of notifications to alert admins if there is an issue or outage with Microsoft Store.
|
||||||
|
|
||||||
## Notifications for admins
|
## Notifications for admins
|
||||||
|
@ -10,12 +10,16 @@ author: trudyha
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Payment methods
|
# Payment methods
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
You can purchase products and services from Microsoft Store for Business using your credit card. You can enter your credit card information on **Payment methods**, or when you purchase an app. We currently accept these credit cards:
|
You can purchase products and services from Microsoft Store for Business using your credit card. You can enter your credit card information on **Payment methods**, or when you purchase an app. We currently accept these credit cards:
|
||||||
- VISA
|
- VISA
|
||||||
- MasterCard
|
- MasterCard
|
||||||
|
@ -12,7 +12,7 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prerequisites for Microsoft Store for Business and Education
|
# Prerequisites for Microsoft Store for Business and Education
|
||||||
@ -22,6 +22,9 @@ ms.date: 03/10/2021
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
|
@ -8,13 +8,16 @@ ms.pagetype: store
|
|||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/31/2018
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Microsoft Store for Business and Education release history
|
# Microsoft Store for Business and Education release history
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Education regularly releases new and improved features. Here's a summary of new or updated features in previous releases.
|
Microsoft Store for Business and Education regularly releases new and improved features. Here's a summary of new or updated features in previous releases.
|
||||||
|
|
||||||
Looking for info on the latest release? Check out [What's new in Microsoft Store for Business and Education](whats-new-microsoft-store-business-education.md)
|
Looking for info on the latest release? Check out [What's new in Microsoft Store for Business and Education](whats-new-microsoft-store-business-education.md)
|
||||||
|
@ -13,7 +13,7 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/16/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Roles and permissions in Microsoft Store for Business and Education
|
# Roles and permissions in Microsoft Store for Business and Education
|
||||||
@ -23,6 +23,9 @@ ms.date: 03/16/2021
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
> Starting on April 14th, 2021, only free apps will be available in Microsoft Store for Business and Education. For more information, see [Microsoft Store for Business and Education](index.md).
|
||||||
|
|
||||||
@ -34,8 +37,8 @@ Microsoft Store for Business and Education has a set of roles that help admins a
|
|||||||
|
|
||||||
This table lists the global user accounts and the permissions they have in Microsoft Store.
|
This table lists the global user accounts and the permissions they have in Microsoft Store.
|
||||||
|
|
||||||
| | Global Administrator | Billing Administrator |
|
| | **Global Administrator** | **Billing Administrator** |
|
||||||
| :------------------------------ | :--------------------- | :--------------------- |
|
| ------------------------------ | --------------------- | --------------------- |
|
||||||
| **Sign up for Microsoft Store for Business and Education** | X | X |
|
| **Sign up for Microsoft Store for Business and Education** | X | X |
|
||||||
| **Modify company profile settings** | X | X |
|
| **Modify company profile settings** | X | X |
|
||||||
| **Purchase apps** | X | X |
|
| **Purchase apps** | X | X |
|
||||||
@ -50,8 +53,8 @@ Microsoft Store for Business has a set of roles that help IT admins and employee
|
|||||||
|
|
||||||
This table lists the roles and their permissions.
|
This table lists the roles and their permissions.
|
||||||
|
|
||||||
| | Admin | Purchaser | Device Guard signer |
|
| | **Admin** | **Purchaser** | **Device Guard signer** |
|
||||||
| :------------------------------ | :------ | :-------- | :------------------- |
|
| ------------------------------ | ------ | -------- | ------------------- |
|
||||||
| **Assign roles** | X | | |
|
| **Assign roles** | X | | |
|
||||||
| **Manage Microsoft Store for Business and Education settings** | X | | |
|
| **Manage Microsoft Store for Business and Education settings** | X | | |
|
||||||
| **Acquire apps** | X | X | |
|
| **Acquire apps** | X | X | |
|
||||||
|
@ -12,11 +12,15 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/01/2019
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Settings reference: Microsoft Store for Business and Education
|
# Settings reference: Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
|
|
||||||
The Microsoft Store for Business and Education has a group of settings that admins use to manage the store.
|
The Microsoft Store for Business and Education has a group of settings that admins use to manage the store.
|
||||||
|
|
||||||
| Setting | Description | Location under **Manage** |
|
| Setting | Description | Location under **Manage** |
|
||||||
|
@ -12,11 +12,15 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/17/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Sign code integrity policy with Device Guard signing
|
# Sign code integrity policy with Device Guard signing
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
> We are introducing a new version of the Device Guard Signing Service (DGSS) to be more automation friendly. The new version of the service (DGSS v2) is now available. As announced earlier, you will have until June 9, 2021 to transition to DGSS v2. On June 9, 2021, the existing web-based mechanisms for the current version of the DGSS service will be retired and will no longer be available for use. Please make plans to migrate to the new version of the service by June 9, 2021.
|
||||||
>
|
>
|
||||||
|
@ -12,7 +12,7 @@ author: cmcatee-MSFT
|
|||||||
manager: scotv
|
manager: scotv
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/10/2021
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Sign up and get started
|
# Sign up and get started
|
||||||
@ -22,6 +22,9 @@ ms.date: 03/10/2021
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
IT admins can sign up for Microsoft Store for Business and Education, and get started working with apps.
|
IT admins can sign up for Microsoft Store for Business and Education, and get started working with apps.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/13/2017
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshoot Microsoft Store for Business
|
# Troubleshoot Microsoft Store for Business
|
||||||
@ -22,6 +22,9 @@ ms.date: 10/13/2017
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Troubleshooting topics for Microsoft Store for Business.
|
Troubleshooting topics for Microsoft Store for Business.
|
||||||
|
|
||||||
## Can't find apps in private store
|
## Can't find apps in private store
|
||||||
|
@ -10,12 +10,16 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 03/18/2019
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Update Billing account settings
|
# Update Billing account settings
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
A billing account contains defining information about your organization.
|
A billing account contains defining information about your organization.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -8,22 +8,31 @@ ms.pagetype: store
|
|||||||
author: TrudyHa
|
author: TrudyHa
|
||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 10/31/2018
|
ms.date: 07/21/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# What's new in Microsoft Store for Business and Education
|
# What's new in Microsoft Store for Business and Education
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Microsoft Store for Business and Education regularly releases new and improved features.
|
Microsoft Store for Business and Education regularly releases new and improved features.
|
||||||
|
|
||||||
## Latest updates for Store for Business and Education
|
## Latest updates for Store for Business and Education
|
||||||
|
|
||||||
**October 2018**
|
**October 2018**
|
||||||
|
|
||||||
| | |
|
:::row:::
|
||||||
|-----------------------|---------------------------------|
|
:::column span="1":::
|
||||||
|  |**Use security groups with Private store apps**<br /><br /> On the details page for apps in your private store, you can set **Private store availability**. This allows you to choose which security groups can see an app in the private store. <br /><br />[Get more info](./app-inventory-management-microsoft-store-for-business.md#private-store-availability)<br /><br />**Applies to**:<br /> Microsoft Store for Business <br /> Microsoft Store for Education |
|

|
||||||
|
:::column-end:::
|
||||||
|
:::column span="1":::
|
||||||
|
**Use security groups with Private store apps**<br /><br /> On the details page for apps in your private store, you can set **Private store availability**. This allows you to choose which security groups can see an app in the private store. <br /><br />[Get more info](./app-inventory-management-microsoft-store-for-business.md#private-store-availability)<br /><br />**Applies to**:<br /> Microsoft Store for Business <br /> Microsoft Store for Education
|
||||||
|
:::column-end:::
|
||||||
|
:::row-end:::
|
||||||
|
|
||||||
|
|
||||||
<!---
|
<!---
|
||||||
We’ve been working on bug fixes and performance improvements to provide you a better experience. Stay tuned for new features!
|
We’ve been working on bug fixes and performance improvements to provide you a better experience. Stay tuned for new features!
|
||||||
|
@ -12,7 +12,7 @@ author: TrudyHa
|
|||||||
ms.author: TrudyHa
|
ms.author: TrudyHa
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 3/19/2018
|
ms.date: 07/21/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Working with line-of-business apps
|
# Working with line-of-business apps
|
||||||
@ -22,6 +22,9 @@ ms.date: 3/19/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Microsoft Store for Business and Microsoft Store for Education will be retired in the first quarter of 2023. You can continue to use the current capabilities of free apps until that time. For more information about this change, see [Evolving the Microsoft Store for Business and Education](https://aka.ms/windows/msfb_evolution).
|
||||||
|
|
||||||
Your company or school can make line-of-business (LOB) applications available through Microsoft Store for Business or Microsoft Store for Education. These apps are custom to your school or organization – they might be internal apps, or apps specific to your school, business, or industry.
|
Your company or school can make line-of-business (LOB) applications available through Microsoft Store for Business or Microsoft Store for Education. These apps are custom to your school or organization – they might be internal apps, or apps specific to your school, business, or industry.
|
||||||
|
|
||||||
Developers within your organization, or ISVs that you invite, can become LOB publishers and submit apps to Microsoft Store for your company or school. Once an LOB publisher submits an app for your company, the app is only available to your company. LOB publishers submit apps through the Windows Dev Center using the same process as all apps that are in Microsoft Store, and then can be managed or deployed using the same process as any other app that has been acquired through Microsoft Store.
|
Developers within your organization, or ISVs that you invite, can become LOB publishers and submit apps to Microsoft Store for your company or school. Once an LOB publisher submits an app for your company, the app is only available to your company. LOB publishers submit apps through the Windows Dev Center using the same process as all apps that are in Microsoft Store, and then can be managed or deployed using the same process as any other app that has been acquired through Microsoft Store.
|
||||||
|
After Width: | Height: | Size: 81 KiB |
After Width: | Height: | Size: 240 KiB |
After Width: | Height: | Size: 120 KiB |
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 33 KiB |
After Width: | Height: | Size: 36 KiB |
After Width: | Height: | Size: 97 KiB |
After Width: | Height: | Size: 203 KiB |
After Width: | Height: | Size: 202 KiB |
After Width: | Height: | Size: 47 KiB |
After Width: | Height: | Size: 42 KiB |
After Width: | Height: | Size: 66 KiB |
After Width: | Height: | Size: 20 KiB |
After Width: | Height: | Size: 45 KiB |
After Width: | Height: | Size: 26 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 26 KiB |
After Width: | Height: | Size: 27 KiB |
@ -0,0 +1,684 @@
|
|||||||
|
---
|
||||||
|
title: Manage Device Installation with Group Policy (Windows 10)
|
||||||
|
description: Find out how to manage Device Installation Restrictions with Group Policy.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
author: barakm
|
||||||
|
ms.date: 07/05/2021
|
||||||
|
ms.reviewer:
|
||||||
|
manager: barakm
|
||||||
|
ms.author: barakm
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Manage Device Installation with Group Policy
|
||||||
|
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10, Windows Server 2022
|
||||||
|
|
||||||
|
|
||||||
|
## Summary
|
||||||
|
By using Windows 10 operating systems, administrators can determine what devices can be installed on computers they manage. This guide summarizes the device installation process and demonstrates several techniques for controlling device installation by using Group Policy.
|
||||||
|
|
||||||
|
## Introduction
|
||||||
|
|
||||||
|
### General
|
||||||
|
This step-by-step guide describes how you can control device installation on the computers that you manage, including designating which devices users can and cannot install. This guide applies to all Windows 10 versions starting with RS5 (1809). The guide includes the following scenarios:
|
||||||
|
|
||||||
|
- Prevent users from installing devices that are on a "prohibited" list. If a device is not on the list, then the user can install it.
|
||||||
|
- Allow users to install only devices that are on an "approved" list. If a device is not on the list, then the user cannot install it.
|
||||||
|
|
||||||
|
This guide describes the device installation process and introduces the device identification strings that Windows uses to match a device with the device-driver packages available on a machine. The guide also illustrates two methods of controlling device installation. Each scenario shows, step by step, one method you can use to allow or prevent the installation of a specific device or a class of devices.
|
||||||
|
|
||||||
|
The example device used in the scenarios is a USB storage device. You can perform the steps in this guide using a different device. However, if you use a different device, then the instructions in the guide will not exactly match the user interface that appears on the computer.
|
||||||
|
|
||||||
|
It is important to understand that the Group Policies that are presented in this guide are only apply to machines/machine-groups, not to users/user-groups.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The steps provided in this guide are intended for use in a test lab environment. This step-by-step guide is not meant to be used to deploy Windows Server features without accompanying documentation and should be used with discretion as a stand-alone document.
|
||||||
|
|
||||||
|
### Who Should Use This Guide?
|
||||||
|
|
||||||
|
This guide is targeted at the following audiences:
|
||||||
|
|
||||||
|
- Information technology planners and analysts who are evaluating Windows 10 and Windows Server 2022
|
||||||
|
- Enterprise information technology planners and designers
|
||||||
|
- Security architects who are responsible for implementing trustworthy computing in their organization
|
||||||
|
- Administrators who want to become familiar with the technology
|
||||||
|
|
||||||
|
### Benefits of Controlling Device Installation Using Group Policy
|
||||||
|
|
||||||
|
Restricting the devices that users can install reduces the risk of data theft and reduces the cost of support.
|
||||||
|
|
||||||
|
#### Reduce the risk of data theft
|
||||||
|
|
||||||
|
It is more difficult for users to make unauthorized copies of company data if users' computers cannot install unapproved devices that support removable media. For example, if users cannot install a USB thumb-drive device, they cannot download copies of company data onto a removable storage. This benefit cannot eliminate data theft, but it creates another barrier to unauthorized removal of data.
|
||||||
|
|
||||||
|
#### Reduce support costs
|
||||||
|
|
||||||
|
You can ensure that users install only those devices that your technical support team is trained and equipped to support. This benefit reduces support costs and user confusion.
|
||||||
|
|
||||||
|
|
||||||
|
## Scenario Overview
|
||||||
|
|
||||||
|
The scenarios presented in this guide illustrate how you can control device installation and usage on the computers that you manage. The scenarios use Group Policy on a local machine to simplify using the procedures in a lab environment. In an environment where you manage multiple client computers, you should apply these settings using Group Policy.. With Group Policy deployed by Active Directory, you can apply settings to all computers that are members of a domain or an organizational unit in a domain. For more information about how to use Group Policy to manage your client computers, see Group Policy at the Microsoft Web site.
|
||||||
|
|
||||||
|
Group Policy guides:
|
||||||
|
|
||||||
|
- [Create a Group Policy Object (Windows 10) - Windows security](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object)
|
||||||
|
- [Advanced Group Policy Management - Microsoft Desktop Optimization Pack](/microsoft-desktop-optimization-pack/agpm)
|
||||||
|
|
||||||
|
### Scenario #1: Prevent installation of all printers
|
||||||
|
|
||||||
|
In this scenario, the administrator wants to prevent users from installing any printers. Thus is a basic scenario to introduce you to the ‘prevent/allow’ functionality of Device Installation policies in Group Policy.
|
||||||
|
|
||||||
|
### Scenario #2: Prevent installation of a specific printer
|
||||||
|
|
||||||
|
In this scenario, the administrator allows standard users to install all printers while but preventing them from installing a specific one.
|
||||||
|
|
||||||
|
### Scenario #3: Prevent installation of all printers while allowing a specific printer to be installed
|
||||||
|
|
||||||
|
In this scenario, you will combine what you learned from both scenario #1 and scenario #2. The administrator wants to allow standard users to install only a specific printer while preventing the installation of all other printers. This is a more realistic scenario and brings you a step farther in understanding of the Device Installation Restrictions policies.
|
||||||
|
|
||||||
|
### Scenario #4: Prevent installation of a specific USB device
|
||||||
|
|
||||||
|
This scenario, although similar to scenario #2, brings another layer of complexity – how does device connectivity work in the PnP tree. The administrator wants to prevent standard users from installing a specific USB device. By the end of the scenario, you should understand the way devices are nested in layers under the PnP device connectivity tree.
|
||||||
|
|
||||||
|
### Scenario #5: Prevent installation of all USB devices while allowing an installation of only an authorized USB thumb drive
|
||||||
|
|
||||||
|
In this scenario, combining all previous 4 scenarios, you will learn how to protect a machine from all unauthorized USB devices. The administrator wants to allow users to install only a small set of authorized USB devices while preventing any other USB device from being installed. In addition, this scenario includes an explanation of how to apply the ‘prevent’ functionality to existing USB devices that have already been installed on the machine, and the administrator likes to prevent any farther interaction with them (blocking them all together). This scenario builds on the policies and structure we introduced in the first 4 scenarios and therefore it is preferred to go over them first before attempting this scenario.
|
||||||
|
|
||||||
|
|
||||||
|
## Technology Review
|
||||||
|
|
||||||
|
The following sections provide a brief overview of the core technologies discussed in this guide and give background information that is necessary to understand the scenarios.
|
||||||
|
|
||||||
|
### Device Installation in Windows
|
||||||
|
|
||||||
|
A device is a piece of hardware with which Windows interacts to perform some function, or in a more technical definition - it is a single instance of a hardware component with a unique representation in the Windows Plug and Play subsystem. Windows can communicate with a device only through a piece of software called a device-driver (also known as a _driver_). To install a driver, Windows detects the device, recognizes its type, and then finds the driver that matches that type.
|
||||||
|
|
||||||
|
When Windows detects a device that has never been installed on the computer, the operating system queries the device to retrieve its list of device identification strings. A device usually has multiple device identification strings, which the device manufacturer assigns. The same device identification strings are included in the .inf file (also known as an _INF_) that is part of the driver package. Windows chooses which driver package to install by matching the device identification strings retrieved from the device to those included with the driver packages.
|
||||||
|
|
||||||
|
Windows uses four types of identifiers to control device installation and configuration. You can use the Group Policy settings in Windows 10 to specify which of these identifiers to allow or block.
|
||||||
|
|
||||||
|
The four types of identifiers are:
|
||||||
|
|
||||||
|
- Device Instance ID
|
||||||
|
- Device ID
|
||||||
|
- Device setup classes
|
||||||
|
- ‘Removable Devices’ device type
|
||||||
|
|
||||||
|
#### Device Instance ID
|
||||||
|
|
||||||
|
A device instance ID is a system-supplied device identification string that uniquely identifies a device in the system. The Plug and Play (PnP) manager assigns a device instance ID to each device node (devnode) in a system's device tree.
|
||||||
|
|
||||||
|
#### Device ID
|
||||||
|
|
||||||
|
Windows can use each string to match a device to a driver package. The strings range from the specific, matching a single make and model of a device, to the general, possibly applying to an entire class of devices. There are two types of device identification strings: hardware IDs and compatible IDs.
|
||||||
|
|
||||||
|
##### Hardware IDs
|
||||||
|
|
||||||
|
Hardware IDs are the identifiers that provide the exact match between a device and a driver package. The first string in the list of hardware IDs is referred to as the device ID, because it matches the exact make, model, and revision of the device. The other hardware IDs in the list match the details of the device less exactly. For example, a hardware ID might identify the make and model of the device but not the specific revision. This scheme allows Windows to use a driver for a different revision of the device if the driver for the correct revision is not available.
|
||||||
|
|
||||||
|
##### Compatible IDs
|
||||||
|
|
||||||
|
Windows uses these identifiers to select a driver if the operating system cannot find a match with the device ID or any of the other hardware IDs. Compatible IDs are listed in the order of decreasing suitability. These strings are optional, and, when provided, they are very generic, such as Disk. When a match is made using a compatible ID, you can typically use only the most basic functions of the device.
|
||||||
|
|
||||||
|
When you install a device, such as a printer, a USB storage device, or a keyboard, Windows searches for driver packages that match the device you are attempting to install. During this search, Windows assigns a "rank" to each driver package it discovers with at least one match to a hardware or compatible ID. The rank indicates how well the driver matches the device. Lower rank numbers indicate better matches between the driver and the device. A rank of zero represents the best possible match. A match with the device ID to one in the driver package results in a lower (better) rank than a match to one of the other hardware IDs. Similarly, a match to a hardware ID results in a better rank than a match to any of the compatible IDs. After Windows ranks all of the driver packages, it installs the one with the lowest overall rank. For more information about the process of ranking and selecting driver packages, see How Setup Selects Drivers in the Microsoft Docs library.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> For more information about the driver installation process, see the "Technology review" section of the Step-by-Step Guide to Driver Signing and Staging.
|
||||||
|
|
||||||
|
Some physical devices create one or more logical devices when they are installed. Each logical device might handle part of the functionality of the physical device. For example, a multi-function device, such as an all-in-one scanner/fax/printer, might have a different device identification string for each function.
|
||||||
|
|
||||||
|
When you use Device Installation policies to allow or prevent the installation of a device that uses logical devices, you must allow or prevent all of the device identification strings for that device. For example, if a user attempts to install a multifunction device and you did not allow or prevent all of the identification strings for both physical and logical devices, you could get unexpected results from the installation attempt. For more detailed information about hardware IDs, see Device Identification Strings in Microsoft Docs.
|
||||||
|
|
||||||
|
#### Device setup classes
|
||||||
|
|
||||||
|
Device setup classes (also known as _Class_) are another type of identification string. The manufacturer assigns the Class to a device in the driver package. The Class groups devices that are installed and configured in the same way. For example, all Biometric devices are belong to the Biometric Class (ClassGuid = {53D29EF7-377C-4D14-864B-EB3A85769359}), and they use the same co-installer when installed. A long number called a globally unique identifier (GUID) represents each device setup class. When Windows starts, it builds an in-memory tree structure with the GUIDs for all of the detected devices. Along with the GUID for the Class of the device itself, Windows may need to insert into the tree the GUID for the Class of the bus to which the device is attached.
|
||||||
|
|
||||||
|
When you use device Classes to allow or prevent users from installing drivers, you must specify the GUIDs for all of the device's device setup classes, or you might not achieve the results you want. The installation might fail (if you want it to succeed) or it might succeed (if you want it to fail).
|
||||||
|
|
||||||
|
For example, a multi-function device, such as an all-in-one scanner/fax/printer, has a GUID for a generic multi-function device, a GUID for the printer function, a GUID for the scanner function, and so on. The GUIDs for the individual functions are "child nodes" under the multi-function device GUID. To install a child node, Windows must also be able to install the parent node. You must allow installation of the device setup class of the parent GUID for the multi-function device in addition to any child GUIDs for the printer and scanner functions.
|
||||||
|
|
||||||
|
For more information, see [Device Setup Classes](/windows-hardware/drivers/install/overview-of-device-setup-classes) in Microsoft Docs.
|
||||||
|
|
||||||
|
This guide does not depict any scenarios that use device setup classes. However, the basic principles demonstrated with device identification strings in this guide also apply to device setup classes. After you discover the device setup class for a specific device, you can then use it in a policy to either allow or prevent installation of drivers for that class of devices.
|
||||||
|
|
||||||
|
The following two links provide the complete list of Device Setup Classes. ‘System Use’ classes are mostly refer to devices that come with a computer/machine from the factory, while ‘Vendor’ classes are mostly refer to devices that could be connected to an existing computer/machine:
|
||||||
|
|
||||||
|
- [System-Defined Device Setup Classes Available to Vendors - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors)
|
||||||
|
- [System-Defined Device Setup Classes Reserved for System Use - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-reserved-for-system-use)
|
||||||
|
|
||||||
|
#### ‘Removable Device’ Device type
|
||||||
|
|
||||||
|
Some devices could be classified as _Removable Device_. A device is considered _removable_ when the driver for the device to which it is connected indicates that the device is removable. For example, a USB device is reported to be removable by the drivers for the USB hub to which the device is connected.
|
||||||
|
|
||||||
|
|
||||||
|
### Group Policy Settings for Device Installation
|
||||||
|
|
||||||
|
Group Policy is an infrastructure that allows you to specify managed configurations for users and computers through Group Policy settings and Group Policy Preferences.
|
||||||
|
|
||||||
|
Device Installation section in Group Policy is a set of policies that control which device could or could not be installed on a machine. Whether you want to apply the settings to a stand-alone computer or to many computers in an Active Directory domain, you use the Group Policy Object Editor to configure and apply the policy settings. For more details, see Group Policy Object Editor Technical Reference.
|
||||||
|
|
||||||
|
The following passages are brief descriptions of the Device Installation policies that are used in this guide.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Device Installation control is applied only to machines (‘computer configuration’) and not users (‘user configuration’) by the nature of the Windows OS design. These policy settings affect all users who log on to the computer where the policy settings are applied. You cannot apply these policies to specific users or groups except for the policy Allow administrators to override device installation policy. This policy exempts members of the local Administrators group from any of the device installation restrictions that you apply to the computer by configuring other policy settings as described in this section.
|
||||||
|
|
||||||
|
#### Allow administrators to override Device Installation Restriction policies
|
||||||
|
|
||||||
|
This policy setting allows members of the local Administrators group to install and update the drivers for any device, regardless of other policy settings. If you enable this policy setting, administrators can use the Add Hardware Wizard or the Update Driver Wizard to install and update the drivers for any device. If you disable or do not configure this policy setting, administrators are subject to all policy settings that restrict device installation.
|
||||||
|
|
||||||
|
#### Allow installation of devices that match any of these device IDs
|
||||||
|
|
||||||
|
This policy setting specifies a list of Plug and Play hardware IDs and compatible IDs that describe devices that users can install. This setting is intended to be used only when the Prevent installation of devices not described by other policy settings policy setting is enabled and does not take precedence over any policy setting that would prevent users from installing a device. If you enable this policy setting, users can install and update any device with a hardware ID or compatible ID that matches an ID in this list if that installation has not been specifically prevented by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation of removable devices policy setting. If another policy setting prevents users from installing a device, users cannot install it even if the device is also described by a value in this policy setting. If you disable or do not configure this policy setting and no other policy describes the device, the Prevent installation of devices not described by other policy settings policy setting determines whether users can install the device.
|
||||||
|
|
||||||
|
#### Allow installation of devices that match any of these device instance IDs
|
||||||
|
|
||||||
|
This policy setting allows you to specify a list of Plug and Play device instance IDs for devices that Windows is allowed to install. Use this policy setting only when the "Prevent installation of devices not described by other policy settings" policy setting is enabled. Other policy settings that prevent device installation take precedence over this one. If you enable this policy setting, Windows is allowed to install or update any device whose Plug and Play device instance ID appears in the list you create, unless another policy setting specifically prevents that installation (for example, the "Prevent installation of devices that match any of these device IDs" policy setting, the "Prevent installation of devices for these device classes" policy setting, the "Prevent installation of devices that match any of these device instance IDs" policy setting, or the "Prevent installation of removable devices" policy setting). If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server.
|
||||||
|
|
||||||
|
#### Allow installation of devices using drivers that match these device setup classes
|
||||||
|
|
||||||
|
This policy setting specifies a list of device setup class GUIDs that describe devices that users can install. This setting is intended to be used only when the Prevent installation of devices not described by other policy settings policy setting is enabled and does not take precedence over any policy setting that would prevent users from installing a device. If you enable this setting, users can install and update any device with a hardware ID or compatible ID that matches one of the IDs in this list if that installation has not been specifically prevented by the Prevent installation of devices that match these device IDs policy setting, the Prevent installation of devices for these device classes policy setting, or the Prevent installation of removable devices policy setting. If another policy setting prevents users from installing a device, users cannot install it even if the device is also described by a value in this policy setting. If you disable or do not configure this policy setting and no other policy setting describes the device, the Prevent installation of devices not described by other policy settings policy setting determines whether users can install the device.
|
||||||
|
|
||||||
|
#### Prevent installation of devices that match these device IDs
|
||||||
|
|
||||||
|
This policy setting specifies a list of Plug and Play hardware IDs and compatible IDs for devices that users cannot install. If you enable this policy setting, users cannot install or update the driver for a device if its hardware ID or compatible ID matches one in this list. If you disable or do not configure this policy setting, users can install devices and update their drivers, as permitted by other policy settings for device installation.
|
||||||
|
Note: This policy setting takes precedence over any other policy settings that allow users to install a device. This policy setting prevents users from installing a device even if it matches another policy setting that would allow installation of that device.
|
||||||
|
|
||||||
|
#### Prevent installation of devices that match any of these device instance IDs
|
||||||
|
|
||||||
|
This policy setting allows you to specify a list of Plug and Play device instance IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing a device whose device instance ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings.
|
||||||
|
|
||||||
|
#### Prevent installation of devices using drivers that match these device setup classes
|
||||||
|
|
||||||
|
This policy setting specifies a list of Plug and Play device setup class GUIDs for devices that users cannot install. If you enable this policy setting, users cannot install or update devices that belong to any of the listed device setup classes. If you disable or do not configure this policy setting, users can install and update devices as permitted by other policy settings for device installation.
|
||||||
|
Note: This policy setting takes precedence over any other policy settings that allow users to install a device. This policy setting prevents users from installing a device from being installed even if it matches another policy setting that would allow installation of that device.
|
||||||
|
|
||||||
|
### Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria
|
||||||
|
|
||||||
|
This policy setting will change the evaluation order in which Allow and Prevent policy settings are applied when more than one install policy setting is applicable for a given device. Enable this policy setting to ensure that overlapping device match criteria is applied based on an established hierarchy where more specific match criteria supersedes less specific match criteria. The hierarchical order of evaluation for policy settings that specify device match criteria is as follows:
|
||||||
|
|
||||||
|
> **Device instance IDs** > **Device IDs** > **Device setup class** > **Removable devices**
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This policy setting provides more granular control than the "Prevent installation of devices not described by other policy settings" policy setting. If these conflicting policy settings are enabled at the same time, the "Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria" policy setting will be enabled and the other policy setting will be ignored.
|
||||||
|
>
|
||||||
|
> If you disable or do not configure this policy setting, the default evaluation is used. By default, all "Prevent installation..." policy settings have precedence over any other policy setting that allows Windows to install a device.
|
||||||
|
|
||||||
|
Some of these policies take precedence over other policies. The flowchart shown below illustrates how Windows processes them to determine whether a user can install a device or not, as shown in Figure below.
|
||||||
|
|
||||||
|
<br/>_Device Installation policies flow chart_
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
## Requirements for completing the scenarios
|
||||||
|
|
||||||
|
### General
|
||||||
|
|
||||||
|
To complete each of the scenarios, please ensure your have:
|
||||||
|
|
||||||
|
- A client computer running Windows 10.
|
||||||
|
|
||||||
|
- A USB thumb drive. The scenarios described in this guide use a USB thumb drive as the example device (also known as a “removable disk drive”, "memory drive," a "flash drive," or a "keyring drive"). Most USB thumb drives do not require any manufacturer-provided drivers, and these devices work with the inbox drivers provided with the Windows build.
|
||||||
|
|
||||||
|
- A USB/network printer pre-installed on the machine.
|
||||||
|
|
||||||
|
- Access to the administrator account on the testing machine. The procedures in this guide require administrator privileges for most steps.
|
||||||
|
|
||||||
|
### Understanding implications of applying ‘Prevent’ policies retroactive
|
||||||
|
|
||||||
|
All ‘Prevent’ policies have an option to apply the block functionality to already installed devices—devices that have been installed on the machine before the policy took effect. Using this option is recommended when the administrator is not sure of the installation history of devices on the machine and would like to make sure the policy applies to all devices.
|
||||||
|
|
||||||
|
For example: A printer is already installed on the machine, preventing the installation of all printers will block any future printer from being installed while keeping only the installed printer usable. To apply the block retroactive, the administrator should check mark the “apply this policy to already installed devices” option. Marking this option will prevent access to already installed devices in addition to any future ones.
|
||||||
|
|
||||||
|
This is a powerful tool, but as such it has to be used carefully.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Applying the ‘Prevent retroactive’ option to crucial devices could render the machine useless/unacceptable! For example: Preventing retroactive all ‘Disk Drives’ could block the access to the disk on which the OS boots with; Preventing retroactive all ‘Net’ could block this machine from accessing network and to fix the issue the admin will have to have a direct connection.
|
||||||
|
|
||||||
|
## Determine device identification strings
|
||||||
|
|
||||||
|
By following these steps, you can determine the device identification strings for your device. If the hardware IDs and compatible IDs for your device do not match those shown in this guide, use the IDs that are appropriate to your device (this applies to Instance IDs and Classes, but we are not going to give an example for them in this guide).
|
||||||
|
|
||||||
|
You can determine the hardware IDs and compatible IDs for your device in two ways. You can use Device Manager, a graphical tool included with the operating system, or PnPUtil, a command-line tool available for all Windows versions. Use the following procedure to view the device identification strings for your device.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> These procedures are specific to a Canon printer. If you are using a different type of device, you must adjust the steps accordingly. The significant difference will be the location of the device in the Device Manager hierarchy. Instead of being located in the Printers node, you must locate your device in the appropriate node.
|
||||||
|
|
||||||
|
To find device identification strings using Device Manager
|
||||||
|
|
||||||
|
1. Make sure your printer is plugged in and installed.
|
||||||
|
|
||||||
|
2. To open Device Manager, click the Start button, type mmc devmgmt.msc in the Start Search box, and then press ENTER; or search for Device Manager as application.
|
||||||
|
|
||||||
|
3. Device Manager starts and displays a tree representing all of the devices detected on your computer. At the top of the tree is a node with your computers name next to it. Lower nodes represent the various categories of hardware into which your computers devices are grouped.
|
||||||
|
|
||||||
|
4. Find the “Printers” section and find the target printer
|
||||||
|
|
||||||
|
<br/>_Selecting the printer in Device Manager_
|
||||||
|
|
||||||
|
5. Double-click the printer and move to the ‘Details’ tab.
|
||||||
|
|
||||||
|
<br/>_Open the ‘Details’ tab to look for the device identifiers_
|
||||||
|
|
||||||
|
6. From the ‘Value’ window, copy the most detailed Hardware ID – we will use this in the policies.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
<br/>_HWID and Compatible ID_
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> You can also determine your device identification strings by using the PnPUtil command-line utility. For more information, see [PnPUtil - Windows drivers](/windows-hardware/drivers/devtest/pnputil) in Microsoft Docs.
|
||||||
|
|
||||||
|
### Getting device identifiers using PnPUtil
|
||||||
|
|
||||||
|
```console
|
||||||
|
pnputil /enum-devices /deviceids
|
||||||
|
```
|
||||||
|
|
||||||
|
Here is an example of an output for a single device on a machine:
|
||||||
|
|
||||||
|
```console
|
||||||
|
<snip>
|
||||||
|
Instance ID: PCI\VEN_8086&DEV_2F34&SUBSYS_2F348086&REV_02\3&103a9d54&0&81
|
||||||
|
Device Description: Intel(R) Xeon(R) E7 v3/Xeon(R) E5 v3/Core i7 PCIe Ring Interface - 2F34
|
||||||
|
Class Name: System
|
||||||
|
Class GUID: {4d36e97d-e325-11ce-bfc1-08002be10318}
|
||||||
|
Manufacturer Name: INTEL
|
||||||
|
Status: Stopped
|
||||||
|
Driver Name: oem6.inf
|
||||||
|
Hardware IDs: PCI\VEN_8086&DEV_2F34&SUBSYS_2F348086&REV_02
|
||||||
|
PCI\VEN_8086&DEV_2F34&SUBSYS_2F348086
|
||||||
|
PCI\VEN_8086&DEV_2F34&CC_110100
|
||||||
|
PCI\VEN_8086&DEV_2F34&CC_1101
|
||||||
|
Compatible IDs: PCI\VEN_8086&DEV_2F34&REV_02
|
||||||
|
PCI\VEN_8086&DEV_2F34
|
||||||
|
PCI\VEN_8086&CC_110100
|
||||||
|
PCI\VEN_8086&CC_1101
|
||||||
|
PCI\VEN_8086
|
||||||
|
PCI\CC_110100
|
||||||
|
PCI\CC_1101
|
||||||
|
<snip>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Scenario #1: Prevent installation of all printers
|
||||||
|
|
||||||
|
In this simple scenario, you will learn how to prevent the installation of an entire Class of devices.
|
||||||
|
|
||||||
|
### Setting up the environment
|
||||||
|
|
||||||
|
Setting up the environment for the scenario with the following steps:
|
||||||
|
|
||||||
|
1. Open Group Policy Editor and navigate to the Device Installation Restriction section.
|
||||||
|
|
||||||
|
2. Disable all previous Device Installation policies, except ‘Apply layered order of evaluation’—although the policy is disabled in default, this policy is recommended to be enabled in most practical applications.
|
||||||
|
|
||||||
|
3. If there are any enabled policies, changing their status to ‘disabled’, would clear them from all parameters
|
||||||
|
|
||||||
|
4. Have a USB/network printer available to test the policy with
|
||||||
|
|
||||||
|
### Scenario steps – preventing installation of prohibited devices
|
||||||
|
|
||||||
|
Getting the right device identifier to prevent it from being installed:
|
||||||
|
|
||||||
|
1. If you have on your system a device from the class you want to block, you could follow the steps in the previous section to find the Device Class identifier through Device Manager or PnPUtil (Class GUID).
|
||||||
|
|
||||||
|
2. If you don’t have such device installed on your system or know the name of the class, you can check the following two links:
|
||||||
|
|
||||||
|
- [System-Defined Device Setup Classes Available to Vendors - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-available-to-vendors)
|
||||||
|
- [System-Defined Device Setup Classes Reserved for System Use - Windows drivers](/windows-hardware/drivers/install/system-defined-device-setup-classes-reserved-for-system-use)
|
||||||
|
|
||||||
|
3. Our current scenario is focused on preventing all printers from being installed, as such here is the Class GUID for most of printers in the market:
|
||||||
|
|
||||||
|
> Printers\
|
||||||
|
> Class = Printer\
|
||||||
|
> ClassGuid = {4d36e979-e325-11ce-bfc1-08002be10318}\
|
||||||
|
> This class includes printers.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> As mentioned before, preventing an entire Class could block you from using your system completely. Please make sure you understand which devices are going to be blocked when specifying a Class. For our scenario, there are other classes that relate to printers but before you apply them, make sure they are not blocking any other existing device that is crucial to your system.
|
||||||
|
|
||||||
|
Creating the policy to prevent all printers from being installed:
|
||||||
|
|
||||||
|
1. Open Group Policy Object Editor—either click the Start button, type mmc gpedit.msc in the Start Search box, and then press ENTER; or type in the Windows search “Group Policy Editor” and open the UI.
|
||||||
|
|
||||||
|
2. Navigate to the Device Installation Restriction page:
|
||||||
|
|
||||||
|
> Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
|
||||||
|
|
||||||
|
3. Make sure all policies are disabled (recommended to keep ‘applied layered order of evaluation’ policy enabled).
|
||||||
|
|
||||||
|
4. Open **Prevent installation of devices using drivers that match these device setup classes** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
5. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the class identifier to block.
|
||||||
|
|
||||||
|
6. Enter the printer class GUID you found above with the curly braces (this is important! Otherwise, it won’t work): {4d36e979-e325-11ce-bfc1-08002be10318}
|
||||||
|
|
||||||
|
<br/>_List of prevent Class GUIDs_
|
||||||
|
|
||||||
|
7. Click ‘OK’.
|
||||||
|
|
||||||
|
8. Click ‘Apply’ on the bottom right of the policy’s window – this pushes the policy and blocks all future printer installations, but doesn’t apply to existing installs.
|
||||||
|
|
||||||
|
9. Optional – if you would like to apply the policy to existing installs: Open the **Prevent installation of devices using drivers that match these device setup classes** policy again; in the ‘Options’ window mark the checkbox that says ‘also apply to matching devices that are already installed’
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Using a Prevent policy (like the one we used in scenario #1 above) and applying it to all previously installed devices (see step #9) could render crucial devices unusable; hence, use with caution. For example: If an IT admin wants to prevent all removable storage devices from being installed on the machine, using ‘Disk Drive’ class for blocking and applying it retroactive could render the internal hard-drive unusable and to break the machine.
|
||||||
|
|
||||||
|
### Testing the scenario
|
||||||
|
|
||||||
|
1. If you have not completed step #9 – follow these steps:
|
||||||
|
|
||||||
|
- Uninstall your printer: Device Manager > Printers > right click the Canon Printer > click “Uninstall device”.
|
||||||
|
- For USB printer – unplug and plug back the cable; for network device – make a search for the printer in the Windows Settings app.
|
||||||
|
- You should not be able to reinstall the printer.
|
||||||
|
|
||||||
|
2. If you completed step #9 above and restarted the machine, simply look for your printer under Device Manager or the Windows Settings app and see that it is no-longer available for you to use.
|
||||||
|
|
||||||
|
## Scenario #2: Prevent installation of a specific printer
|
||||||
|
|
||||||
|
This scenario builds upon scenario #1, Prevent installation of all printers. In this scenario, you target a specific printer to prevent from being installed on the machine.
|
||||||
|
|
||||||
|
### Setting up the environment
|
||||||
|
|
||||||
|
Setting up the environment for the scenario with the following steps:
|
||||||
|
|
||||||
|
1. Open Group Policy Editor and navigate to the Device Installation Restriction section.
|
||||||
|
|
||||||
|
2. Make sure all previous Device Installation policies are disabled except ‘Apply layered order of evaluation’ (this is optional to be On/Off this scenario). Although the policy is disabled in default, it is recommended to be enabled in most practical applications. For scenario #2 it is optional.
|
||||||
|
|
||||||
|
### Scenario steps – preventing installation of a specific device
|
||||||
|
|
||||||
|
Getting the right device identifier to prevent it from being installed:
|
||||||
|
|
||||||
|
1. Get your printer’s Hardware ID – in this example we will use the identifier we found previously
|
||||||
|
|
||||||
|
<br/>_Printer Hardware ID_
|
||||||
|
|
||||||
|
2. Write down the device ID (in this case Hardware ID) – WSDPRINT\CanonMX920_seriesC1A0; Take the more specific identifier to make sure you block a specific printer and not a family of printers
|
||||||
|
|
||||||
|
Creating the policy to prevent a single printer from being installed:
|
||||||
|
|
||||||
|
1. Open Group Policy Object Editor – either click the Start button, type mmc gpedit.msc in the Start Search box, and then press ENTER; or type in the Windows search “Group Policy Editor” and open the UI.
|
||||||
|
|
||||||
|
2. Navigate to the Device Installation Restriction page:
|
||||||
|
|
||||||
|
> Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
|
||||||
|
|
||||||
|
3. Open **Prevent installation of devices that match any of these device IDs** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
4. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the device identifier to block.
|
||||||
|
|
||||||
|
5. Enter the printer device ID you found above – WSDPRINT\CanonMX920_seriesC1A0
|
||||||
|
|
||||||
|
<br/>_Prevent Device ID list_
|
||||||
|
|
||||||
|
6. Click ‘OK’.
|
||||||
|
|
||||||
|
7. Click ‘Apply’ on the bottom right of the policy’s window. This pushes the policy and blocks the target printer in future installations, but doesn’t apply to an existing install.
|
||||||
|
|
||||||
|
8. Optional – if you would like to apply the policy to an existing install: Open the **Prevent installation of devices that match any of these device IDs** policy again; in the ‘Options’ window mark the checkbox that says ‘also apply to matching devices that are already installed’.
|
||||||
|
|
||||||
|
### Testing the scenario
|
||||||
|
|
||||||
|
If you completed step #8 above and restarted the machine, simply look for your printer under Device Manager or the Windows Settings app and see that it is no-longer available for you to use.
|
||||||
|
|
||||||
|
If you have not completed step #8, follow these steps:
|
||||||
|
|
||||||
|
1. Uninstall your printer: Device Manager > Printers > right click the Canon Printer > click “Uninstall device”.
|
||||||
|
|
||||||
|
2. For USB printer – unplug and plug back the cable; for network device – make a search for the printer in the Windows Settings app.
|
||||||
|
|
||||||
|
3. You should not be able to reinstall the printer.
|
||||||
|
|
||||||
|
|
||||||
|
## Scenario #3: Prevent installation of all printers while allowing a specific printer to be installed
|
||||||
|
|
||||||
|
Now, using the knowledge from both previous scenarios, you will learn how to prevent the installation of an entire Class of devices while allowing a single printer to be installed.
|
||||||
|
|
||||||
|
### Setting up the environment
|
||||||
|
|
||||||
|
Setting up the environment for the scenario with the following steps:
|
||||||
|
|
||||||
|
1. Open Group Policy Editor and navigate to the Device Installation Restriction section.
|
||||||
|
|
||||||
|
2. Disable all previous Device Installation policies, and enable ‘Apply layered order of evaluation’.
|
||||||
|
|
||||||
|
3. If there are any enabled policies, changing their status to ‘disabled’, would clear them from all parameters.
|
||||||
|
|
||||||
|
4. Have a USB/network printer available to test the policy with.
|
||||||
|
|
||||||
|
### Scenario steps – preventing installation of an entire class while allowing a specific printer
|
||||||
|
|
||||||
|
Getting the device identifier for both the Printer Class and a specific printer – following the steps in scenario #1 to find Class identifier and scenario #2 to find Device identifier you could get the identifiers you need for this scenario:
|
||||||
|
|
||||||
|
- ClassGuid = {4d36e979-e325-11ce-bfc1-08002be10318}
|
||||||
|
- Hardware ID = WSDPRINT\CanonMX920_seriesC1A0
|
||||||
|
|
||||||
|
First create a ‘Prevent Class’ policy and then create ‘Allow Device’ one:
|
||||||
|
|
||||||
|
1. Open Group Policy Object Editor – either click the Start button, type mmc gpedit.msc in the Start Search box, and then press ENTER; or type in the Windows search “Group Policy Editor” and open the UI.
|
||||||
|
|
||||||
|
2. Navigate to the Device Installation Restriction page:
|
||||||
|
|
||||||
|
> Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
|
||||||
|
|
||||||
|
3. Make sure all policies are disabled
|
||||||
|
|
||||||
|
4. Open **Prevent installation of devices using drivers that match these device setup classes** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
5. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the class identifier to block.
|
||||||
|
|
||||||
|
6. Enter the printer class GUID you found above with the curly braces (this is important! Otherwise, it won’t work): {4d36e979-e325-11ce-bfc1-08002be10318}
|
||||||
|
|
||||||
|
<br/>_List of prevent Class GUIDs_
|
||||||
|
|
||||||
|
7. Click ‘OK’.
|
||||||
|
|
||||||
|
8. Click ‘Apply’ on the bottom right of the policy’s window – this pushes the policy and blocks all future printer installations, but doesn’t apply to existing installs.
|
||||||
|
|
||||||
|
9. To complete the coverage of all future and existing printers – Open the **Prevent installation of devices using drivers that match these device setup classes** policy again; in the ‘Options’ window mark the checkbox that says ‘also apply to matching devices that are already installed’ and click ‘OK’
|
||||||
|
|
||||||
|
10. Open the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy and enable it – this policy will enable you to override the wide coverage of the ‘Prevent’ policy with a specific device.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
<br/>_Apply layered order of evaluation policy_
|
||||||
|
|
||||||
|
9. Now Open **Allow installation of devices that match any of these device IDs** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
10. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the device identifier to allow.
|
||||||
|
|
||||||
|
11. Enter the printer device ID you found above: WSDPRINT\CanonMX920_seriesC1A0.
|
||||||
|
|
||||||
|
<br/>_Allow Printer Hardware ID_
|
||||||
|
|
||||||
|
12. Click ‘OK’.
|
||||||
|
|
||||||
|
13. Click ‘Apply’ on the bottom right of the policy’s window – this pushes the policy and allows the target printer to be installed (or stayed installed).
|
||||||
|
|
||||||
|
## Testing the scenario
|
||||||
|
|
||||||
|
1. Simply look for your printer under Device Manager or the Windows Settings app and see that it is still there and accessible. Or just print a test document.
|
||||||
|
|
||||||
|
2. Go back to the Group Policy Editor, disable **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy and test again your printer – you should not be bale to print anything or able to access the printer at all.
|
||||||
|
|
||||||
|
|
||||||
|
## Scenario #4: Prevent installation of a specific USB device
|
||||||
|
|
||||||
|
The scenario builds upon the knowledge from scenario #2, Prevent installation of a specific printer. In this scenario, you will gain an understanding of how some devices are built into the PnP (Plug and Play) device tree.
|
||||||
|
|
||||||
|
### Setting up the environment
|
||||||
|
|
||||||
|
Setting up the environment for the scenario with the following steps:
|
||||||
|
|
||||||
|
1. Open Group Policy Editor and navigate to the Device Installation Restriction section
|
||||||
|
|
||||||
|
2. Make sure all previous Device Installation policies are disabled except ‘Apply layered order of evaluation’ (this is optional to be On/Off this scenario) – although the policy is disabled in default, it is recommended to be enabled in most practical applications.
|
||||||
|
|
||||||
|
### Scenario steps – preventing installation of a specific device
|
||||||
|
|
||||||
|
Getting the right device identifier to prevent it from being installed and its location in the PnP tree:
|
||||||
|
|
||||||
|
1. Connect a USB thumb drive to the machine
|
||||||
|
|
||||||
|
2. Open Device Manager
|
||||||
|
|
||||||
|
3. Find the USB thumb-drive and select it.
|
||||||
|
|
||||||
|
<br/>_Selecting the usb thumb-drive in Device Manager_
|
||||||
|
|
||||||
|
4. Change View (in the top menu) to ‘Devices by connections’. This view represents the way devices are installed in the PnP tree.
|
||||||
|
|
||||||
|
<br/>_Changing view in Device Manager to see the PnP connection tree_
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> When blocking\Preventing a device that sits higher in the PnP tree, all the devices that sit under it will be blocked. For example: Preventing a “Generic USB Hub” from being installed, all the devices that lay below a “Generic USB Hub” will be blocked.
|
||||||
|
|
||||||
|
<br/>_When blocking one device, all the devices that are nested below it will be blocked as well_
|
||||||
|
|
||||||
|
5. Double-click the USB thumb-drive and move to the ‘Details’ tab.
|
||||||
|
|
||||||
|
6. From the ‘Value’ window, copy the most detailed Hardware ID—we will use this in the policies. In this case Device ID = USBSTOR\DiskGeneric_Flash_Disk______8.07
|
||||||
|
|
||||||
|
<br/>_USB device hardware IDs_
|
||||||
|
|
||||||
|
Creating the policy to prevent a single USB thumb-drive from being installed:
|
||||||
|
|
||||||
|
1. Open Group Policy Object Editor – either click the Start button, type mmc gpedit.msc in the Start Search box, and then press ENTER; or type in the Windows search “Group Policy Editor” and open the UI.
|
||||||
|
|
||||||
|
2. Navigate to the Device Installation Restriction page:
|
||||||
|
|
||||||
|
> Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
|
||||||
|
|
||||||
|
3. Open **Prevent installation of devices that match any of these device IDs** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
4. In the lower left side, in the ‘Options’ window, click the ‘Show’ box. This will take you to a table where you can enter the device identifier to block.
|
||||||
|
|
||||||
|
5. Enter the USB thumb-drive device ID you found above – USBSTOR\DiskGeneric_Flash_Disk______8.07
|
||||||
|
|
||||||
|
<br/>_Prevent Device IDs list_
|
||||||
|
|
||||||
|
6. Click ‘OK’.
|
||||||
|
|
||||||
|
7. Click ‘Apply’ on the bottom right of the policy’s window – this pushes the policy and blocks the target USB thumb-drive in future installations, but doesn’t apply to an existing install.
|
||||||
|
|
||||||
|
8. Optional – if you would like to apply the policy to an existing install: Open the **Prevent installation of devices that match any of these device IDs** policy again; in the ‘Options’ window, mark the checkbox that says ‘also apply to matching devices that are already installed’
|
||||||
|
|
||||||
|
|
||||||
|
### Testing the scenario
|
||||||
|
|
||||||
|
1. If you have not completed step #8 – follow these steps:
|
||||||
|
|
||||||
|
- Uninstall your USB thumb-drive: Device Manager > Disk drives > right click the target USB thumb-drive > click “Uninstall device”.
|
||||||
|
- You should not be able to reinstall the device.
|
||||||
|
|
||||||
|
2. If you completed step #8 above and restarted the machine, simply look for your Disk drives under Device Manager and see that it is no-longer available for you to use.
|
||||||
|
|
||||||
|
|
||||||
|
## Scenario #5: Prevent installation of all USB devices while allowing an installation of only an authorized USB thumb-drive
|
||||||
|
|
||||||
|
Now, using the knowledge from all the previous 4 scenarios, you will learn how to prevent the installation of an entire Class of devices while allowing a single authorized USB thumb-drive to be installed.
|
||||||
|
|
||||||
|
### Setting up the environment
|
||||||
|
|
||||||
|
Setting up the environment for the scenario with the following steps:
|
||||||
|
|
||||||
|
1. Open Group Policy Editor and navigate to the Device Installation Restriction section.
|
||||||
|
|
||||||
|
2. Disable all previous Device Installation policies, and **enable** ‘Apply layered order of evaluation’.
|
||||||
|
|
||||||
|
3. If there are any enabled policies, changing their status to ‘disabled’, would clear them from all parameters.
|
||||||
|
|
||||||
|
4. Have a USB thumb-drive available to test the policy with.
|
||||||
|
|
||||||
|
### Scenario steps – preventing installation of all USB devices while allowing only an authorized USB thumb-drive
|
||||||
|
|
||||||
|
Getting the device identifier for both the USB Classes and a specific USB thumb-drive – following the steps in scenario #1 to find Class identifier and scenario #4 to find Device identifier you could get the identifiers you need for this scenario:
|
||||||
|
|
||||||
|
- USB Bus Devices (hubs and host controllers)
|
||||||
|
- Class = USB
|
||||||
|
- ClassGuid = {36fc9e60-c465-11cf-8056-444553540000}
|
||||||
|
- This class includes USB host controllers and USB hubs, but not USB peripherals. Drivers for this class are system-supplied.
|
||||||
|
|
||||||
|
- USB Device
|
||||||
|
- Class = USBDevice
|
||||||
|
- ClassGuid = {88BAE032-5A81-49f0-BC3D-A4FF138216D6}
|
||||||
|
- USBDevice includes all USB devices that do not belong to another class. This class is not used for USB host controllers and hubs.
|
||||||
|
|
||||||
|
- Hardware ID = USBSTOR\DiskGeneric_Flash_Disk______8.07
|
||||||
|
|
||||||
|
As mentioned in scenario #4, it is not enough to enable only a single hardware ID in order to enable a single USB thumb-drive. The IT admin has to ensure all the USB devices that preceding the target one are not blocked (allowed) as well. In Our case the following devices has to be allowed so the target USB thumb-drive could be allowed as well:
|
||||||
|
|
||||||
|
- “Intel(R) USB 3.0 eXtensible Host Controller – 1.0 (Microsoft)” -> PCI\CC_0C03
|
||||||
|
- “USB Root Hub (USB 3.0)” -> USB\ROOT_HUB30
|
||||||
|
- “Generic USB Hub” -> USB\USB20_HUB
|
||||||
|
|
||||||
|
<br/>_USB devices nested under each other in the PnP tree_
|
||||||
|
|
||||||
|
These devices are internal devices on the machine that define the USB port connection to the outside world. Enabling them should not enable any external/peripheral device from being installed on the machine.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> Some device in the system have several layers of connectivity to define their installation on the system. USB thumb-drives are such devices. Thus, when looking to either block or allow them on a system, it is important to understand the path of connectivity for each device. There are several generic Device IDs that are commonly used in systems and could provide a good start to build an ‘Allow list’ in such cases. See below for the list:
|
||||||
|
>
|
||||||
|
> PCI\CC_0C03; PCI\CC_0C0330; PCI\VEN_8086; PNP0CA1; PNP0CA1&HOST (for Host Controllers)/
|
||||||
|
> USB\ROOT_HUB30; USB\ROOT_HUB20 (for USB Root Hubs)/
|
||||||
|
> USB\USB20_HUB (for Generic USB Hubs)/
|
||||||
|
>
|
||||||
|
> Specifically for desktop machines, it is very important to list all the USB devices that your keyboards and mice are connected through in the above list. Failing to do so could block a user from accessing its machine through HID devices.
|
||||||
|
>
|
||||||
|
> Different PC manufacturers sometimes have different ways to nest USB devices in the PnP tree, but in general this is how it is done.
|
||||||
|
|
||||||
|
First create a ‘Prevent Class’ policy and then create ‘Allow Device’ one:
|
||||||
|
|
||||||
|
1. Open Group Policy Object Editor – either click the Start button, type mmc gpedit.msc in the Start Search box, and then press ENTER; or type in the Windows search “Group Policy Editor” and open the UI.
|
||||||
|
|
||||||
|
2. Navigate to the Device Installation Restriction page:
|
||||||
|
|
||||||
|
> Computer Configuration > Administrative Templates > System > Device Installation > Device Installation Restrictions
|
||||||
|
|
||||||
|
3. Make sure all policies are disabled
|
||||||
|
|
||||||
|
4. Open **Prevent installation of devices using drivers that match these device setup classes** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
5. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the class identifier to block.
|
||||||
|
|
||||||
|
6. Enter both USB classes GUID you found above with the curly braces:
|
||||||
|
|
||||||
|
> {36fc9e60-c465-11cf-8056-444553540000}/
|
||||||
|
> {88BAE032-5A81-49f0-BC3D-A4FF138216D6}
|
||||||
|
|
||||||
|
7. Click ‘OK’.
|
||||||
|
|
||||||
|
8. Click ‘Apply’ on the bottom right of the policy’s window – this pushes the policy and blocks all future USB device installations, but doesn’t apply to existing installs.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> The previous step prevents all future USB devices from being installed. Before you move to the next step make sure you have as complete list as possible of all the USB Host Controllers, USB Root Hubs and Generic USB Hubs Device IDs available to prevent blocking you from interacting with your system through keyboards and mice.
|
||||||
|
|
||||||
|
9. Open the **Apply layered order of evaluation for Allow and Prevent device installation policies across all device match criteria** policy and enable it – this policy will enable you to override the wide coverage of the ‘Prevent’ policy with a specific device.
|
||||||
|
|
||||||
|
<br/>_Apply layered order of evaluation policy_
|
||||||
|
|
||||||
|
10. Now Open **Allow installation of devices that match any of these device IDs** policy and select the ‘Enable’ radio button.
|
||||||
|
|
||||||
|
11. In the lower left side, in the ‘Options’ window, click the ‘Show…’ box. This will take you to a table where you can enter the device identifier to allow.
|
||||||
|
|
||||||
|
12. Enter the full list of USB device IDs you found above including the specific USB Thumb-drive you would like to authorize for installation – USBSTOR\DiskGeneric_Flash_Disk______8.07
|
||||||
|
|
||||||
|
<br/>_Allowed USB Device IDs list_
|
||||||
|
|
||||||
|
13. Click ‘OK’.
|
||||||
|
|
||||||
|
14. Click ‘Apply’ on the bottom right of the policy’s window.
|
||||||
|
|
||||||
|
15. To apply the ‘Prevent’ coverage of all currently installed USB devices – Open the **Prevent installation of devices using drivers that match these device setup classes** policy again; in the ‘Options’ window mark the checkbox that says ‘also apply to matching devices that are already installed’ and click ‘OK’.
|
||||||
|
|
||||||
|
### Testing the scenario
|
||||||
|
|
||||||
|
You should not be able to install any USB thumb-drive, except the one you authorized for usage
|
@ -1270,10 +1270,10 @@ Additional lists:
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
</tr>
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
@ -2156,7 +2156,7 @@ Additional lists:
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
||||||
|
@ -10,7 +10,7 @@ ms.prod: w10
|
|||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 06/23/2021
|
ms.date: 07/23/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Defender CSP
|
# Defender CSP
|
||||||
@ -61,7 +61,7 @@ Defender
|
|||||||
--------SupportLogLocation (Added in the next major release of Windows 10)
|
--------SupportLogLocation (Added in the next major release of Windows 10)
|
||||||
--------PlatformUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
--------PlatformUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
||||||
--------EngineUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
--------EngineUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
||||||
--------SignaturesUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
--------DefinitionUpdatesChannel (Added with the 4.18.2106.5 Defender platform release)
|
||||||
--------DisableGradualRelease (Added with the 4.18.2106.5 Defender platform release)
|
--------DisableGradualRelease (Added with the 4.18.2106.5 Defender platform release)
|
||||||
----Scan
|
----Scan
|
||||||
----UpdateSignature
|
----UpdateSignature
|
||||||
|
@ -10,11 +10,12 @@ ms.prod: w10
|
|||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: manikadhiman
|
author: manikadhiman
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 07/23/2021
|
||||||
---
|
---
|
||||||
|
|
||||||
# Defender DDF file
|
# Defender DDF file
|
||||||
|
|
||||||
This topic shows the OMA DM device description framework (DDF) for the **Defender** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
This article shows the OMA DM device description framework (DDF) for the **Defender** configuration service provider. DDF files are used only with OMA DM provisioning XML.
|
||||||
|
|
||||||
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
|
||||||
|
|
||||||
@ -757,6 +758,185 @@ The XML below is the current version for this CSP.
|
|||||||
</DFProperties>
|
</DFProperties>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
|
<NodeName>DisableGradualRelease</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Enable this policy to disable gradual rollout of Defender updates.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<Applicability>
|
||||||
|
<OsBuildVersion>99.9.99999</OsBuildVersion>
|
||||||
|
<CspVersion>1.3</CspVersion>
|
||||||
|
</Applicability>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>1</Value>
|
||||||
|
<ValueDescription>Gradual release is disabled</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>0</Value>
|
||||||
|
<ValueDescription>Gradual release is enabled</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>DefinitionUpdatesChannel</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<Applicability>
|
||||||
|
<OsBuildVersion>99.9.99999</OsBuildVersion>
|
||||||
|
<CspVersion>1.3</CspVersion>
|
||||||
|
</Applicability>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>0</Value>
|
||||||
|
<ValueDescription>Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>4</Value>
|
||||||
|
<ValueDescription>Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>5</Value>
|
||||||
|
<ValueDescription>Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>EngineUpdatesChannel</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<Applicability>
|
||||||
|
<OsBuildVersion>99.9.99999</OsBuildVersion>
|
||||||
|
<CspVersion>1.3</CspVersion>
|
||||||
|
</Applicability>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>0</Value>
|
||||||
|
<ValueDescription>Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>3</Value>
|
||||||
|
<ValueDescription>Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>4</Value>
|
||||||
|
<ValueDescription>Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>5</Value>
|
||||||
|
<ValueDescription>Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
|
<Node>
|
||||||
|
<NodeName>PlatformUpdatesChannel</NodeName>
|
||||||
|
<DFProperties>
|
||||||
|
<AccessType>
|
||||||
|
<Add />
|
||||||
|
<Delete />
|
||||||
|
<Get />
|
||||||
|
<Replace />
|
||||||
|
</AccessType>
|
||||||
|
<Description>Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout.</Description>
|
||||||
|
<DFFormat>
|
||||||
|
<int />
|
||||||
|
</DFFormat>
|
||||||
|
<Occurrence>
|
||||||
|
<One />
|
||||||
|
</Occurrence>
|
||||||
|
<Scope>
|
||||||
|
<Dynamic />
|
||||||
|
</Scope>
|
||||||
|
<DFType>
|
||||||
|
<MIME>text/plain</MIME>
|
||||||
|
</DFType>
|
||||||
|
<Applicability>
|
||||||
|
<OsBuildVersion>99.9.99999</OsBuildVersion>
|
||||||
|
<CspVersion>1.3</CspVersion>
|
||||||
|
</Applicability>
|
||||||
|
<AllowedValues ValueType="ENUM">
|
||||||
|
<Enum>
|
||||||
|
<Value>0</Value>
|
||||||
|
<ValueDescription>Not configured (Default). The device will stay up to date automatically during the gradual release cycle. Suitable for most devices.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>2</Value>
|
||||||
|
<ValueDescription>Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>3</Value>
|
||||||
|
<ValueDescription>Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>4</Value>
|
||||||
|
<ValueDescription>Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
<Enum>
|
||||||
|
<Value>5</Value>
|
||||||
|
<ValueDescription>Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).</ValueDescription>
|
||||||
|
</Enum>
|
||||||
|
</AllowedValues>
|
||||||
|
</DFProperties>
|
||||||
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
<Node>
|
<Node>
|
||||||
<NodeName>Scan</NodeName>
|
<NodeName>Scan</NodeName>
|
||||||
@ -825,7 +1005,7 @@ The XML below is the current version for this CSP.
|
|||||||
</MgmtTree>
|
</MgmtTree>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Related topics
|
## See also
|
||||||
|
|
||||||
|
|
||||||
[Defender configuration service provider](defender-csp.md)
|
[Defender configuration service provider](defender-csp.md)
|
@ -133,74 +133,6 @@ Example: Export the Debug logs
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
**To collect logs manually**
|
|
||||||
|
|
||||||
1. Download and install the [Field Medic]( https://go.microsoft.com/fwlink/p/?LinkId=718232) app from the store.
|
|
||||||
2. Open the Field Medic app and then click on **Advanced**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Click on **Choose with ETW provider to use**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Check **Enterprise** and un-check the rest.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. In the app, click on **Start Logging** and then perform the operation that you want to troubleshoot.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. When the operation is done, click on **Stop Logging**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Save the logs. They will be stored in the Field Medic log location on the device.
|
|
||||||
8. You can send the logs via email by attaching the files from **Documents > Field Medic > Reports > ...** folder.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
The following table contains a list of common providers and their corresponding GUIDs.
|
|
||||||
|
|
||||||
| GUID | Provider Name |
|
|
||||||
|--------------------------------------|--------------------------------------------------------|
|
|
||||||
| 099614a5-5dd7-4788-8bc9-e29f43db28fc | Microsoft-Windows-LDAP-Client |
|
|
||||||
| 0f67e49f-fe51-4e9f-b490-6f2948cc6027 | Microsoft-Windows-Kernel-Processor-Power |
|
|
||||||
| 0ff1c24b-7f05-45c0-abdc-3c8521be4f62 | Microsoft-Windows-Mobile-Broadband-Experience-SmsApi |
|
|
||||||
| 10e4f0e0-9686-4e62-b2d6-fd010eb976d3 | Microsoft-WindowsPhone-Shell-Events |
|
|
||||||
| 1e39b4ce-d1e6-46ce-b65b-5ab05d6cc266 | Microsoft-Windows-Networking-RealTimeCommunication |
|
|
||||||
| 22a7b160-f6e8-46b9-8e0b-a51989c85c66 | Microsoft-WindowsPhone-Bluetooth-AG |
|
|
||||||
| 2f94e1cc-a8c5-4fe7-a1c3-53d7bda8e73e | Microsoft-WindowsPhone-ConfigManager2 |
|
|
||||||
| 331c3b3a-2005-44c2-ac5e-77220c37d6b4 | Microsoft-Windows-Kernel-Power |
|
|
||||||
| 33693e1d-246a-471b-83be-3e75f47a832d | Microsoft-Windows-BTH-BTHUSB |
|
|
||||||
| 3742be72-99a9-42e6-9fd5-c01a330e3625 | Microsoft-WindowsPhone-PhoneAudio |
|
|
||||||
| 3b9602ff-e09b-4c6c-bc19-1a3dfa8f2250 | Microsoft-WindowsPhone-OmaDm-Client-Provider |
|
|
||||||
| 3da494e4-0fe2-415C-b895-fb5265c5c83b | Microsoft-WindowsPhone-Enterprise-Diagnostics-Provider |
|
|
||||||
| 3f471139-acb7-4a01-b7a7-ff5da4ba2d43 | Microsoft-Windows-AppXDeployment-Server |
|
|
||||||
| 4180c4f7-e238-5519-338f-ec214f0b49aa | Microsoft.Windows.ResourceManager |
|
|
||||||
| 4637124c-1d40-4b4d-892f-2aaecf24ff06 | Microsoft-Windows-WinJson |
|
|
||||||
| 4d13548f-c7b8-4174-bb7a-d7f64bf22d29 | Microsoft-WindowsPhone-LocationServiceProvider |
|
|
||||||
| 4eacb4d0-263b-4b93-8cd6-778a278e5642 | Microsoft-Windows-GenericRoaming |
|
|
||||||
| 4f386063-ef17-4629-863c-d71597af743d | Microsoft-WindowsPhone-NotificationService |
|
|
||||||
| 55404e71-4db9-4deb-a5f5-8f86e46dde56 | Microsoft-Windows-Winsock-NameResolution |
|
|
||||||
| 59819d0a-adaf-46b2-8d7c-990bc39c7c15 | Microsoft-Windows-Battery |
|
|
||||||
| 5c103042-7e75-4629-a748-bdfa67607fac | Microsoft-WindowsPhone-Power |
|
|
||||||
| 69c1c3f1-2b5c-41d0-a14a-c7ca5130640e | Microsoft-WindowsPhone-Cortana |
|
|
||||||
| 6ad52b32-d609-4be9-ae07-ce8dae937e39 | Microsoft-Windows-RPC |
|
|
||||||
| 7263516b-6eb0-477b-b64f-17b91d29f239 | Microsoft-WindowsPhone-BatterySense |
|
|
||||||
| 7dd42a49-5329-4832-8dfd-43d979153a88 | Microsoft-Windows-Kernel-Network |
|
|
||||||
| ae4bd3be-f36f-45b6-8d21-bdd6fb832853 | Microsoft-Windows-Audio |
|
|
||||||
| daa6a96b-f3e7-4d4d-a0d6-31a350e6a445 | Microsoft-Windows-WLAN-Driver |
|
|
||||||
| 4d13548f-c7b8-4174-bb7a-d7f64bf22d29 | Microsoft-WindowsPhone-LocationServiceProvider |
|
|
||||||
| 74e106b7-00be-4a55-b707-7ab58d6a9e90 | Microsoft-WindowsPhone-Shell-OOBE |
|
|
||||||
| cbda4dbf-8d5d-4f69-9578-be14aa540d22 | Microsoft-Windows-AppLocker |
|
|
||||||
| e595f735-b42a-494b-afcd-b68666945cd3 | Microsoft-Windows-Firewall |
|
|
||||||
| e5fc4a0f-7198-492f-9b0f-88fdcbfded48 | Microsoft-Windows Networking VPN |
|
|
||||||
| e5c16d49-2464-4382-bb20-97a4b5465db9 | Microsoft-Windows-WiFiNetworkManager |
|
|
||||||
|
|
||||||
-->
|
|
||||||
|
|
||||||
## Collect logs remotely from Windows 10 Holographic
|
## Collect logs remotely from Windows 10 Holographic
|
||||||
|
|
||||||
For holographic already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
For holographic already enrolled in MDM, you can remotely collect MDM logs through the MDM channel using the [DiagnosticLog CSP](diagnosticlog-csp.md).
|
||||||
|
@ -85,11 +85,7 @@ You may contact your domain administrators to verify if the group policy has bee
|
|||||||
|
|
||||||
8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal).
|
8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal).
|
||||||
|
|
||||||
9. Verify that Azure AD allows the logon user to enroll devices.
|
9. Verify that Microsoft Intune should allow enrollment of Windows devices.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
10. Verify that Microsoft Intune should allow enrollment of Windows devices.
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -117,9 +113,6 @@ Requirements:
|
|||||||
|
|
||||||
4. Double-click **Enable automatic MDM enrollment using default Azure AD credentials** (previously called **Auto MDM Enrollment with AAD Token** in Windows 10, version 1709). For ADMX files in Windows 10, version 1903 and later, select **User Credential** as the Selected Credential Type to use.
|
4. Double-click **Enable automatic MDM enrollment using default Azure AD credentials** (previously called **Auto MDM Enrollment with AAD Token** in Windows 10, version 1709). For ADMX files in Windows 10, version 1903 and later, select **User Credential** as the Selected Credential Type to use.
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> **Device Credential** Credential Type may work, however, it is not yet supported by Intune. We don't recommend using this option until it's supported.
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
|
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
|
||||||
|
@ -89,36 +89,37 @@ https://EnterpriseEnrollment.Contoso.com/EnrollmentServer/Discovery.svc
|
|||||||
The following example shows the discovery service request.
|
The following example shows the discovery service request.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<?xml version="1.0"?>
|
<?xml version="1.0"?>
|
||||||
<s:Envelope xmlns:a="http://www.w3.org/2005/08/addressing"
|
<s:Envelope xmlns:a="http://www.w3.org/2005/08/addressing"
|
||||||
xmlns:s="http://www.w3.org/2003/05/soap-envelope">
|
xmlns:s="http://www.w3.org/2003/05/soap-envelope">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1">
|
<a:Action s:mustUnderstand="1">
|
||||||
http://schemas.microsoft.com/windows/management/2012/01/enrollment/IDiscoveryService/Discover
|
http://schemas.microsoft.com/windows/management/2012/01/enrollment/IDiscoveryService/Discover
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<a:MessageID>urn:uuid: 748132ec-a575-4329-b01b-6171a9cf8478</a:MessageID>
|
<a:MessageID>urn:uuid: 748132ec-a575-4329-b01b-6171a9cf8478</a:MessageID>
|
||||||
<a:ReplyTo>
|
<a:ReplyTo>
|
||||||
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
||||||
</a:ReplyTo>
|
</a:ReplyTo>
|
||||||
<a:To s:mustUnderstand="1">
|
<a:To s:mustUnderstand="1">
|
||||||
https://ENROLLTEST.CONTOSO.COM/EnrollmentServer/Discovery.svc
|
https://ENROLLTEST.CONTOSO.COM/EnrollmentServer/Discovery.svc
|
||||||
</a:To>
|
</a:To>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body>
|
<s:Body>
|
||||||
<Discover xmlns="http://schemas.microsoft.com/windows/management/2012/01/enrollment/">
|
<Discover xmlns="http://schemas.microsoft.com/windows/management/2012/01/enrollment/">
|
||||||
<request xmlns:i="http://www.w3.org/2001/XMLSchema-instance">
|
<request xmlns:i="http://www.w3.org/2001/XMLSchema-instance">
|
||||||
<EmailAddress>user@contoso.com</EmailAddress>
|
<EmailAddress>user@contoso.com</EmailAddress>
|
||||||
<OSEdition>3</OSEdition> <!--New -->
|
<OSEdition>3</OSEdition> <!--New -->
|
||||||
<RequestVersion>3.0</RequestVersion> <!-- Updated -->
|
<RequestVersion>3.0</RequestVersion> <!-- Updated -->
|
||||||
<DeviceType>WindowsPhone</DeviceType> <!--Updated -->
|
<DeviceType>WindowsPhone</DeviceType> <!--Updated -->
|
||||||
<ApplicationVersion>10.0.0.0</ApplicationVersion>
|
<ApplicationVersion>10.0.0.0</ApplicationVersion>
|
||||||
<AuthPolicies>
|
<AuthPolicies>
|
||||||
<AuthPolicy>OnPremise</AuthPolicy>
|
<AuthPolicy>OnPremise</AuthPolicy>
|
||||||
<AuthPolicy>Federated</AuthPolicy>
|
<AuthPolicy>Federated</AuthPolicy>
|
||||||
</AuthPolicies>
|
</AuthPolicies>
|
||||||
</request>
|
</request>
|
||||||
</Discover>
|
</Discover>
|
||||||
</s:Body>
|
</s:Body>
|
||||||
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
The discovery response is in the XML format and includes the following fields:
|
The discovery response is in the XML format and includes the following fields:
|
||||||
@ -151,7 +152,7 @@ The following are the explicit requirements for the server.
|
|||||||
|
|
||||||
The enrollment client issues an HTTPS request as follows:
|
The enrollment client issues an HTTPS request as follows:
|
||||||
|
|
||||||
```
|
```http
|
||||||
AuthenticationServiceUrl?appru=<appid>&login_hint=<User Principal Name>
|
AuthenticationServiceUrl?appru=<appid>&login_hint=<User Principal Name>
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -195,37 +196,37 @@ The server has to send a POST to a redirect URL of the form ms-app://string (the
|
|||||||
The following example shows a response received from the discovery web service which requires authentication via WAB.
|
The following example shows a response received from the discovery web service which requires authentication via WAB.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
||||||
xmlns:a="http://www.w3.org/2005/08/addressing">
|
xmlns:a="http://www.w3.org/2005/08/addressing">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1">
|
<a:Action s:mustUnderstand="1">
|
||||||
http://schemas.microsoft.com/windows/management/2012/01/enrollment/IDiscoveryService/DiscoverResponse
|
http://schemas.microsoft.com/windows/management/2012/01/enrollment/IDiscoveryService/DiscoverResponse
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<ActivityId>
|
<ActivityId>
|
||||||
d9eb2fdd-e38a-46ee-bd93-aea9dc86a3b8
|
d9eb2fdd-e38a-46ee-bd93-aea9dc86a3b8
|
||||||
</ActivityId>
|
</ActivityId>
|
||||||
<a:RelatesTo>urn:uuid: 748132ec-a575-4329-b01b-6171a9cf8478</a:RelatesTo>
|
<a:RelatesTo>urn:uuid: 748132ec-a575-4329-b01b-6171a9cf8478</a:RelatesTo>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
||||||
<DiscoverResponse
|
<DiscoverResponse
|
||||||
xmlns="http://schemas.microsoft.com/windows/management/2012/01/enrollment">
|
xmlns="http://schemas.microsoft.com/windows/management/2012/01/enrollment">
|
||||||
<DiscoverResult>
|
<DiscoverResult>
|
||||||
<AuthPolicy>Federated</AuthPolicy>
|
<AuthPolicy>Federated</AuthPolicy>
|
||||||
<EnrollmentVersion>3.0</EnrollmentVersion>
|
<EnrollmentVersion>3.0</EnrollmentVersion>
|
||||||
<EnrollmentPolicyServiceUrl>
|
<EnrollmentPolicyServiceUrl>
|
||||||
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
||||||
</EnrollmentPolicyServiceUrl>
|
</EnrollmentPolicyServiceUrl>
|
||||||
<EnrollmentServiceUrl>
|
<EnrollmentServiceUrl>
|
||||||
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
||||||
</EnrollmentServiceUrl>
|
</EnrollmentServiceUrl>
|
||||||
<AuthenticationServiceUrl>
|
<AuthenticationServiceUrl>
|
||||||
https://portal.manage.contoso.com/LoginRedirect.aspx
|
https://portal.manage.contoso.com/LoginRedirect.aspx
|
||||||
</AuthenticationServiceUrl>
|
</AuthenticationServiceUrl>
|
||||||
</DiscoverResult>
|
</DiscoverResult>
|
||||||
</DiscoverResponse>
|
</DiscoverResponse>
|
||||||
</s:Body>
|
</s:Body>
|
||||||
</s:Envelope>
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Enrollment policy web service
|
## Enrollment policy web service
|
||||||
@ -234,58 +235,60 @@ Policy service is optional. By default, if no policies are specified, the minimu
|
|||||||
|
|
||||||
This web service implements the X.509 Certificate Enrollment Policy Protocol (MS-XCEP) specification that allows customizing certificate enrollment to match different security needs of enterprises at different times (cryptographic agility). The service processes the GetPolicies message from the client, authenticates the client, and returns matching enrollment policies in the GetPoliciesResponse message.
|
This web service implements the X.509 Certificate Enrollment Policy Protocol (MS-XCEP) specification that allows customizing certificate enrollment to match different security needs of enterprises at different times (cryptographic agility). The service processes the GetPolicies message from the client, authenticates the client, and returns matching enrollment policies in the GetPoliciesResponse message.
|
||||||
|
|
||||||
For Federated authentication policy, The security token credential is provided in a request message using the <wsse:BinarySecurityToken> element \[WSS\]. The security token is retrieved as described in the discovery response section. The authentication information is as follows:
|
For Federated authentication policy, the security token credential is provided in a request message using the <wsse:BinarySecurityToken> element \[WSS\]. The security token is retrieved as described in the discovery response section. The authentication information is as follows:
|
||||||
|
|
||||||
- wsse:Security: The enrollment client implements the <wsse:Security> element defined in \[WSS\] section 5. The <wsse:Security> element must be a child of the <s:Header> element.
|
- wsse:Security: The enrollment client implements the <wsse:Security> element defined in \[WSS\] section 5. The <wsse:Security> element must be a child of the <s:Header> element.
|
||||||
- wsse:BinarySecurityToken: The enrollment client implements the <wsse:BinarySecurityToken> element defined in \[WSS\] section 6.3. The <wsse:BinarySecurityToken> element must be included as a child of the <wsse:Security> element in the SOAP header.
|
- wsse:BinarySecurityToken: The enrollment client implements the <wsse:BinarySecurityToken> element defined in \[WSS\] section 6.3. The <wsse:BinarySecurityToken> element must be included as a child of the <wsse:Security> element in the SOAP header.
|
||||||
|
|
||||||
As was described in the discovery response section, the inclusion of the <wsse:BinarySecurityToken> element is opaque to the enrollment client, and the client does not interpret the string, and the inclusion of the element is agreed upon by the security token authentication server (as identified in the <AuthenticationServiceUrl> element of <DiscoveryResponse> and the enterprise server.
|
As was described in the discovery response section, the inclusion of the <wsse:BinarySecurityToken> element is opaque to the enrollment client, and the client does not interpret the string, and the inclusion of the element is agreed upon by the security token authentication server (as identified in the <AuthenticationServiceUrl> element of <DiscoveryResponse> and the enterprise server.
|
||||||
|
|
||||||
The <wsse:BinarySecurityToken> element contains a base64-encoded string. The enrollment client uses the security token received from the authentication server and base64-encodes the token to populate the <wsse:BinarySecurityToken> element. wsse:BinarySecurityToken/attributes/ValueType: The <wsse:BinarySecurityToken> ValueType attribute must be "http:<span></span>//schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken".
|
The <wsse:BinarySecurityToken> element contains a base64-encoded string. The enrollment client uses the security token received from the authentication server and base64-encodes the token to populate the <wsse:BinarySecurityToken> element.
|
||||||
|
|
||||||
wsse:BinarySecurityToken/attributes/EncodingType: The <wsse:BinarySecurityToken> EncodingType attribute must be "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary".
|
- wsse:BinarySecurityToken/attributes/ValueType: The `<wsse:BinarySecurityToken>` ValueType attribute must be "http:<span></span>//schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken".
|
||||||
|
|
||||||
|
- wsse:BinarySecurityToken/attributes/EncodingType: The `<wsse:BinarySecurityToken>` EncodingType attribute must be "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary".
|
||||||
|
|
||||||
The following is an enrollment policy request example with a received security token as client credential.
|
The following is an enrollment policy request example with a received security token as client credential.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
||||||
xmlns:a="http://www.w3.org/2005/08/addressing"
|
xmlns:a="http://www.w3.org/2005/08/addressing"
|
||||||
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
||||||
xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
|
xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
|
||||||
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512"
|
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512"
|
||||||
xmlns:ac="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
xmlns:ac="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1">
|
<a:Action s:mustUnderstand="1">
|
||||||
http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy/IPolicy/GetPolicies
|
http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy/IPolicy/GetPolicies
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<a:MessageID>urn:uuid:72048B64-0F19-448F-8C2E-B4C661860AA0</a:MessageID>
|
<a:MessageID>urn:uuid:72048B64-0F19-448F-8C2E-B4C661860AA0</a:MessageID>
|
||||||
<a:ReplyTo>
|
<a:ReplyTo>
|
||||||
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
||||||
</a:ReplyTo>
|
</a:ReplyTo>
|
||||||
<a:To s:mustUnderstand="1">
|
<a:To s:mustUnderstand="1">
|
||||||
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
https://enrolltest.contoso.com/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
||||||
</a:To>
|
</a:To>
|
||||||
<wsse:Security s:mustUnderstand="1">
|
<wsse:Security s:mustUnderstand="1">
|
||||||
<wsse:BinarySecurityToken
|
<wsse:BinarySecurityToken
|
||||||
ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken"
|
ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken"
|
||||||
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary"
|
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary"
|
||||||
xmlns="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
xmlns="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
||||||
B64EncodedSampleBinarySecurityToken
|
B64EncodedSampleBinarySecurityToken
|
||||||
</wsse:BinarySecurityToken>
|
</wsse:BinarySecurityToken>
|
||||||
</wsse:Security>
|
</wsse:Security>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
||||||
<GetPolicies
|
<GetPolicies
|
||||||
xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy">
|
xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy">
|
||||||
<client>
|
<client>
|
||||||
<lastUpdate xsi:nil="true"/>
|
<lastUpdate xsi:nil="true"/>
|
||||||
<preferredLanguage xsi:nil="true"/>
|
<preferredLanguage xsi:nil="true"/>
|
||||||
</client>
|
</client>
|
||||||
<requestFilter xsi:nil="true"/>
|
<requestFilter xsi:nil="true"/>
|
||||||
</GetPolicies>
|
</GetPolicies>
|
||||||
</s:Body>
|
</s:Body>
|
||||||
</s:Envelope>
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
After the user is authenticated, the web service retrieves the certificate template that the user should enroll with and creates enrollment policies based on the certificate template properties. A sample of the response can be found on MSDN.
|
After the user is authenticated, the web service retrieves the certificate template that the user should enroll with and creates enrollment policies based on the certificate template properties. A sample of the response can be found on MSDN.
|
||||||
@ -298,80 +301,80 @@ MS-XCEP supports very flexible enrollment policies using various Complex Types a
|
|||||||
The following snippet shows the policy web service response.
|
The following snippet shows the policy web service response.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:Envelope
|
<s:Envelope
|
||||||
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
||||||
xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
||||||
xmlns:a="http://www.w3.org/2005/08/addressing">
|
xmlns:a="http://www.w3.org/2005/08/addressing">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1">
|
<a:Action s:mustUnderstand="1">
|
||||||
http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy/IPolicy/GetPoliciesResponse
|
http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy/IPolicy/GetPoliciesResponse
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<a:RelatesTo>urn:uuid: 69960163-adad-4a72-82d2-bb0e5cff5598</a:RelatesTo>
|
<a:RelatesTo>urn:uuid: 69960163-adad-4a72-82d2-bb0e5cff5598</a:RelatesTo>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
<s:Body xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
xmlns:xsd="http://www.w3.org/2001/XMLSchema">
|
||||||
<GetPoliciesResponse
|
<GetPoliciesResponse
|
||||||
xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy">
|
xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollmentpolicy">
|
||||||
<response>
|
<response>
|
||||||
<policyID />
|
<policyID />
|
||||||
<policyFriendlyName xsi:nil="true"
|
<policyFriendlyName xsi:nil="true"
|
||||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
||||||
<nextUpdateHours xsi:nil="true"
|
<nextUpdateHours xsi:nil="true"
|
||||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
||||||
<policiesNotChanged xsi:nil="true"
|
<policiesNotChanged xsi:nil="true"
|
||||||
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"/>
|
||||||
<policies>
|
<policies>
|
||||||
<policy>
|
<policy>
|
||||||
<policyOIDReference>0</policyOIDReference>
|
<policyOIDReference>0</policyOIDReference>
|
||||||
<cAs xsi:nil="true" />
|
|
||||||
<attributes>
|
|
||||||
<commonName>CEPUnitTest</commonName>
|
|
||||||
<policySchema>3</policySchema>
|
|
||||||
<certificateValidity>
|
|
||||||
<validityPeriodSeconds>1209600</validityPeriodSeconds>
|
|
||||||
<renewalPeriodSeconds>172800</renewalPeriodSeconds>
|
|
||||||
</certificateValidity>
|
|
||||||
<permission>
|
|
||||||
<enroll>true</enroll>
|
|
||||||
<autoEnroll>false</autoEnroll>
|
|
||||||
</permission>
|
|
||||||
<privateKeyAttributes>
|
|
||||||
<minimalKeyLength>2048</minimalKeyLength>
|
|
||||||
<keySpec xsi:nil="true" />
|
|
||||||
<keyUsageProperty xsi:nil="true" />
|
|
||||||
<permissions xsi:nil="true" />
|
|
||||||
<algorithmOIDReference xsi:nil="true" />
|
|
||||||
<cryptoProviders xsi:nil="true" />
|
|
||||||
</privateKeyAttributes>
|
|
||||||
<revision>
|
|
||||||
<majorRevision>101</majorRevision>
|
|
||||||
<minorRevision>0</minorRevision>
|
|
||||||
</revision>
|
|
||||||
<supersededPolicies xsi:nil="true" />
|
|
||||||
<privateKeyFlags xsi:nil="true" />
|
|
||||||
<subjectNameFlags xsi:nil="true" />
|
|
||||||
<enrollmentFlags xsi:nil="true" />
|
|
||||||
<generalFlags xsi:nil="true" />
|
|
||||||
<hashAlgorithmOIDReference>0</hashAlgorithmOIDReference>
|
|
||||||
<rARequirements xsi:nil="true" />
|
|
||||||
<keyArchivalAttributes xsi:nil="true" />
|
|
||||||
<extensions xsi:nil="true" />
|
|
||||||
</attributes>
|
|
||||||
</policy>
|
|
||||||
</policies>
|
|
||||||
</response>
|
|
||||||
<cAs xsi:nil="true" />
|
<cAs xsi:nil="true" />
|
||||||
<oIDs>
|
<attributes>
|
||||||
<oID>
|
<commonName>CEPUnitTest</commonName>
|
||||||
<value>1.3.14.3.2.29</value>
|
<policySchema>3</policySchema>
|
||||||
<group>1</group>
|
<certificateValidity>
|
||||||
<oIDReferenceID>0</oIDReferenceID>
|
<validityPeriodSeconds>1209600</validityPeriodSeconds>
|
||||||
<defaultName>szOID_OIWSEC_sha1RSASign</defaultName>
|
<renewalPeriodSeconds>172800</renewalPeriodSeconds>
|
||||||
</oID>
|
</certificateValidity>
|
||||||
</oIDs>
|
<permission>
|
||||||
</GetPoliciesResponse>
|
<enroll>true</enroll>
|
||||||
</s:Body>
|
<autoEnroll>false</autoEnroll>
|
||||||
</s:Envelope>
|
</permission>
|
||||||
|
<privateKeyAttributes>
|
||||||
|
<minimalKeyLength>2048</minimalKeyLength>
|
||||||
|
<keySpec xsi:nil="true" />
|
||||||
|
<keyUsageProperty xsi:nil="true" />
|
||||||
|
<permissions xsi:nil="true" />
|
||||||
|
<algorithmOIDReference xsi:nil="true" />
|
||||||
|
<cryptoProviders xsi:nil="true" />
|
||||||
|
</privateKeyAttributes>
|
||||||
|
<revision>
|
||||||
|
<majorRevision>101</majorRevision>
|
||||||
|
<minorRevision>0</minorRevision>
|
||||||
|
</revision>
|
||||||
|
<supersededPolicies xsi:nil="true" />
|
||||||
|
<privateKeyFlags xsi:nil="true" />
|
||||||
|
<subjectNameFlags xsi:nil="true" />
|
||||||
|
<enrollmentFlags xsi:nil="true" />
|
||||||
|
<generalFlags xsi:nil="true" />
|
||||||
|
<hashAlgorithmOIDReference>0</hashAlgorithmOIDReference>
|
||||||
|
<rARequirements xsi:nil="true" />
|
||||||
|
<keyArchivalAttributes xsi:nil="true" />
|
||||||
|
<extensions xsi:nil="true" />
|
||||||
|
</attributes>
|
||||||
|
</policy>
|
||||||
|
</policies>
|
||||||
|
</response>
|
||||||
|
<cAs xsi:nil="true" />
|
||||||
|
<oIDs>
|
||||||
|
<oID>
|
||||||
|
<value>1.3.14.3.2.29</value>
|
||||||
|
<group>1</group>
|
||||||
|
<oIDReferenceID>0</oIDReferenceID>
|
||||||
|
<defaultName>szOID_OIWSEC_sha1RSASign</defaultName>
|
||||||
|
</oID>
|
||||||
|
</oIDs>
|
||||||
|
</GetPoliciesResponse>
|
||||||
|
</s:Body>
|
||||||
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
## Enrollment web service
|
## Enrollment web service
|
||||||
@ -380,7 +383,7 @@ This web service implements the MS-WSTEP protocol. It processes the RequestSecur
|
|||||||
|
|
||||||
The RequestSecurityToken (RST) must have the user credential and a certificate request. The user credential in an RST SOAP envelope is the same as in GetPolicies, and can vary depending on whether the authentication policy is OnPremise or Federated. The BinarySecurityToken in an RST SOAP body contains a Base64-encoded PKCS\#10 certificate request, which is generated by the client based on the enrollment policy. The client could have requested an enrollment policy by using MS-XCEP before requesting a certificate using MS-WSTEP. If the PKCS\#10 certificate request is accepted by the certification authority (CA) (the key length, hashing algorithm, and so on match the certificate template), the client can enroll successfully.
|
The RequestSecurityToken (RST) must have the user credential and a certificate request. The user credential in an RST SOAP envelope is the same as in GetPolicies, and can vary depending on whether the authentication policy is OnPremise or Federated. The BinarySecurityToken in an RST SOAP body contains a Base64-encoded PKCS\#10 certificate request, which is generated by the client based on the enrollment policy. The client could have requested an enrollment policy by using MS-XCEP before requesting a certificate using MS-WSTEP. If the PKCS\#10 certificate request is accepted by the certification authority (CA) (the key length, hashing algorithm, and so on match the certificate template), the client can enroll successfully.
|
||||||
|
|
||||||
Note that the RequestSecurityToken will use a custom TokenType (http:<span></span>//schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken), because our enrollment token is more than an X.509 v3 certificate. For more details, see the Response section.
|
Note that the RequestSecurityToken will use a custom TokenType (`http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken`), because our enrollment token is more than an X.509 v3 certificate. For more details, see the Response section.
|
||||||
|
|
||||||
The RST may also specify a number of AdditionalContext items, such as DeviceType and Version. Based on these values, for example, the web service can return device-specific and version-specific DM configuration.
|
The RST may also specify a number of AdditionalContext items, such as DeviceType and Version. Based on these values, for example, the web service can return device-specific and version-specific DM configuration.
|
||||||
|
|
||||||
@ -390,83 +393,84 @@ The RST may also specify a number of AdditionalContext items, such as DeviceType
|
|||||||
The following example shows the enrollment web service request for federated authentication.
|
The following example shows the enrollment web service request for federated authentication.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"
|
||||||
xmlns:a="http://www.w3.org/2005/08/addressing"
|
xmlns:a="http://www.w3.org/2005/08/addressing"
|
||||||
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
|
||||||
xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
|
xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
|
||||||
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512"
|
xmlns:wst="http://docs.oasis-open.org/ws-sx/ws-trust/200512"
|
||||||
xmlns:ac="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
xmlns:ac="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1">
|
<a:Action s:mustUnderstand="1">
|
||||||
http://schemas.microsoft.com/windows/pki/2009/01/enrollment/RST/wstep
|
http://schemas.microsoft.com/windows/pki/2009/01/enrollment/RST/wstep
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<a:MessageID>urn:uuid:0d5a1441-5891-453b-becf-a2e5f6ea3749</a:MessageID>
|
<a:MessageID>urn:uuid:0d5a1441-5891-453b-becf-a2e5f6ea3749</a:MessageID>
|
||||||
<a:ReplyTo>
|
<a:ReplyTo>
|
||||||
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
<a:Address>http://www.w3.org/2005/08/addressing/anonymous</a:Address>
|
||||||
</a:ReplyTo>
|
</a:ReplyTo>
|
||||||
<a:To s:mustUnderstand="1">
|
<a:To s:mustUnderstand="1">
|
||||||
https://enrolltest.contoso.com:443/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
https://enrolltest.contoso.com:443/ENROLLMENTSERVER/DEVICEENROLLMENTWEBSERVICE.SVC
|
||||||
</a:To>
|
</a:To>
|
||||||
<wsse:Security s:mustUnderstand="1">
|
<wsse:Security s:mustUnderstand="1">
|
||||||
<wsse:BinarySecurityToken
|
<wsse:BinarySecurityToken
|
||||||
wsse:ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken"
|
wsse:ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken"
|
||||||
wsse:EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary">
|
wsse:EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary">
|
||||||
B64EncodedSampleBinarySecurityToken
|
B64EncodedSampleBinarySecurityToken
|
||||||
</wsse:BinarySecurityToken>
|
</wsse:BinarySecurityToken>
|
||||||
</wsse:Security>
|
</wsse:Security>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body>
|
<s:Body>
|
||||||
<wst:RequestSecurityToken>
|
<wst:RequestSecurityToken>
|
||||||
<wst:TokenType>
|
<wst:TokenType>
|
||||||
http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken
|
http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken
|
||||||
</wst:TokenType>
|
</wst:TokenType>
|
||||||
<wst:RequestType>
|
<wst:RequestType>
|
||||||
http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue
|
http://docs.oasis-open.org/ws-sx/ws-trust/200512/Issue
|
||||||
</wst:RequestType>
|
</wst:RequestType>
|
||||||
<wsse:BinarySecurityToken
|
<wsse:BinarySecurityToken
|
||||||
ValueType="http://schemas.microsoft.com/windows/pki/2009/01/enrollment#PKCS10"
|
ValueType="http://schemas.microsoft.com/windows/pki/2009/01/enrollment#PKCS10"
|
||||||
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary">
|
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary">
|
||||||
DER format PKCS#10 certificate request in Base64 encoding Insterted Here
|
DER format PKCS#10 certificate request in Base64 encoding Insterted Here
|
||||||
</wsse:BinarySecurityToken>
|
</wsse:BinarySecurityToken>
|
||||||
<ac:AdditionalContext xmlns="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
<ac:AdditionalContext xmlns="http://schemas.xmlsoap.org/ws/2006/12/authorization">
|
||||||
<ac:ContextItem Name="OSEdition">
|
<ac:ContextItem Name="OSEdition">
|
||||||
<ac:Value> 4</ac:Value>
|
<ac:Value> 4</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="OSVersion">
|
<ac:ContextItem Name="OSVersion">
|
||||||
<ac:Value>10.0.9999.0</ac:Value>
|
<ac:Value>10.0.9999.0</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="DeviceName">
|
<ac:ContextItem Name="DeviceName">
|
||||||
<ac:Value>MY_WINDOWS_DEVICE</ac:Value>
|
<ac:Value>MY_WINDOWS_DEVICE</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="MAC">
|
<ac:ContextItem Name="MAC">
|
||||||
<ac:Value>FF:FF:FF:FF:FF:FF</ac:Value>
|
<ac:Value>FF:FF:FF:FF:FF:FF</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="MAC">
|
<ac:ContextItem Name="MAC">
|
||||||
<ac:Value>CC:CC:CC:CC:CC:CC</ac:Value>
|
<ac:Value>CC:CC:CC:CC:CC:CC</ac:Value>
|
||||||
<ac:ContextItem Name="IMEI">
|
<ac:ContextItem Name="IMEI">
|
||||||
<ac:Value>49015420323756</ac:Value>
|
<ac:Value>49015420323756</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="IMEI">
|
<ac:ContextItem Name="IMEI">
|
||||||
<ac:Value>30215420323756</ac:Value>
|
<ac:Value>30215420323756</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="EnrollmentType">
|
<ac:ContextItem Name="EnrollmentType">
|
||||||
<ac:Value>Full</ac:Value>
|
<ac:Value>Full</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="DeviceType">
|
<ac:ContextItem Name="DeviceType">
|
||||||
<ac:Value>CIMClient_Windows</ac:Value>
|
<ac:Value>CIMClient_Windows</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="ApplicationVersion">
|
<ac:ContextItem Name="ApplicationVersion">
|
||||||
<ac:Value>10.0.9999.0</ac:Value>
|
<ac:Value>10.0.9999.0</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="DeviceID">
|
<ac:ContextItem Name="DeviceID">
|
||||||
<ac:Value>7BA748C8-703E-4DF2-A74A-92984117346A</ac:Value>
|
<ac:Value>7BA748C8-703E-4DF2-A74A-92984117346A</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
<ac:ContextItem Name="TargetedUserLoggedIn">
|
<ac:ContextItem Name="TargetedUserLoggedIn">
|
||||||
<ac:Value>True</ac:Value>
|
<ac:Value>True</ac:Value>
|
||||||
</ac:ContextItem>
|
</ac:ContextItem>
|
||||||
</ac:AdditionalContext>
|
</ac:AdditionalContext>
|
||||||
</wst:RequestSecurityToken>
|
</wst:RequestSecurityToken>
|
||||||
</s:Body>
|
</s:Body>
|
||||||
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
After validating the request, the web service looks up the assigned certificate template for the client, update it if needed, sends the PKCS\#10 requests to the CA, processes the response from the CA, constructs an OMA Client Provisioning XML format, and returns it in the RequestSecurityTokenResponse (RSTR).
|
After validating the request, the web service looks up the assigned certificate template for the client, update it if needed, sends the PKCS\#10 requests to the CA, processes the response from the CA, constructs an OMA Client Provisioning XML format, and returns it in the RequestSecurityTokenResponse (RSTR).
|
||||||
@ -492,43 +496,43 @@ Here is a sample RSTR message and a sample of OMA client provisioning XML within
|
|||||||
The following example shows the enrollment web service response.
|
The following example shows the enrollment web service response.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"
|
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"
|
||||||
xmlns:a="http://www.w3.org/2005/08/addressing"
|
xmlns:a="http://www.w3.org/2005/08/addressing"
|
||||||
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
|
xmlns:u="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
|
||||||
<s:Header>
|
<s:Header>
|
||||||
<a:Action s:mustUnderstand="1" >
|
<a:Action s:mustUnderstand="1" >
|
||||||
http://schemas.microsoft.com/windows/pki/2009/01/enrollment/RSTRC/wstep
|
http://schemas.microsoft.com/windows/pki/2009/01/enrollment/RSTRC/wstep
|
||||||
</a:Action>
|
</a:Action>
|
||||||
<a:RelatesTo>urn:uuid:81a5419a-496b-474f-a627-5cdd33eed8ab</a:RelatesTo>
|
<a:RelatesTo>urn:uuid:81a5419a-496b-474f-a627-5cdd33eed8ab</a:RelatesTo>
|
||||||
<o:Security s:mustUnderstand="1" xmlns:o=
|
<o:Security s:mustUnderstand="1" xmlns:o=
|
||||||
"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
"http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
||||||
<u:Timestamp u:Id="_0">
|
<u:Timestamp u:Id="_0">
|
||||||
<u:Created>2012-08-02T00:32:59.420Z</u:Created>
|
<u:Created>2012-08-02T00:32:59.420Z</u:Created>
|
||||||
<u:Expires>2012-08-02T00:37:59.420Z</u:Expires>
|
<u:Expires>2012-08-02T00:37:59.420Z</u:Expires>
|
||||||
</u:Timestamp>
|
</u:Timestamp>
|
||||||
</o:Security>
|
</o:Security>
|
||||||
</s:Header>
|
</s:Header>
|
||||||
<s:Body>
|
<s:Body>
|
||||||
<RequestSecurityTokenResponseCollection
|
<RequestSecurityTokenResponseCollection
|
||||||
xmlns="http://docs.oasis-open.org/ws-sx/ws-trust/200512">
|
xmlns="http://docs.oasis-open.org/ws-sx/ws-trust/200512">
|
||||||
<RequestSecurityTokenResponse>
|
<RequestSecurityTokenResponse>
|
||||||
<TokenType>
|
<TokenType>
|
||||||
http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken
|
http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentToken
|
||||||
</TokenType>
|
</TokenType>
|
||||||
<DispositionMessage xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollment"/>
|
<DispositionMessage xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollment"/>
|
||||||
<RequestedSecurityToken>
|
<RequestedSecurityToken>
|
||||||
<BinarySecurityToken
|
<BinarySecurityToken
|
||||||
ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc"
|
ValueType="http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc"
|
||||||
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary"
|
EncodingType="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd#base64binary"
|
||||||
xmlns="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
xmlns="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
|
||||||
B64EncodedSampleBinarySecurityToken
|
B64EncodedSampleBinarySecurityToken
|
||||||
</BinarySecurityToken>
|
</BinarySecurityToken>
|
||||||
</RequestedSecurityToken>
|
</RequestedSecurityToken>
|
||||||
<RequestID xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollment">0</RequestID>
|
<RequestID xmlns="http://schemas.microsoft.com/windows/pki/2009/01/enrollment">0</RequestID>
|
||||||
</RequestSecurityTokenResponse>
|
</RequestSecurityTokenResponse>
|
||||||
</RequestSecurityTokenResponseCollection>
|
</RequestSecurityTokenResponseCollection>
|
||||||
</s:Body>
|
</s:Body>
|
||||||
</s:Envelope>
|
</s:Envelope>
|
||||||
```
|
```
|
||||||
|
|
||||||
The following code shows sample provisioning XML (presented in the preceding package as a security token):
|
The following code shows sample provisioning XML (presented in the preceding package as a security token):
|
||||||
@ -610,11 +614,16 @@ The following code shows sample provisioning XML (presented in the preceding pac
|
|||||||
</wap-provisioningdoc>
|
</wap-provisioningdoc>
|
||||||
```
|
```
|
||||||
|
|
||||||
**Notes**
|
> [!NOTE]
|
||||||
|
>
|
||||||
- <Parm name> and <characteristic type=> elements in the w7 APPLICATION CSP XML are case sensitive and must be all uppercase.
|
> - <Parm name> and <characteristic type=> elements in the w7 APPLICATION CSP XML are case sensitive and must be all uppercase.
|
||||||
- In w7 APPLICATION characteristic, both CLIENT and APPSRV credentials should be provided in XML.
|
>
|
||||||
- Detailed descriptions of these settings are located in the [Enterprise settings, policies and app management](windows-mdm-enterprise-settings.md) section of this document.
|
> - In w7 APPLICATION characteristic, both CLIENT and APPSRV credentials should be provided in XML.
|
||||||
- The **PrivateKeyContainer** characteristic is required and must be present in the Enrollment provisioning XML by the enrollment. Other important settings are the **PROVIDER-ID**, **NAME**, and **ADDR** parameter elements, which need to contain the unique ID and NAME of your DM provider and the address where the device can connect for configuration provisioning. The ID and NAME can be arbitrary values, but they must be unique.
|
>
|
||||||
- Also important is SSLCLIENTCERTSEARCHCRITERIA, which is used for selecting the certificate to be used for client authentication. The search is based on the subject attribute of the signed user certificate.
|
> - Detailed descriptions of these settings are located in the [Enterprise settings, policies and app management](windows-mdm-enterprise-settings.md) section of this document.
|
||||||
- CertificateStore/WSTEP enables certificate renewal. If the server does not support it, do not set it.
|
>
|
||||||
|
> - The **PrivateKeyContainer** characteristic is required and must be present in the Enrollment provisioning XML by the enrollment. Other important settings are the **PROVIDER-ID**, **NAME**, and **ADDR** parameter elements, which need to contain the unique ID and NAME of your DM provider and the address where the device can connect for configuration provisioning. The ID and NAME can be arbitrary values, but they must be unique.
|
||||||
|
>
|
||||||
|
> - Also important is SSLCLIENTCERTSEARCHCRITERIA, which is used for selecting the certificate to be used for client authentication. The search is based on the subject attribute of the signed user certificate.
|
||||||
|
>
|
||||||
|
> - CertificateStore/WSTEP enables certificate renewal. If the server does not support it, do not set it.
|
||||||
|
@ -7076,6 +7076,18 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
</dd>
|
</dd>
|
||||||
</dl>
|
</dl>
|
||||||
|
|
||||||
|
### NetworkListManager policies
|
||||||
|
|
||||||
|
<dl>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-networklistmanager.md#networklistmanager-allowedtlsauthenticationendpoints" id="networklistmanager-allowedtlsauthenticationendpoints">NetworkListManager/AllowedTlsAuthenticationEndpoints</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-networklistmanager.md#networklistmanager-configuredtlsauthenticationnetworkname" id="networklistmanager-configuredtlsauthenticationnetworkname">NetworkListManager/ConfiguredTLSAuthenticationNetworkName</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
</dl>
|
||||||
|
|
||||||
### Notifications policies
|
### Notifications policies
|
||||||
|
|
||||||
<dl>
|
<dl>
|
||||||
|
@ -73,6 +73,9 @@ manager: dansimp
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#experience-allowwindowstips">Experience/AllowWindowsTips</a>
|
<a href="#experience-allowwindowstips">Experience/AllowWindowsTips</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#experience-configurechaticonvisibilityonthetaskbar">Experience/ConfigureChatIcon</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#experience-configurewindowsspotlightonlockscreen">Experience/ConfigureWindowsSpotlightOnLockScreen</a>
|
<a href="#experience-configurewindowsspotlightonlockscreen">Experience/ConfigureWindowsSpotlightOnLockScreen</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -499,7 +502,7 @@ The values for this policy are 1 and 0. This policy defaults to 1.
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="experience-allowsaveasofofficefiles"></a>**Experience/AllowSaveAsOfOfficeFiles**
|
<a href="" id="experience-allowsaveasofofficefiles"></a><b>Experience/AllowSaveAsOfOfficeFiles</b>
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
@ -1150,6 +1153,64 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="experience-configurechaticonvisibilityonthetaskbar"></a>**Experience/ConfigureChatIcon**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Windows Edition</th>
|
||||||
|
<th>Supported?</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Home</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Pro</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Business</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Enterprise</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Education</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Machine
|
||||||
|
<hr/>
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
This policy setting allows you to configure the Chat icon on the taskbar.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The values for this policy are 0, 1, 2, and 3. This policy defaults to 0 if not enabled.
|
||||||
|
|
||||||
|
- 0 - Not Configured: The Chat icon will be configured according to the defaults for your Windows edition.
|
||||||
|
- 1 - Show: The Chat icon will be displayed on the taskbar by default. Users can show or hide it in Settings.
|
||||||
|
- 2 - Hide: The Chat icon will be hidden by default. Users can show or hide it in Settings.
|
||||||
|
- 3 - Disabled: The Chat icon will not be displayed, and users cannot show or hide it in Settings.
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="experience-configurewindowsspotlightonlockscreen"></a>**Experience/ConfigureWindowsSpotlightOnLockScreen**
|
<a href="" id="experience-configurewindowsspotlightonlockscreen"></a>**Experience/ConfigureWindowsSpotlightOnLockScreen**
|
||||||
|
|
||||||
|
135
windows/client-management/mdm/policy-csp-networklistmanager.md
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
---
|
||||||
|
title: Policy CSP - NetworkListManager
|
||||||
|
description: The Policy CSP - NetworkListManager setting creates a new MDM policy that allows admins to configure a list of URIs of HTTPS endpoints that are considered secure.
|
||||||
|
ms.author: v-nsatapathy
|
||||||
|
ms.topic: article
|
||||||
|
ms.prod: w10
|
||||||
|
ms.technology: windows
|
||||||
|
author: nimishasatapathy
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.date: 7/10/2021
|
||||||
|
ms.reviewer:
|
||||||
|
manager: dansimp
|
||||||
|
---
|
||||||
|
|
||||||
|
# Policy CSP - NetworkListManager
|
||||||
|
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policies-->
|
||||||
|
## NetworkListManager policies
|
||||||
|
|
||||||
|
<dl>
|
||||||
|
<dd>
|
||||||
|
<a href="#networklistmanager-allowedtlsauthenticationendpoints">NetworkListManager/AllowedTlsAuthenticationEndpoints</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#networklistmanager-configuredtlsauthenticationnetworkname">NetworkListManager/ConfiguredTLSAuthenticationNetworkName</a>
|
||||||
|
</dd>
|
||||||
|
</dl>
|
||||||
|
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="networklistmanager-allowedtlsauthenticationendpoints"></a>**NetworkListManager/AllowedTlsAuthenticationEndpoints**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Windows Edition</th>
|
||||||
|
<th>Supported?</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Home</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Pro</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Business</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Enterprise</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Education</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Machine
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated.
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="networklistmanager-configuredtlsauthenticationnetworkname"></a>**NetworkListManager/ConfiguredTLSAuthenticationNetworkName**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Windows Edition</th>
|
||||||
|
<th>Supported?</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Home</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Pro</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Business</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Enterprise</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Education</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Machine
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
This policy setting provides the string to be used to name the network authenticated against one of the endpoints listed in NetworkListManager/AllowedTlsAuthenticationEndpoints policy.
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Policies-->
|
||||||
|
|
@ -725,6 +725,8 @@ items:
|
|||||||
href: policy-csp-multitasking.md
|
href: policy-csp-multitasking.md
|
||||||
- name: NetworkIsolation
|
- name: NetworkIsolation
|
||||||
href: policy-csp-networkisolation.md
|
href: policy-csp-networkisolation.md
|
||||||
|
- name: NetworkListManager
|
||||||
|
href: policy-csp-networklistmanager.md
|
||||||
- name: Notifications
|
- name: Notifications
|
||||||
href: policy-csp-notifications.md
|
href: policy-csp-notifications.md
|
||||||
- name: Power
|
- name: Power
|
||||||
|
@ -18,6 +18,8 @@ items:
|
|||||||
href: change-default-removal-policy-external-storage-media.md
|
href: change-default-removal-policy-external-storage-media.md
|
||||||
- name: Group Policies that apply only to Windows 10 Enterprise and Windows 10 Education
|
- name: Group Policies that apply only to Windows 10 Enterprise and Windows 10 Education
|
||||||
href: group-policies-for-enterprise-and-education-editions.md
|
href: group-policies-for-enterprise-and-education-editions.md
|
||||||
|
- name: Manage Device Installation with Group Policy
|
||||||
|
href: manage-device-installation-with-group-policy.md
|
||||||
- name: Manage the Settings app with Group Policy
|
- name: Manage the Settings app with Group Policy
|
||||||
href: manage-settings-app-with-group-policy.md
|
href: manage-settings-app-with-group-policy.md
|
||||||
- name: What version of Windows am I running
|
- name: What version of Windows am I running
|
||||||
|
@ -11,6 +11,8 @@
|
|||||||
href: update/waas-quick-start.md
|
href: update/waas-quick-start.md
|
||||||
- name: Windows update fundamentals
|
- name: Windows update fundamentals
|
||||||
href: update/waas-overview.md
|
href: update/waas-overview.md
|
||||||
|
- name: Monthly quality updates
|
||||||
|
href: update/quality-updates.md
|
||||||
- name: Basics of Windows updates, channels, and tools
|
- name: Basics of Windows updates, channels, and tools
|
||||||
href: update/get-started-updates-channels-tools.md
|
href: update/get-started-updates-channels-tools.md
|
||||||
- name: Servicing the Windows 10 operating system
|
- name: Servicing the Windows 10 operating system
|
||||||
|
@ -35,12 +35,12 @@ Check out the following new articles about Windows 11:
|
|||||||
- [Plan for Windows 11](/windows/whats-new/windows-11-plan)
|
- [Plan for Windows 11](/windows/whats-new/windows-11-plan)
|
||||||
- [Prepare for Windows 11](/windows/whats-new/windows-11-prepare)
|
- [Prepare for Windows 11](/windows/whats-new/windows-11-prepare)
|
||||||
|
|
||||||
|
The [Windows ADK for Windows 11](/windows-hardware/get-started/adk-install) is available.<br>
|
||||||
|
|
||||||
[SetupDiag](#setupdiag) is included with Windows 10, version 2004 and later.<br>
|
[SetupDiag](#setupdiag) is included with Windows 10, version 2004 and later.<br>
|
||||||
The [Windows ADK for Windows 10, version 2004](/windows-hardware/get-started/adk-install) is available.<br>
|
|
||||||
New capabilities are available for [Delivery Optimization](#delivery-optimization) and [Windows Update for Business](#windows-update-for-business).<br>
|
New capabilities are available for [Delivery Optimization](#delivery-optimization) and [Windows Update for Business](#windows-update-for-business).<br>
|
||||||
VPN support is added to [Windows Autopilot](#windows-autopilot)<br>
|
VPN support is added to [Windows Autopilot](#windows-autopilot)<br>
|
||||||
An in-place upgrade wizard is available in [Configuration Manager](#microsoft-endpoint-configuration-manager).<br>
|
An in-place upgrade wizard is available in [Configuration Manager](#microsoft-endpoint-configuration-manager).<br>
|
||||||
The [Windows ADK](#windows-assessment-and-deployment-kit-adk) for Windows 10, version 2004 is available.<br>
|
|
||||||
The Windows 10 deployment and update [landing page](index.yml) has been redesigned, with additional content added and more content coming soon.<br>
|
The Windows 10 deployment and update [landing page](index.yml) has been redesigned, with additional content added and more content coming soon.<br>
|
||||||
|
|
||||||
## The Modern Desktop Deployment Center
|
## The Modern Desktop Deployment Center
|
||||||
@ -186,9 +186,9 @@ For the latest information about MDT, see the [MDT release notes](/mem/configmgr
|
|||||||
|
|
||||||
The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows.
|
The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows.
|
||||||
|
|
||||||
Download the Windows ADK and Windows PE add-on for Windows 10, version 2004 [here](/windows-hardware/get-started/adk-install).
|
Download the Windows ADK and Windows PE add-on for Windows 11 [here](/windows-hardware/get-started/adk-install).
|
||||||
|
|
||||||
For information about what's new in the ADK, see [What's new in the Windows ADK for Windows 10, version 2004](/windows-hardware/get-started/what-s-new-in-kits-and-tools#whats-new-in-the-windows-adk-for-windows-10-version-2004).
|
For information about what's new in the ADK, see [What's new in the Windows ADK](/windows-hardware/get-started/what-s-new-in-kits-and-tools).
|
||||||
|
|
||||||
Also see [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md).
|
Also see [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md).
|
||||||
|
|
||||||
|
@ -140,4 +140,4 @@ In-place upgrade with Configuration Manager
|
|||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)<br>
|
[Windows 10 deployment scenarios](../windows-10-deployment-scenarios.md)<br>
|
||||||
[Configuration Manager Team blog](https://go.microsoft.com/fwlink/p/?LinkId=620109)
|
[Configuration Manager Team blog](https://techcommunity.microsoft.com/t5/configuration-manager-blog/bg-p/ConfigurationManagerBlog)
|
77
windows/deployment/update/quality-updates.md
Normal file
@ -0,0 +1,77 @@
|
|||||||
|
---
|
||||||
|
title: Monthly quality updates (Windows 10/11)
|
||||||
|
description: Learn about Windows monthly quality updates to stay productive and protected.
|
||||||
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
author: greg-lindsay
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: greglin
|
||||||
|
ms.reviewer:
|
||||||
|
manager: laurawi
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Monthly quality updates
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows 11
|
||||||
|
|
||||||
|
Windows monthly quality updates help you to stay productive and protected. They provide your users and IT administrators with the security fixes they need, and protect devices so that unpatched vulnerabilities can't be exploited. Quality updates are cumulative; they include all previously released fixes to guard against fragmentation of the operating system (OS). Reliability and vulnerability issues can occur when only a subset of fixes is installed.
|
||||||
|
|
||||||
|
This article provides details on the types of monthly quality updates that Microsoft provides, and how they help make the overall user experience simple and consistent.
|
||||||
|
|
||||||
|
## Quality updates
|
||||||
|
|
||||||
|
Quality updates are provided on a monthly schedule, as two types of releases:
|
||||||
|
|
||||||
|
1. Non-security releases
|
||||||
|
2. Combined security + non-security releases
|
||||||
|
|
||||||
|
Non-security releases provide IT admins an opportunity for early validation of that content prior to the combined release. Releases can also be provided outside of the monthly schedule when there is an exceptional need.
|
||||||
|
|
||||||
|
### B releases
|
||||||
|
|
||||||
|
Most people are familiar with what is commonly referred to as **Patch Tuesday** or **Update Tuesday**. These updates are released on the second Tuesday of each month, and are known as the **B release** (where “**B**” refers to the second week in the month). B releases are typically published at 10:00 AM Pacific Time (PST/PDT).
|
||||||
|
|
||||||
|
Because they are cumulative, B releases include both new and previously released security fixes, along with non-security content introduced in the prior month’s **Preview C release** (see the next section). These updates help keep Windows devices secure and compliant by deploying stability fixes and addressing security vulnerabilities. B releases are mandatory.
|
||||||
|
|
||||||
|
Channels for availability of B releases include: Windows Update, Windows Server Update Services (WSUS), and the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx).
|
||||||
|
|
||||||
|
### C releases
|
||||||
|
|
||||||
|
IT admins have the option to test and validate production-quality releases ahead of the planned B release for the following month. These updates are optional, cumulative, non-security preview releases known as **C releases**. These releases are only offered to the most recent, supported versions of Windows. For example, new features like [News and Interests](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/group-configuration-news-and-interests-on-the-windows-taskbar/ba-p/2281005) might initially be deployed in the prior month’s C preview release, then ship in the following month’s B release.
|
||||||
|
|
||||||
|
For customers to access the C releases, they must navigate to **Settings** > **Update & Security** > **Windows Update** and select **Check for updates**.
|
||||||
|
|
||||||
|
IT admins can also validate fixes and features in a preview update by leveraging the [Windows Insider Program for Business](https://insider.windows.com/for-business) or via the [Microsoft Update Catalog](https://www.catalog.update.microsoft.com/Home.aspx).
|
||||||
|
|
||||||
|
### OOB releases
|
||||||
|
|
||||||
|
Out-of-band (OOB) releases might be provided to fix a recently identified issue or vulnerability. They are used in atypical cases when an issue is detected and cannot wait for the next monthly release, because devices must be updated immediately to address security vulnerabilities or to resolve a quality issue impacting many devices.
|
||||||
|
|
||||||
|
Some key considerations about OOB releases include:
|
||||||
|
|
||||||
|
- OOB releases are always cumulative, and they supersede any prior B or C release.
|
||||||
|
- The OOB releases will generally require IT admins to deploy off-cycle.
|
||||||
|
- Some OOB releases are classified as critical and will automatically be pushed to Windows Server Update Services and Windows Update for Business, just like the B releases.
|
||||||
|
- Some OOB releases are non-critical and only go to the Microsoft Update Catalog for users or organizations to voluntarily seek out the update.
|
||||||
|
|
||||||
|
## More information
|
||||||
|
|
||||||
|
For additional details about the different types of Windows updates like critical, security, drivers, service packs, and more, please see the [Description of the standard terminology used to describe Microsoft software updates](https://support.microsoft.com/help/824684) and [Introducing a new deployment service for driver and firmware updates](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/introducing-a-new-deployment-service-for-driver-and-firmware/ba-p/2176942).
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
- [Overview of Windows as a service](waas-overview.md)
|
||||||
|
- [Update Windows 10 in the enterprise](index.md)
|
||||||
|
- [Quick guide to Windows as a service](waas-quick-start.md)
|
||||||
|
- [Configure Delivery Optimization for Windows 10 updates](waas-delivery-optimization.md)
|
||||||
|
- [Configure BranchCache for Windows 10 updates](waas-branchcache.md)
|
||||||
|
- [Configure Windows Update for Business](waas-configure-wufb.md)
|
||||||
|
- [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md)
|
||||||
|
- [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md)
|
||||||
|
- [Walkthrough: use Intune to configure Windows Update for Business](/intune/windows-update-for-business-configure)
|
||||||
|
- [Manage device restarts after updates](waas-restart.md)
|
@ -37,7 +37,7 @@ Take the following steps to create a configuration profile that will set require
|
|||||||
5. You are now on the Configuration profile creation screen. On the **Basics** tab, give a **Name** and **Description**.
|
5. You are now on the Configuration profile creation screen. On the **Basics** tab, give a **Name** and **Description**.
|
||||||
6. On the **Configuration settings** page, you will be adding multiple OMA-URI Settings that correspond to the policies described in [Manually configuring devices for Update Compliance](update-compliance-configuration-manual.md).
|
6. On the **Configuration settings** page, you will be adding multiple OMA-URI Settings that correspond to the policies described in [Manually configuring devices for Update Compliance](update-compliance-configuration-manual.md).
|
||||||
1. If you don't already have it, get your Commercial ID. For steps, see [Get your CommmercialID](update-compliance-get-started.md#get-your-commercialid).
|
1. If you don't already have it, get your Commercial ID. For steps, see [Get your CommmercialID](update-compliance-get-started.md#get-your-commercialid).
|
||||||
2. Add a setting for **Commercial ID** ) with the following values:
|
2. Add a setting for **Commercial ID** with the following values:
|
||||||
- **Name**: Commercial ID
|
- **Name**: Commercial ID
|
||||||
- **Description**: Sets the Commercial ID that corresponds to the Update Compliance Log Analytics workspace.
|
- **Description**: Sets the Commercial ID that corresponds to the Update Compliance Log Analytics workspace.
|
||||||
- **OMA-URI**: `./Vendor/MSFT/DMClient/Provider/ProviderID/CommercialID`
|
- **OMA-URI**: `./Vendor/MSFT/DMClient/Provider/ProviderID/CommercialID`
|
||||||
|
@ -5,7 +5,7 @@ keywords: updates, servicing, current, deployment, semi-annual channel, feature,
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: high
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -49,7 +49,7 @@ When run by Windows Setup, the following [parameters](#parameters) are used:
|
|||||||
- /Output:%windir%\logs\SetupDiag\SetupDiagResults.xml
|
- /Output:%windir%\logs\SetupDiag\SetupDiagResults.xml
|
||||||
- /RegPath:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupDiag\Results
|
- /RegPath:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupDiag\Results
|
||||||
|
|
||||||
The resulting SetupDiag analysis can be found at **%WinDir%\Logs\SetupDiag\SetupDiagResults.xml** and in the registry under **HKLM\SYSTEM\Setup\SetupDiag\Results**.
|
The resulting SetupDiag analysis can be found at **%WinDir%\Logs\SetupDiag\SetupDiagResults.xml** and in the registry under **HKLM\SYSTEM\Setup\SetupDiag\Results**. Please note that this is not the same as the default registry path when SetupDiag is run manually. When SetupDiag is run manually, and the /RegPath parameter is not specificed, data is stored in the registry at HKLM\SYSTEM\Setup\MoSetup\Volatile\SetupDiag.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> When SetupDiag indicates that there were multiple failures, the last failure in the log file is typically the fatal error, not the first one.
|
> When SetupDiag indicates that there were multiple failures, the last failure in the log file is typically the fatal error, not the first one.
|
||||||
|
@ -15,39 +15,35 @@ ms.topic: article
|
|||||||
---
|
---
|
||||||
|
|
||||||
# User State Migration Tool (USMT) Overview
|
# User State Migration Tool (USMT) Overview
|
||||||
|
|
||||||
You can use User State Migration Tool (USMT) 10.0 to streamline and simplify user state migration during large deployments of Windows operating systems. USMT captures user accounts, user files, operating system settings, and application settings, and then migrates them to a new Windows installation. You can use USMT for both PC replacement and PC refresh migrations. For more information, see [Common Migration Scenarios](usmt-common-migration-scenarios.md).
|
You can use User State Migration Tool (USMT) 10.0 to streamline and simplify user state migration during large deployments of Windows operating systems. USMT captures user accounts, user files, operating system settings, and application settings, and then migrates them to a new Windows installation. You can use USMT for both PC replacement and PC refresh migrations. For more information, see [Common Migration Scenarios](usmt-common-migration-scenarios.md).
|
||||||
|
|
||||||
USMT enables you to do the following:
|
USMT enables you to do the following:
|
||||||
|
|
||||||
- Configure your migration according to your business needs by using the migration rule (.xml) files to control exactly which files and settings are migrated and how they are migrated. For more information about how to modify these files, see [USMT XML Reference](usmt-xml-reference.md).
|
- Configure your migration according to your business needs by using the migration rule (.xml) files to control exactly which files and settings are migrated and how they are migrated. For more information about how to modify these files, see [USMT XML Reference](usmt-xml-reference.md).
|
||||||
|
|
||||||
- Fit your customized migration into your automated deployment process by using the ScanState and LoadState tools, which control collecting and restoring the user files and settings. For more information, see [User State Migration Tool (USMT) Command-line Syntax](usmt-command-line-syntax.md).
|
- Fit your customized migration into your automated deployment process by using the ScanState and LoadState tools, which control collecting and restoring the user files and settings. For more information, see [User State Migration Tool (USMT) Command-line Syntax](usmt-command-line-syntax.md).
|
||||||
|
|
||||||
- Perform offline migrations. You can run migrations offline by using the ScanState command in Windows Preinstallation Environment (WinPE) or you can perform migrations from previous installations of Windows contained in Windows.old directories. For more information about migration types, see [Choose a Migration Store Type](usmt-choose-migration-store-type.md) and [Offline Migration Reference](offline-migration-reference.md).
|
- Perform offline migrations. You can run migrations offline by using the ScanState command in Windows Preinstallation Environment (WinPE) or you can perform migrations from previous installations of Windows contained in Windows.old directories. For more information about migration types, see [Choose a Migration Store Type](usmt-choose-migration-store-type.md) and [Offline Migration Reference](offline-migration-reference.md).
|
||||||
|
|
||||||
## Benefits
|
## Benefits
|
||||||
|
|
||||||
USMT provides the following benefits to businesses that are deploying Windows operating systems:
|
USMT provides the following benefits to businesses that are deploying Windows operating systems:
|
||||||
|
|
||||||
- Safely migrates user accounts, operating system and application settings.
|
- Safely migrates user accounts, operating system and application settings.
|
||||||
|
|
||||||
- Lowers the cost of deploying Windows by preserving user state.
|
- Lowers the cost of deploying Windows by preserving user state.
|
||||||
|
|
||||||
- Reduces end-user downtime required to customize desktops and find missing files.
|
- Reduces end-user downtime required to customize desktops and find missing files.
|
||||||
|
|
||||||
- Reduces help-desk calls.
|
- Reduces help-desk calls.
|
||||||
|
|
||||||
- Reduces the time needed for the user to become familiar with the new operating system.
|
- Reduces the time needed for the user to become familiar with the new operating system.
|
||||||
|
|
||||||
- Increases employee satisfaction with the migration experience.
|
- Increases employee satisfaction with the migration experience.
|
||||||
|
|
||||||
## Limitations
|
## Limitations
|
||||||
USMT is intended for administrators who are performing large-scale automated deployments. If you are only migrating the user states of a few computers, you can use [PCmover Express](https://go.microsoft.com/fwlink/?linkid=620915). PCmover Express is a tool created by Microsoft's partner, Laplink.
|
|
||||||
|
USMT is intended for administrators who are performing large-scale automated deployments. If you are only migrating the user states of a few computers, you can use [PCmover Express](https://go.microsoft.com/fwlink/?linkid=620915). PCmover is not a free utility. PCmover Express is a tool created by Microsoft's partner, Laplink.
|
||||||
|
|
||||||
There are some scenarios in which the use of USMT is not recommended. These include:
|
There are some scenarios in which the use of USMT is not recommended. These include:
|
||||||
|
|
||||||
- Migrations that require end-user interaction.
|
- Migrations that require end-user interaction.
|
||||||
|
|
||||||
- Migrations that require customization on a machine-by-machine basis.
|
- Migrations that require customization on a machine-by-machine basis.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [User State Migration Tool (USMT) Technical Reference](usmt-technical-reference.md)
|
- [User State Migration Tool (USMT) Technical Reference](usmt-technical-reference.md)
|
||||||
|
@ -57,7 +57,7 @@ Inherited Activation is a new feature available in Windows 10, version 1803 that
|
|||||||
|
|
||||||
When a user with Windows 10 E3/E5 or A3/A5 license assigned creates a new Windows 10 virtual machine (VM) using a Windows 10 local host, the VM inherits the activation state from a host machine independent of whether user signs on with a local account or using an Azure Active Directory (AAD) account on a VM.
|
When a user with Windows 10 E3/E5 or A3/A5 license assigned creates a new Windows 10 virtual machine (VM) using a Windows 10 local host, the VM inherits the activation state from a host machine independent of whether user signs on with a local account or using an Azure Active Directory (AAD) account on a VM.
|
||||||
|
|
||||||
To support Inherited Activation, both the host computer and the VM must be running Windows 10, version 1803 or later.
|
To support Inherited Activation, both the host computer and the VM must be running Windows 10, version 1803 or later. The hypervisor platform must also be Windows Hyper-V.
|
||||||
|
|
||||||
## The evolution of deployment
|
## The evolution of deployment
|
||||||
|
|
||||||
|
@ -50,7 +50,7 @@ Starting in Windows 10, version 1903 and newer, both the **Out-of-Box-Experience
|
|||||||
|
|
||||||
## Behavioral changes
|
## Behavioral changes
|
||||||
|
|
||||||
In an upcoming release of Windows 10, we’re simplifying your diagnostic data controls by moving from four diagnostic data controls to three: **Diagnostic data off**, **Required**, and **Optional**. If your devices are set to **Enhanced** when they are upgraded, the device settings will be evaluated to be at the more privacy-preserving setting of **Required diagnostic data**, which means that analytic services that leverage enhanced data collection may not work properly. For a list of services, see [Services that rely on Enhanced diagnostic data](#services-that-rely-on-enhanced-diagnostic-data). Administrators should read through the details and determine whether to apply these new policies to restore the same collection settings as they had before this change. For a list of steps, see [Configure a Windows 10 device to limit crash dumps and logs](#configure-a-windows-10-device-to-limit-crash-dumps-and-logs). For more information on services that rely on Enhanced diagnostic data, see [Services that rely on Enhanced diagnostic data](#services-that-rely-on-enhanced-diagnostic-data).
|
In an upcoming release of Windows 10, we’re simplifying your diagnostic data controls by moving from four diagnostic data controls to three: **Diagnostic data off**, **Required**, and **Optional**. If your devices are set to **Enhanced** when they are upgraded, the device settings will be evaluated to be at the more privacy-preserving setting of **Required diagnostic data**, which means that analytic services that leverage enhanced data collection may not work properly. For a list of services, see [Services that rely on Enhanced diagnostic data](#services-that-rely-on-enhanced-diagnostic-data). Administrators should read through the details and determine whether to apply these new policies to restore the same collection settings as they had before this change. For a list of steps, see [Configure a Windows 11 device to limit crash dumps and logs](#configure-a-windows-11-device-to-limit-crash-dumps-and-logs). For more information on services that rely on Enhanced diagnostic data, see [Services that rely on Enhanced diagnostic data](#services-that-rely-on-enhanced-diagnostic-data).
|
||||||
|
|
||||||
Additionally, you will see the following policy changes in an upcoming release of Windows 10:
|
Additionally, you will see the following policy changes in an upcoming release of Windows 10:
|
||||||
|
|
||||||
@ -72,7 +72,7 @@ A final set of changes includes two new policies that can help you fine-tune dia
|
|||||||
>[!Important]
|
>[!Important]
|
||||||
>All the changes mentioned in this section will not be released on versions of Windows, version 1809 and earlier as well as Windows Server 2019 and earlier.
|
>All the changes mentioned in this section will not be released on versions of Windows, version 1809 and earlier as well as Windows Server 2019 and earlier.
|
||||||
|
|
||||||
## Configure a Windows 10 device to limit crash dumps and logs
|
## Configure a Windows 11 device to limit crash dumps and logs
|
||||||
|
|
||||||
With the Enhanced diagnostic data level being split out into new policies, we're providing additional controls to manage what types of crash dumps are collected and whether to send additional diagnostic logs. Here are some steps on how to configure them:
|
With the Enhanced diagnostic data level being split out into new policies, we're providing additional controls to manage what types of crash dumps are collected and whether to send additional diagnostic logs. Here are some steps on how to configure them:
|
||||||
|
|
||||||
|
@ -101,11 +101,9 @@
|
|||||||
href: virtual-smart-cards\virtual-smart-card-tpmvscmgr.md
|
href: virtual-smart-cards\virtual-smart-card-tpmvscmgr.md
|
||||||
- name: Enterprise Certificate Pinning
|
- name: Enterprise Certificate Pinning
|
||||||
href: enterprise-certificate-pinning.md
|
href: enterprise-certificate-pinning.md
|
||||||
- name: Install digital certificates on Windows 10 Mobile
|
|
||||||
href: installing-digital-certificates-on-windows-10-mobile.md
|
|
||||||
- name: Windows 10 credential theft mitigation guide abstract
|
- name: Windows 10 credential theft mitigation guide abstract
|
||||||
href: windows-credential-theft-mitigation-guide-abstract.md
|
href: windows-credential-theft-mitigation-guide-abstract.md
|
||||||
- name: Configure S/MIME for Windows 10 and Windows 10 Mobile
|
- name: Configure S/MIME for Windows 10
|
||||||
href: configure-s-mime.md
|
href: configure-s-mime.md
|
||||||
- name: VPN technical guide
|
- name: VPN technical guide
|
||||||
href: vpn\vpn-guide.md
|
href: vpn\vpn-guide.md
|
||||||
|
@ -229,8 +229,26 @@ The SECURITY\_NT\_AUTHORITY (S-1-5) predefined identifier authority produces SID
|
|||||||
| S-1-5-32-548| Account Operators| A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.|
|
| S-1-5-32-548| Account Operators| A built-in group that exists only on domain controllers. By default, the group has no members. By default, Account Operators have permission to create, modify, and delete accounts for users, groups, and computers in all containers and organizational units of Active Directory except the Builtin container and the Domain Controllers OU. Account Operators do not have permission to modify the Administrators and Domain Admins groups, nor do they have permission to modify the accounts for members of those groups.|
|
||||||
| S-1-5-32-549| Server Operators| Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.|
|
| S-1-5-32-549| Server Operators| Description: A built-in group that exists only on domain controllers. By default, the group has no members. Server Operators can log on to a server interactively; create and delete network shares; start and stop services; back up and restore files; format the hard disk of the computer; and shut down the computer.|
|
||||||
| S-1-5-32-550 | Print Operators| A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues.|
|
| S-1-5-32-550 | Print Operators| A built-in group that exists only on domain controllers. By default, the only member is the Domain Users group. Print Operators can manage printers and document queues.|
|
||||||
| S-1-5-32-551 | Backup Operators| A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.
|
| S-1-5-32-551 | Backup Operators| A built-in group. By default, the group has no members. Backup Operators can back up and restore all files on a computer, regardless of the permissions that protect those files. Backup Operators also can log on to the computer and shut it down.|
|
||||||
| S-1-5-32-552 | Replicators | A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.|
|
| S-1-5-32-552 | Replicators | A built-in group that is used by the File Replication service on domain controllers. By default, the group has no members. Do not add users to this group.|
|
||||||
|
|S-1-5-32-554|Builtin\Pre-Windows 2000 Compatible Access|An alias added by Windows 2000. A backward compatibility group that allows read access on all users and groups in the domain.|
|
||||||
|
|S-1-5-32-555|Builtin\Remote Desktop Users|An alias. Members in this group are granted the right to log on remotely.|
|
||||||
|
|S-1-5-32-556|Builtin\Network Configuration Operators|An alias. Members in this group can have some administrative privileges to manage configuration of networking features.|
|
||||||
|
|S-1-5-32-557|Builtin\Incoming Forest Trust Builders|An alias. Members of this group can create incoming, one-way trusts to this forest.|
|
||||||
|
|S-1-5-32-558|Builtin\Performance Monitor Users|An alias. Members of this group have remote access to monitor this computer.|
|
||||||
|
|S-1-5-32-559|Builtin\Performance Log Users|An alias. Members of this group have remote access to schedule logging of performance counters on this computer.|
|
||||||
|
|S-1-5-32-560|Builtin\Windows Authorization Access Group|An alias. Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects.|
|
||||||
|
|S-1-5-32-561|Builtin\Terminal Server License Servers|An alias. A group for Terminal Server License Servers. When Windows Server 2003 Service Pack 1 is installed, a new local group is created.|
|
||||||
|
|S-1-5-32-562|Builtin\Distributed COM Users|An alias. A group for COM to provide computer-wide access controls that govern access to all call, activation, or launch requests on the computer.|
|
||||||
|
|S-1-5-32-569|Builtin\Cryptographic Operators|A built-in local group. Members are authorized to perform cryptographic operations.|
|
||||||
|
|S-1-5-32-573|Builtin\Event Log Readers|A built-in local group. Members of this group can read event logs from local computer.|
|
||||||
|
|S-1-5-32-574|Builtin\Certificate Service DCOM Access|A built-in local group. Members of this group are allowed to connect to Certification Authorities in the enterprise.|
|
||||||
|
|S-1-5-32-575|Builtin\RDS Remote Access Servers|A built-in local group. Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.|
|
||||||
|
|S-1-5-32-576|Builtin\RDS Endpoint Servers|A built-in local group. Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.|
|
||||||
|
|S-1-5-32-577|Builtin\RDS Management Servers|A builtin local group. Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.|
|
||||||
|
|S-1-5-32-578|Builtin\Hyper-V Administrators|A built-in local group. Members of this group have complete and unrestricted access to all features of Hyper-V.|
|
||||||
|
|S-1-5-32-579|Builtin\Access Control Assistance Operators|A built-in local group. Members of this group can remotely query authorization attributes and permissions for resources on this computer.|
|
||||||
|
|S-1-5-32-580|Builtin\Remote Management Users|A built-in local group. Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.|
|
||||||
| S-1-5-64-10| NTLM Authentication| A SID that is used when the NTLM authentication package authenticated the client|
|
| S-1-5-64-10| NTLM Authentication| A SID that is used when the NTLM authentication package authenticated the client|
|
||||||
| S-1-5-64-14 | SChannel Authentication| A SID that is used when the SChannel authentication package authenticated the client.|
|
| S-1-5-64-14 | SChannel Authentication| A SID that is used when the SChannel authentication package authenticated the client.|
|
||||||
| S-1-5-64-21 | Digest Authentication| A SID that is used when the Digest authentication package authenticated the client.|
|
| S-1-5-64-21 | Digest Authentication| A SID that is used when the Digest authentication package authenticated the client.|
|
||||||
@ -248,31 +266,30 @@ The SECURITY\_NT\_AUTHORITY (S-1-5) predefined identifier authority produces SID
|
|||||||
|
|
||||||
The following RIDs are relative to each domain.
|
The following RIDs are relative to each domain.
|
||||||
|
|
||||||
| RID | Identifies |
|
| RID |Decimal value| Identifies |
|
||||||
| - | - |
|
| - | - | - |
|
||||||
| DOMAIN_USER_RID_ADMIN | The administrative user account in a domain. |
|
| DOMAIN_USER_RID_ADMIN | 500 | The administrative user account in a domain. |
|
||||||
| DOMAIN_USER_RID_GUEST| The guest-user account in a domain. Users who do not have an account can automatically sign in to this account.|
|
| DOMAIN_USER_RID_GUEST| 501 | The guest-user account in a domain. Users who do not have an account can automatically sign in to this account.|
|
||||||
| DOMAIN_GROUP_RID_USERS | A group that contains all user accounts in a domain. All users are automatically added to this group.|
|
| DOMAIN_GROUP_RID_USERS | 513 | A group that contains all user accounts in a domain. All users are automatically added to this group.|
|
||||||
| DOMAIN_GROUP_RID_GUESTS | The group Guest account in a domain.|
|
| DOMAIN_GROUP_RID_GUESTS | 514 | The group Guest account in a domain.|
|
||||||
| DOMAIN_GROUP_RID_COMPUTERS | The Domain Computer group. All computers in the domain are members of this group.|
|
| DOMAIN_GROUP_RID_COMPUTERS | 515 | The Domain Computer group. All computers in the domain are members of this group.|
|
||||||
| DOMAIN_GROUP_RID_CONTROLLERS | The Domain Controller group. All domain controllers in the domain are members of this group.|
|
| DOMAIN_GROUP_RID_CONTROLLERS | 516 | The Domain Controller group. All domain controllers in the domain are members of this group.|
|
||||||
| DOMAIN_GROUP_RID_CERT_ADMINS | The certificate publishers' group. Computers running Active Directory Certificate Services are members of this group.|
|
| DOMAIN_GROUP_RID_CERT_ADMINS | 517 | The certificate publishers' group. Computers running Active Directory Certificate Services are members of this group.|
|
||||||
| DOMAIN_GROUP_RID_SCHEMA_ADMINS | The schema administrators' group. Members of this group can modify the Active Directory schema.|
|
| DOMAIN_GROUP_RID_SCHEMA_ADMINS | 518 | The schema administrators' group. Members of this group can modify the Active Directory schema.|
|
||||||
| DOMAIN_GROUP_RID_ENTERPRISE_ADMINS | The enterprise administrators' group. Members of this group have full access to all domains in the Active Directory forest. Enterprise administrators are responsible for forest-level operations such as adding or removing new domains.|
|
| DOMAIN_GROUP_RID_ENTERPRISE_ADMINS | 519 | The enterprise administrators' group. Members of this group have full access to all domains in the Active Directory forest. Enterprise administrators are responsible for forest-level operations such as adding or removing new domains.|
|
||||||
| DOMAIN_GROUP_RID_POLICY_ADMINS| The policy administrators' group.|
|
| DOMAIN_GROUP_RID_POLICY_ADMINS| 520 | The policy administrators' group.|
|
||||||
|
|
||||||
The following table provides examples of domain-relative RIDs that are used to form well-known SIDs for local groups.
|
The following table provides examples of domain-relative RIDs that are used to form well-known SIDs for local groups.
|
||||||
|
|
||||||
|
| RID | Decimal value | Identifies |
|
||||||
| RID | Identifies |
|
| - | - | - |
|
||||||
| - | - |
|
| DOMAIN_ALIAS_RID_ADMINS | 544 | Administrators of the domain.|
|
||||||
| DOMAIN_ALIAS_RID_ADMINS | Administrators of the domain.|
|
| DOMAIN_ALIAS_RID_USERS | 545 | All users in the domain.|
|
||||||
| DOMAIN_ALIAS_RID_USERS | All users in the domain.|
|
| DOMAIN_ALIAS_RID_GUESTS | 546 | Guests of the domain.|
|
||||||
| DOMAIN_ALIAS_RID_GUESTS | Guests of the domain.|
|
| DOMAIN_ALIAS_RID_POWER_USERS | 547 | A user or a set of users who expect to treat a system as if it were their personal computer rather than as a workstation for multiple users.|
|
||||||
| DOMAIN_ALIAS_RID_POWER_USERS | A user or a set of users who expect to treat a system as if it were their personal computer rather than as a workstation for multiple users.|
|
| DOMAIN_ALIAS_RID_BACKUP_OPS | 551 | A local group that is used to control the assignment of file backup-and-restore user rights.|
|
||||||
| DOMAIN_ALIAS_RID_BACKUP_OPS | A local group that is used to control the assignment of file backup-and-restore user rights.|
|
| DOMAIN_ALIAS_RID_REPLICATOR | 552 | A local group that is responsible for copying security databases from the primary domain controller to the backup domain controllers. These accounts are used only by the system.|
|
||||||
| DOMAIN_ALIAS_RID_REPLICATOR | A local group that is responsible for copying security databases from the primary domain controller to the backup domain controllers. These accounts are used only by the system.|
|
| DOMAIN_ALIAS_RID_RAS_SERVERS | 553 | A local group that represents remote access and servers running Internet Authentication Service (IAS). This group permits access to various attributes of User objects.|
|
||||||
| DOMAIN_ALIAS_RID_RAS_SERVERS | A local group that represents remote access and servers running Internet Authentication Service (IAS). This group permits access to various attributes of User objects.|
|
|
||||||
|
|
||||||
## Changes in security identifier's functionality
|
## Changes in security identifier's functionality
|
||||||
|
|
||||||
@ -290,6 +307,7 @@ Capability Security Identifiers (SIDs) are used to uniquely and immutably identi
|
|||||||
All Capability SIDs that the operating system is aware of are stored in the Windows Registry in the path `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities'. Any Capability SID added to Windows by first or third-party applications will be added to this location.
|
All Capability SIDs that the operating system is aware of are stored in the Windows Registry in the path `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities'. Any Capability SID added to Windows by first or third-party applications will be added to this location.
|
||||||
|
|
||||||
## Examples of registry keys taken from Windows 10, version 1909, 64-bit Enterprise edition
|
## Examples of registry keys taken from Windows 10, version 1909, 64-bit Enterprise edition
|
||||||
|
|
||||||
You may see the following registry keys under AllCachedCapabilities:
|
You may see the following registry keys under AllCachedCapabilities:
|
||||||
|
|
||||||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_DevUnlock
|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SecurityManager\CapabilityClasses\AllCachedCapabilities\capabilityClass_DevUnlock
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Change history for access protection (Windows 10)
|
title: Change history for access protection (Windows 10)
|
||||||
description: This topic lists new and updated topics in the Windows 10 access protection documentation for Windows 10 and Windows 10 Mobile.
|
description: This topic lists new and updated topics in the Windows 10 access protection documentation for Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Configure S/MIME for Windows 10 and Windows 10 Mobile (Windows 10)
|
title: Configure S/MIME for Windows 10
|
||||||
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
|
description: S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients with a digital ID, aka a certificate, can read them.
|
||||||
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
ms.assetid: 7F9C2A99-42EB-4BCC-BB53-41C04FBBBF05
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
@ -19,11 +19,10 @@ ms.date: 07/27/2017
|
|||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
# Configure S/MIME for Windows 10 and Windows 10 Mobile
|
# Configure S/MIME for Windows 10
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
S/MIME stands for Secure/Multipurpose Internet Mail Extensions, and provides an added layer of security for email sent to and from an Exchange ActiveSync (EAS) account. In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with.
|
S/MIME stands for Secure/Multipurpose Internet Mail Extensions, and provides an added layer of security for email sent to and from an Exchange ActiveSync (EAS) account. In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with.
|
||||||
|
|
||||||
@ -44,7 +43,6 @@ A digitally signed message reassures the recipient that the message hasn't been
|
|||||||
|
|
||||||
- [How to Create PFX Certificate Profiles in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/mt131410(v=technet.10))
|
- [How to Create PFX Certificate Profiles in Configuration Manager](/previous-versions/system-center/system-center-2012-R2/mt131410(v=technet.10))
|
||||||
- [Enable access to company resources using certificate profiles with Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=718216)
|
- [Enable access to company resources using certificate profiles with Microsoft Intune](https://go.microsoft.com/fwlink/p/?LinkId=718216)
|
||||||
- [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md)
|
|
||||||
|
|
||||||
## Choose S/MIME settings
|
## Choose S/MIME settings
|
||||||
|
|
||||||
|
@ -105,7 +105,7 @@ Three approaches are documented here:
|
|||||||
|
|
||||||
1. Update the certificate template by executing the following command:
|
1. Update the certificate template by executing the following command:
|
||||||
|
|
||||||
certutil - dsaddtemplate \<TemplateName\>.txt
|
certutil -dsaddtemplate \<TemplateName\>.txt
|
||||||
|
|
||||||
1. In the Certificate Authority console, right-click **Certificate Templates**, select **New**, and select **Certificate Template to Issue**
|
1. In the Certificate Authority console, right-click **Certificate Templates**, select **New**, and select **Certificate Template to Issue**
|
||||||
|
|
||||||
|
@ -23,8 +23,7 @@ Learn more about identity and access management technologies in Windows 10 and
|
|||||||
|-|-|
|
|-|-|
|
||||||
| [Technical support policy for lost or forgotten passwords](password-support-policy.md)| Outlines the ways in which Microsoft can help you reset a lost or forgotten password, and provides links to instructions for doing so. |
|
| [Technical support policy for lost or forgotten passwords](password-support-policy.md)| Outlines the ways in which Microsoft can help you reset a lost or forgotten password, and provides links to instructions for doing so. |
|
||||||
| [Access control](access-control/access-control.md) | Describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. |
|
| [Access control](access-control/access-control.md) | Describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. |
|
||||||
| [Configure S/MIME for Windows 10 and Windows 10 Mobile](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. |
|
| [Configure S/MIME for Windows 10](configure-s-mime.md) | In Windows 10, S/MIME lets users encrypt outgoing messages and attachments so that only intended recipients who have a digital identification (ID), also known as a certificate, can read them. Users can digitally sign a message, which provides the recipients with a way to verify the identity of the sender and that the message hasn't been tampered with. |
|
||||||
| [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md) | Digital certificates bind the identity of a user or computer to a pair of keys that can be used to encrypt and sign digital information. Certificates are issued by a certification authority (CA) that vouches for the identity of the certificate holder, and they enable secure client communications with websites and services. |
|
|
||||||
| [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md) | Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard helps prevent these attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets. |
|
| [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md) | Introduced in Windows 10 Enterprise, Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. Unauthorized access to these secrets can lead to credential theft attacks, such as Pass-the-Hash or Pass-The-Ticket. Credential Guard helps prevent these attacks by protecting NTLM password hashes and Kerberos Ticket Granting Tickets. |
|
||||||
| [Protect Remote Desktop credentials with Remote Credential Guard](remote-credential-guard.md) | Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting the Kerberos requests back to the device that's requesting the connection. |
|
| [Protect Remote Desktop credentials with Remote Credential Guard](remote-credential-guard.md) | Remote Credential Guard helps you protect your credentials over a Remote Desktop connection by redirecting the Kerberos requests back to the device that's requesting the connection. |
|
||||||
| [User Account Control](user-account-control/user-account-control-overview.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.|
|
| [User Account Control](user-account-control/user-account-control-overview.md)| Provides information about User Account Control (UAC), which helps prevent malware from damaging a PC and helps organizations deploy a better-managed desktop. UAC can help block the automatic installation of unauthorized apps and prevent inadvertent changes to system settings.|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: How to use single sign on (SSO) over VPN and Wi-Fi connections (Windows 10)
|
title: How to use Single Sign-On (SSO) over VPN and Wi-Fi connections (Windows 10)
|
||||||
description: Explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections.
|
description: Explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -12,31 +12,30 @@ manager: dansimp
|
|||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# How to use single sign on (SSO) over VPN and Wi-Fi connections
|
# How to use Single Sign-On (SSO) over VPN and Wi-Fi connections
|
||||||
|
|
||||||
This topic explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections. The scenario is:
|
This article explains requirements to enable Single Sign-On (SSO) to on-premises domain resources over WiFi or VPN connections. The following scenarios are typically used:
|
||||||
|
|
||||||
- You connect to a network using Wi-Fi or VPN.
|
- Connecting to a network using Wi-Fi or VPN.
|
||||||
- You want to use the credentials that you use for the WiFi or VPN authentication to also authenticate requests to access a domain resource you are connecting to, without being prompted for your domain credentials separately.
|
- Use credentials for WiFi or VPN authentication to also authenticate requests to access a domain resource without being prompted for your domain credentials.
|
||||||
|
|
||||||
For example, you want to connect to a corporate network and access an internal website that requires Windows integrated authentication.
|
For example, you want to connect to a corporate network and access an internal website that requires Windows integrated authentication.
|
||||||
|
|
||||||
At a high level, the way this works is that the credentials that are used for the connection authentication are put in Credential Manager as the default credentials for the logon session.
|
The credentials that are used for the connection authentication are placed in Credential Manager as the default credentials for the logon session. Credential Manager stores credentials that can be used for specific domain resources. These are based on the target name of the resource:
|
||||||
Credential Manager is a place where credentials in the OS are can be stored for specific domain resources based on the targetname of the resource.
|
- For VPN, the VPN stack saves its credential as the session default.
|
||||||
For VPN, the VPN stack saves its credential as the session default.
|
- For WiFi, Extensible Authentication Protocol (EAP) provides support.
|
||||||
For WiFi, EAP does it.
|
|
||||||
|
|
||||||
The credentials are put in Credential Manager as a "\*Session" credential.
|
The credentials are placed in Credential Manager as a "\*Session" credential.
|
||||||
A "\*Session" credential implies that it is valid for the current user session.
|
A "\*Session" credential implies that it is valid for the current user session.
|
||||||
The credentials are also cleaned up when the WiFi or VPN connection is disconnected.
|
The credentials are also cleaned up when the WiFi or VPN connection is disconnected.
|
||||||
|
|
||||||
When the user tries to access a domain resource, using Edge for example, Edge has the right Enterprise Authentication capability so [WinInet](/windows/win32/wininet/wininet-reference) can release the credentials that it gets from the Credential Manager to the SSP that is requesting it.
|
For example, if someone using Microsoft Edge tries to access a domain resource, Microsoft Edge has the right Enterprise Authentication capability. This allows [WinInet](/windows/win32/wininet/wininet-reference) to release the credentials that it gets from the Credential Manager to the SSP that is requesting it.
|
||||||
For more information about the Enterprise Authentication capability, see [App capability declarations](/windows/uwp/packaging/app-capability-declarations).
|
For more information about the Enterprise Authentication capability, see [App capability declarations](/windows/uwp/packaging/app-capability-declarations).
|
||||||
|
|
||||||
The local security authority will look at the device application, such as a Universal Windows Platform (UWP) application, to see if it has the right capability.
|
The local security authority will look at the device application to determine if it has the right capability. This includes items such as a Universal Windows Platform (UWP) application.
|
||||||
If the app is not UWP, it does not matter.
|
If the app isn't a UWP, it doesn't matter.
|
||||||
But if it is a UWP app, it will look at the device capability for Enterprise Authentication.
|
But if the application is a UWP app, it will evaluate at the device capability for Enterprise Authentication.
|
||||||
If it does have that capability and if the resource that you are trying to access is in the Intranet zone in the Internet Options (ZoneMap), then the credential will be released.
|
If it does have that capability and if the resource that you're trying to access is in the Intranet zone in the Internet Options (ZoneMap), then the credential will be released.
|
||||||
This behavior helps prevent credentials from being misused by untrusted third parties.
|
This behavior helps prevent credentials from being misused by untrusted third parties.
|
||||||
|
|
||||||
## Intranet zone
|
## Intranet zone
|
||||||
@ -54,7 +53,7 @@ For multi-label names, such as http://finance.net, the ZoneMap needs to be updat
|
|||||||
|
|
||||||
OMA URI example:
|
OMA URI example:
|
||||||
|
|
||||||
./Vendor/MSFT/Registry/HKU/S-1-5-21-2702878673-795188819-444038987-2781/Software/Microsoft/Windows/CurrentVersion/Internet%20Settings/ZoneMap/Domains/`<domain name>`/* as an Integer Value of 1 for each of the domains that you want to SSO into from your device. This adds the specified domains to the Intranet Zone of the Edge browser.
|
./Vendor/MSFT/Registry/HKU/S-1-5-21-2702878673-795188819-444038987-2781/Software/Microsoft/Windows/CurrentVersion/Internet%20Settings/ZoneMap/Domains/`<domain name>`/* as an Integer Value of 1 for each of the domains that you want to SSO into from your device. This adds the specified domains to the Intranet Zone of the Microsoft Edge browser.
|
||||||
|
|
||||||
## Credential requirements
|
## Credential requirements
|
||||||
|
|
||||||
@ -62,8 +61,8 @@ For VPN, the following types of credentials will be added to credential manager
|
|||||||
|
|
||||||
- Username and password
|
- Username and password
|
||||||
- Certificate-based authentication:
|
- Certificate-based authentication:
|
||||||
- TPM KSP Certificate
|
- TPM Key Storage Provider (KSP) Certificate
|
||||||
- Software KSP Certificates
|
- Software Key Storage Provider (KSP) Certificates
|
||||||
- Smart Card Certificate
|
- Smart Card Certificate
|
||||||
- Windows Hello for Business Certificate
|
- Windows Hello for Business Certificate
|
||||||
|
|
||||||
@ -75,10 +74,10 @@ If the credentials are certificate-based, then the elements in the following tab
|
|||||||
|
|
||||||
| Template element | Configuration |
|
| Template element | Configuration |
|
||||||
|------------------|---------------|
|
|------------------|---------------|
|
||||||
| SubjectName | The user’s distinguished name (DN) where the domain components of the distinguished name reflects the internal DNS namespace when the SubjectAlternativeName does not have the fully qualified UPN required to find the domain controller. </br>This requirement is particularly relevant in multi-forest environments as it ensures a domain controller can be located. |
|
| SubjectName | The user’s distinguished name (DN) where the domain components of the distinguished name reflect the internal DNS namespace when the SubjectAlternativeName does not have the fully qualified UPN required to find the domain controller. </br>This requirement is relevant in multi-forest environments as it ensures a domain controller can be located. |
|
||||||
| SubjectAlternativeName | The user’s fully qualified UPN where a domain name component of the user’s UPN matches the organizations internal domain’s DNS namespace.</br>This requirement is particularly relevant in multi-forest environments as it ensures a domain controller can be located when the SubjectName does not have the DN required to find the domain controller. |
|
| SubjectAlternativeName | The user’s fully qualified UPN where a domain name component of the user’s UPN matches the organizations internal domain’s DNS namespace. </br>This requirement is relevant in multi-forest environments as it ensures a domain controller can be located when the SubjectName does not have the DN required to find the domain controller. |
|
||||||
| Key Storage Provider (KSP) | If the device is joined to Azure AD, a discrete SSO certificate is used. |
|
| Key Storage Provider (KSP) | If the device is joined to Azure AD, a discrete SSO certificate is used. |
|
||||||
| EnhancedKeyUsage | One or more of the following EKUs is required: </br>- Client Authentication (for the VPN) </br>- EAP Filtering OID (for Windows Hello for Business)</br>- SmartCardLogon (for Azure AD joined devices)</br>If the domain controllers require smart card EKU either:</br>- SmartCardLogon</br>- id-pkinit-KPClientAuth (1.3.6.1.5.2.3.4)</br>Otherwise:</br>- TLS/SSL Client Authentication (1.3.6.1.5.5.7.3.2) |
|
| EnhancedKeyUsage | One or more of the following EKUs is required: </br>- Client Authentication (for the VPN) </br>- EAP Filtering OID (for Windows Hello for Business)</br>- SmartCardLogon (for Azure AD joined devices) </br>If the domain controllers require smart card EKU either:</br>- SmartCardLogon</br>- id-pkinit-KPClientAuth (1.3.6.1.5.2.3.4) <br>Otherwise:</br>- TLS/SSL Client Authentication (1.3.6.1.5.5.7.3.2) |
|
||||||
|
|
||||||
## NDES server configuration
|
## NDES server configuration
|
||||||
|
|
||||||
@ -89,9 +88,9 @@ For more information, see [Configure certificate infrastructure for SCEP](/mem/i
|
|||||||
|
|
||||||
You need IP connectivity to a DNS server and domain controller over the network interface so that authentication can succeed as well.
|
You need IP connectivity to a DNS server and domain controller over the network interface so that authentication can succeed as well.
|
||||||
|
|
||||||
The domain controllers will need to have appropriate KDC certificates for the client to trust them as domain controllers, and since phones are not domain-joined, the root CA of the KDC’s certificate must be in the Third-Party Root CA or Smart Card Trusted Roots store.
|
Domain controllers must have appropriate KDC certificates for the client to trust them as domain controllers. Because phones are not domain-joined, the root CA of the KDC’s certificate must be in the Third-Party Root CA or Smart Card Trusted Roots store.
|
||||||
|
|
||||||
The domain controllers must be using certificates based on the updated KDC certificate template Kerberos Authentication.
|
Domain controllers must be using certificates based on the updated KDC certificate template Kerberos Authentication.
|
||||||
This is because Windows 10 Mobile requires strict KDC validation to be enabled.
|
|
||||||
This requires that all authenticating domain controllers run Windows Server 2016, or you'll need to enable strict KDC validation on domain controllers that run previous versions of Windows Server.
|
This requires that all authenticating domain controllers run Windows Server 2016, or you'll need to enable strict KDC validation on domain controllers that run previous versions of Windows Server.
|
||||||
|
|
||||||
For more information, see [Enabling Strict KDC Validation in Windows Kerberos](https://www.microsoft.com/download/details.aspx?id=6382).
|
For more information, see [Enabling Strict KDC Validation in Windows Kerberos](https://www.microsoft.com/download/details.aspx?id=6382).
|
@ -18,7 +18,6 @@ ms.author: dansimp
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
This guide will walk you through the decisions you will make for Windows 10 clients in your enterprise VPN solution and how to configure your deployment. This guide references the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp) and provides mobile device management (MDM) configuration instructions using Microsoft Intune and the VPN Profile template for Windows 10.
|
This guide will walk you through the decisions you will make for Windows 10 clients in your enterprise VPN solution and how to configure your deployment. This guide references the [VPNv2 Configuration Service Provider (CSP)](/windows/client-management/mdm/vpnv2-csp) and provides mobile device management (MDM) configuration instructions using Microsoft Intune and the VPN Profile template for Windows 10.
|
||||||
|
|
||||||
|
@ -17,6 +17,7 @@ ms.date: 04/02/2019
|
|||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
- Windows Server 2022
|
||||||
- Windows Server 2019
|
- Windows Server 2019
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
@ -81,7 +82,7 @@ Configuration of Encrypted Hard Drives as startup drives is done using the same
|
|||||||
|
|
||||||
## Configuring hardware-based encryption with Group Policy
|
## Configuring hardware-based encryption with Group Policy
|
||||||
|
|
||||||
There are three related Group Policy settings that help you manage how BitLocker uses hardware-based envryption and which encryption algorithms to use. If these settings are not configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:
|
There are three related Group Policy settings that help you manage how BitLocker uses hardware-based encryption and which encryption algorithms to use. If these settings are not configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:
|
||||||
|
|
||||||
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#bkmk-hdefxd)
|
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#bkmk-hdefxd)
|
||||||
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-removable-data-drives)
|
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-removable-data-drives)
|
||||||
|
@ -7,7 +7,7 @@ ms.prod: w10
|
|||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: high
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -156,9 +156,6 @@ Here are a few examples of responses from the Reporting CSP.
|
|||||||
## Collect WIP audit logs by using Windows Event Forwarding (for Windows desktop domain-joined devices only)
|
## Collect WIP audit logs by using Windows Event Forwarding (for Windows desktop domain-joined devices only)
|
||||||
Use Windows Event Forwarding to collect and aggregate your WIP audit events. You can view your audit events in the Event Viewer.
|
Use Windows Event Forwarding to collect and aggregate your WIP audit events. You can view your audit events in the Event Viewer.
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Windows 10 Mobile requires you to use the [Reporting CSP process](#collect-wip-audit-logs-by-using-the-reporting-configuration-service-provider-csp) instead.
|
|
||||||
|
|
||||||
**To view the WIP events in the Event Viewer**
|
**To view the WIP events in the Event Viewer**
|
||||||
1. Open Event Viewer.
|
1. Open Event Viewer.
|
||||||
|
|
||||||
|
@ -25,8 +25,6 @@ ms.reviewer:
|
|||||||
|
|
||||||
If you don't already have an EFS DRA certificate, you'll need to create and extract one from your system before you can use Windows Information Protection (WIP), formerly known as enterprise data protection (EDP), in your organization. For the purposes of this section, we'll use the file name EFSDRA; however, this name can be replaced with anything that makes sense to you.
|
If you don't already have an EFS DRA certificate, you'll need to create and extract one from your system before you can use Windows Information Protection (WIP), formerly known as enterprise data protection (EDP), in your organization. For the purposes of this section, we'll use the file name EFSDRA; however, this name can be replaced with anything that makes sense to you.
|
||||||
|
|
||||||
The recovery process included in this topic only works for desktop devices. WIP deletes the data on Windows 10 Mobile devices.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>If you already have an EFS DRA certificate for your organization, you can skip creating a new one. Just use your current EFS DRA certificate in your policy. For more info about when to use a PKI and the general strategy you should use to deploy DRA certificates, see the [Security Watch Deploying EFS: Part 1](/previous-versions/technet-magazine/cc162507(v=msdn.10)) article on TechNet. For more general info about EFS protection, see [Protecting Data by Using EFS to Encrypt Hard Drives](/previous-versions/tn-archive/cc875821(v=technet.10)).<br><br>If your DRA certificate has expired, you won't be able to encrypt your files with it. To fix this, you'll need to create a new certificate, using the steps in this topic, and then deploy it through policy.
|
>If you already have an EFS DRA certificate for your organization, you can skip creating a new one. Just use your current EFS DRA certificate in your policy. For more info about when to use a PKI and the general strategy you should use to deploy DRA certificates, see the [Security Watch Deploying EFS: Part 1](/previous-versions/technet-magazine/cc162507(v=msdn.10)) article on TechNet. For more general info about EFS protection, see [Protecting Data by Using EFS to Encrypt Hard Drives](/previous-versions/tn-archive/cc875821(v=technet.10)).<br><br>If your DRA certificate has expired, you won't be able to encrypt your files with it. To fix this, you'll need to create a new certificate, using the steps in this topic, and then deploy it through policy.
|
||||||
|
|
||||||
|
@ -22,7 +22,6 @@ ms.date: 01/09/2020
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
- Microsoft Endpoint Configuration Manager
|
- Microsoft Endpoint Configuration Manager
|
||||||
|
|
||||||
Configuration Manager helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection mode, and how to find enterprise data on the network.
|
Configuration Manager helps you create and deploy your Windows Information Protection (WIP) policy, including letting you choose your protected apps, your WIP-protection mode, and how to find enterprise data on the network.
|
||||||
@ -96,7 +95,7 @@ For this example, we're going to add Microsoft OneNote, a store app, to the **Ap
|
|||||||
|
|
||||||
5. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.Office.OneNote`.
|
5. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the **Product name** is `Microsoft.Office.OneNote`.
|
||||||
|
|
||||||
If you don't know the publisher or product name, you can find them for both desktop devices and Windows 10 Mobile phones by following these steps.
|
If you don't know the publisher or product name, you can find them for both desktop devices by following these steps.
|
||||||
|
|
||||||
**To find the Publisher and Product Name values for Store apps without installing them**
|
**To find the Publisher and Product Name values for Store apps without installing them**
|
||||||
|
|
||||||
@ -129,35 +128,6 @@ If you don't know the publisher or product name, you can find them for both desk
|
|||||||
> }
|
> }
|
||||||
> ```
|
> ```
|
||||||
|
|
||||||
**To find the Publisher and Product Name values for apps installed on Windows 10 mobile phones**
|
|
||||||
1. If you need to add mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Your PC and phone must be on the same wireless network.
|
|
||||||
|
|
||||||
2. On the Windows Phone, go to **Settings**, choose **Update & security**, and then choose **For developers**.
|
|
||||||
|
|
||||||
3. On the **For developers** screen, turn on **Developer mode**, turn on **Device Discovery**, and then turn on **Device Portal**.
|
|
||||||
|
|
||||||
4. Copy the URL in the **Device Portal** area into your device's browser, and then accept the SSL certificate.
|
|
||||||
|
|
||||||
5. In the **Device discovery** area, press **Pair**, and then enter the PIN into the website from the previous step.
|
|
||||||
|
|
||||||
6. On the **Apps** tab of the website, you can see details for the running apps, including the publisher and product names.
|
|
||||||
|
|
||||||
7. Start the app for which you're looking for the publisher and product name values.
|
|
||||||
|
|
||||||
8. Copy the `publisherCertificateName` value and paste it into the **Publisher Name** box and the `packageIdentityName` value into the **Product Name** box of Intune.
|
|
||||||
|
|
||||||
> [!IMPORTANT]
|
|
||||||
> The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that's using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as "CN=" followed by the `windowsPhoneLegacyId`.
|
|
||||||
> For example:<p>
|
|
||||||
> ```json
|
|
||||||
> {
|
|
||||||
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
|
||||||
> }
|
|
||||||
> ```
|
|
||||||
|
|
||||||
### Add a desktop app rule to your policy
|
### Add a desktop app rule to your policy
|
||||||
For this example, we're going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
For this example, we're going to add Internet Explorer, a desktop app, to the **App Rules** list.
|
||||||
|
|
||||||
@ -247,19 +217,19 @@ For this example, we're going to add an AppLocker XML file to the **App Rules**
|
|||||||
|
|
||||||
4. On the **Before You Begin** page, click **Next**.
|
4. On the **Before You Begin** page, click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we're using Microsoft Photos.
|
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we're using Microsoft Photos.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
8. On the updated **Publisher** page, click **Create**.
|
8. On the updated **Publisher** page, click **Create**.
|
||||||
|
|
||||||
@ -466,12 +436,6 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
**To set your optional settings**
|
**To set your optional settings**
|
||||||
1. Choose to set any or all of the optional settings:
|
1. Choose to set any or all of the optional settings:
|
||||||
|
|
||||||
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
|
||||||
|
|
||||||
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
|
||||||
|
|
||||||
- **No, or not configured.** Doesn't enable this feature.
|
|
||||||
|
|
||||||
- **Allow Windows Search to search encrypted corporate data and Store apps.** Determines whether Windows Search can search and index encrypted corporate data and Store apps. The options are:
|
- **Allow Windows Search to search encrypted corporate data and Store apps.** Determines whether Windows Search can search and index encrypted corporate data and Store apps. The options are:
|
||||||
|
|
||||||
- **Yes.** Allows Windows Search to search and index encrypted corporate data and Store apps.
|
- **Yes.** Allows Windows Search to search and index encrypted corporate data and Store apps.
|
||||||
|
@ -124,10 +124,6 @@ If you don't know the Store app publisher or product name, you can find them by
|
|||||||
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
>The JSON file might also return a `windowsPhoneLegacyId` value for both the **Publisher Name** and **Product Name** boxes. This means that you have an app that’s using a XAP package and that you must set the **Product Name** as `windowsPhoneLegacyId`, and set the **Publisher Name** as `CN=` followed by the `windowsPhoneLegacyId`.<br><br>For example:<br>
|
||||||
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
<code>{<br>"windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",<br>}</code>
|
||||||
|
|
||||||
<!-- Go Kamatsu says the following info about Windows Mobile can be removed after Windows Mobile EOL at end of 2019
|
|
||||||
-->
|
|
||||||
|
|
||||||
If you need to add Windows 10 mobile apps that aren't distributed through the Store for Business, you must use the **Windows Device Portal** feature.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Your PC and phone must be on the same wireless network.
|
> Your PC and phone must be on the same wireless network.
|
||||||
@ -570,12 +566,6 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
**Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile.** Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
|
||||||
|
|
||||||
- **On.** Turns on the feature and provides the additional protection.
|
|
||||||
|
|
||||||
- **Off, or not configured.** Doesn't enable this feature.
|
|
||||||
|
|
||||||
**Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
**Revoke encryption keys on unenroll.** Determines whether to revoke a user’s local encryption keys from a device when it’s unenrolled from Windows Information Protection. If the encryption keys are revoked, a user no longer has access to encrypted corporate data. The options are:
|
||||||
|
|
||||||
- **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment.
|
- **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment.
|
||||||
|
@ -21,7 +21,6 @@ ms.localizationpriority: medium
|
|||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
- Windows 10, version 1607 and later
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
|
|
||||||
This table provides info about the most common problems you might encounter while running WIP in your organization.
|
This table provides info about the most common problems you might encounter while running WIP in your organization.
|
||||||
|
|
||||||
|
@ -22,7 +22,6 @@ ms.date: 03/05/2019
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10, version 1607 and later
|
- Windows 10, version 1607 and later
|
||||||
- Windows 10 Mobile, version 1607 and later
|
|
||||||
|
|
||||||
We've come up with a list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
We've come up with a list of suggested testing scenarios that you can use to test Windows Information Protection (WIP) in your company.
|
||||||
|
|
||||||
@ -164,14 +163,7 @@ You can try any of the processes included in these scenarios, but you should foc
|
|||||||
</ul>
|
</ul>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>Verify that app content is protected when a Windows 10 Mobile phone is locked.</td>
|
|
||||||
<td>
|
|
||||||
<ul>
|
|
||||||
<li>Check that protected app data doesn't appear on the Lock screen of a Windows 10 Mobile phone.</li>
|
|
||||||
</ul>
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
|
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
@ -1408,5 +1408,3 @@
|
|||||||
href: windows-security-configuration-framework/security-compliance-toolkit-10.md
|
href: windows-security-configuration-framework/security-compliance-toolkit-10.md
|
||||||
- name: Get support
|
- name: Get support
|
||||||
href: windows-security-configuration-framework/get-support-for-security-baselines.md
|
href: windows-security-configuration-framework/get-support-for-security-baselines.md
|
||||||
- name: Windows 10 Mobile security guide
|
|
||||||
href: windows-10-mobile-security-guide.md
|
|
||||||
|
@ -282,6 +282,7 @@ The most common values:
|
|||||||
| 2 | PA-ENC-TIMESTAMP | This is a normal type for standard password authentication. |
|
| 2 | PA-ENC-TIMESTAMP | This is a normal type for standard password authentication. |
|
||||||
| 11 | PA-ETYPE-INFO | The ETYPE-INFO pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.<br>Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
|
| 11 | PA-ETYPE-INFO | The ETYPE-INFO pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.<br>Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
|
||||||
| 15 | PA-PK-AS-REP\_OLD | Used for Smart Card logon authentication. |
|
| 15 | PA-PK-AS-REP\_OLD | Used for Smart Card logon authentication. |
|
||||||
|
| 16 | PA-PK-AS-REQ | Request sent to KDC in Smart Card authentication scenarios. |
|
||||||
| 17 | PA-PK-AS-REP | This type should also be used for Smart Card authentication, but in certain Active Directory environments, it is never seen. |
|
| 17 | PA-PK-AS-REP | This type should also be used for Smart Card authentication, but in certain Active Directory environments, it is never seen. |
|
||||||
| 19 | PA-ETYPE-INFO2 | The ETYPE-INFO2 pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.<br>Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
|
| 19 | PA-ETYPE-INFO2 | The ETYPE-INFO2 pre-authentication type is sent by the KDC in a KRB-ERROR indicating a requirement for additional pre-authentication. It is usually used to notify a client of which key to use for the encryption of an encrypted timestamp for the purposes of sending a PA-ENC-TIMESTAMP pre-authentication value.<br>Never saw this Pre-Authentication Type in Microsoft Active Directory environment. |
|
||||||
| 20 | PA-SVR-REFERRAL-INFO | Used in KDC Referrals tickets. |
|
| 20 | PA-SVR-REFERRAL-INFO | Used in KDC Referrals tickets. |
|
||||||
|
@ -9,7 +9,7 @@ metadata:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.date: 06/16/2021
|
ms.date: 07/23/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
@ -48,33 +48,6 @@ sections:
|
|||||||
- It must be a FQDN. A simple IP address will not work.
|
- It must be a FQDN. A simple IP address will not work.
|
||||||
- Optionally, if possible, the IP addresses associated with the server hosting the above should be removed from the Enterprise IP Ranges in the Network Isolation policies used by Application Guard.
|
- Optionally, if possible, the IP addresses associated with the server hosting the above should be removed from the Enterprise IP Ranges in the Network Isolation policies used by Application Guard.
|
||||||
|
|
||||||
- question: |
|
|
||||||
Can employees download documents from the Application Guard Edge session onto host devices?
|
|
||||||
answer: |
|
|
||||||
In Windows 10 Enterprise edition, version 1803, users are able to download documents from the isolated Application Guard container to the host PC. This capability is managed by policy.
|
|
||||||
|
|
||||||
In Windows 10 Enterprise edition, version 1709, or Windows 10 Professional edition, version 1803, it is not possible to download files from the isolated Application Guard container to the host computer. However, employees can use the **Print as PDF** or **Print as XPS** options and save those files to the host device.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Can employees copy and paste between the host device and the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Depending on your organization's settings, employees can copy and paste images (.bmp) and text to and from the isolated container.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Why don't employees see their favorites in the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Depending on your organization’s settings, it might be that Favorites Sync is turned off. To manage the policy, see: [Microsoft Edge and Microsoft Defender Application Guard | Microsoft Docs](/deployedge/microsoft-edge-security-windows-defender-application-guard).
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Why aren’t employees able to see their extensions in the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Make sure to enable the extensions policy on your Application Guard configuration.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
I’m trying to watch playback video with HDR, why is the HDR option missing?
|
|
||||||
answer: |
|
|
||||||
In order for HDR video playback to work in the container, vGPU Hardware Acceleration needs to be enabled in Application Guard.
|
|
||||||
|
|
||||||
- question: |
|
- question: |
|
||||||
How do I configure Microsoft Defender Application Guard to work with my network proxy (IP-Literal Addresses)?
|
How do I configure Microsoft Defender Application Guard to work with my network proxy (IP-Literal Addresses)?
|
||||||
answer: |
|
answer: |
|
||||||
|
@ -18,7 +18,6 @@ ms.technology: mde
|
|||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
Microsoft Defender SmartScreen works with Intune, Group Policy, and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Microsoft Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely.
|
Microsoft Defender SmartScreen works with Intune, Group Policy, and mobile device management (MDM) settings to help you manage your organization's computer settings. Based on how you set up Microsoft Defender SmartScreen, you can show employees a warning page and let them continue to the site, or you can block the site entirely.
|
||||||
|
|
||||||
@ -77,7 +76,7 @@ SmartScreen uses registry-based Administrative Template policy settings.
|
|||||||
</table>
|
</table>
|
||||||
|
|
||||||
## MDM settings
|
## MDM settings
|
||||||
If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. <br><br>
|
If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support desktop computers running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune. <br><br>
|
||||||
For Microsoft Defender SmartScreen Edge MDM policies, see [Policy CSP - Browser](/windows/client-management/mdm/policy-csp-browser).
|
For Microsoft Defender SmartScreen Edge MDM policies, see [Policy CSP - Browser](/windows/client-management/mdm/policy-csp-browser).
|
||||||
<table>
|
<table>
|
||||||
<tr>
|
<tr>
|
||||||
|