mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 19:03:46 +00:00
Merge branches 'dansimp-w10-mobile-scrub' and 'dansimp-w10-mobile-scrub' of https://github.com/MicrosoftDocs/windows-docs-pr into dansimp-w10-mobile-scrub
This commit is contained in:
@ -17,6 +17,7 @@ ms.date: 04/02/2019
|
|||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
- Windows Server 2022
|
||||||
- Windows Server 2019
|
- Windows Server 2019
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
@ -81,7 +82,7 @@ Configuration of Encrypted Hard Drives as startup drives is done using the same
|
|||||||
|
|
||||||
## Configuring hardware-based encryption with Group Policy
|
## Configuring hardware-based encryption with Group Policy
|
||||||
|
|
||||||
There are three related Group Policy settings that help you manage how BitLocker uses hardware-based envryption and which encryption algorithms to use. If these settings are not configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:
|
There are three related Group Policy settings that help you manage how BitLocker uses hardware-based encryption and which encryption algorithms to use. If these settings are not configured or disabled on systems that are equipped with encrypted drives, BitLocker uses software-based encryption:
|
||||||
|
|
||||||
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#bkmk-hdefxd)
|
- [Configure use of hardware-based encryption for fixed data drives](bitlocker/bitlocker-group-policy-settings.md#bkmk-hdefxd)
|
||||||
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-removable-data-drives)
|
- [Configure use of hardware-based encryption for removable data drives](bitlocker/bitlocker-group-policy-settings.md#configure-use-of-hardware-based-encryption-for-removable-data-drives)
|
||||||
|
@ -9,7 +9,7 @@ metadata:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.date: 06/16/2021
|
ms.date: 07/23/2021
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
@ -48,33 +48,6 @@ sections:
|
|||||||
- It must be a FQDN. A simple IP address will not work.
|
- It must be a FQDN. A simple IP address will not work.
|
||||||
- Optionally, if possible, the IP addresses associated with the server hosting the above should be removed from the Enterprise IP Ranges in the Network Isolation policies used by Application Guard.
|
- Optionally, if possible, the IP addresses associated with the server hosting the above should be removed from the Enterprise IP Ranges in the Network Isolation policies used by Application Guard.
|
||||||
|
|
||||||
- question: |
|
|
||||||
Can employees download documents from the Application Guard Edge session onto host devices?
|
|
||||||
answer: |
|
|
||||||
In Windows 10 Enterprise edition, version 1803, users are able to download documents from the isolated Application Guard container to the host PC. This capability is managed by policy.
|
|
||||||
|
|
||||||
In Windows 10 Enterprise edition, version 1709, or Windows 10 Professional edition, version 1803, it is not possible to download files from the isolated Application Guard container to the host computer. However, employees can use the **Print as PDF** or **Print as XPS** options and save those files to the host device.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Can employees copy and paste between the host device and the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Depending on your organization's settings, employees can copy and paste images (.bmp) and text to and from the isolated container.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Why don't employees see their favorites in the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Depending on your organization’s settings, it might be that Favorites Sync is turned off. To manage the policy, see: [Microsoft Edge and Microsoft Defender Application Guard | Microsoft Docs](/deployedge/microsoft-edge-security-windows-defender-application-guard).
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
Why aren’t employees able to see their extensions in the Application Guard Edge session?
|
|
||||||
answer: |
|
|
||||||
Make sure to enable the extensions policy on your Application Guard configuration.
|
|
||||||
|
|
||||||
- question: |
|
|
||||||
I’m trying to watch playback video with HDR, why is the HDR option missing?
|
|
||||||
answer: |
|
|
||||||
In order for HDR video playback to work in the container, vGPU Hardware Acceleration needs to be enabled in Application Guard.
|
|
||||||
|
|
||||||
- question: |
|
- question: |
|
||||||
How do I configure Microsoft Defender Application Guard to work with my network proxy (IP-Literal Addresses)?
|
How do I configure Microsoft Defender Application Guard to work with my network proxy (IP-Literal Addresses)?
|
||||||
answer: |
|
answer: |
|
||||||
|
Reference in New Issue
Block a user