mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 22:37:22 +00:00
Freshness review
This commit is contained in:
parent
762f3a79c7
commit
5a2a5fec62
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure Take a Test in kiosk mode
|
title: Configure Take a Test in kiosk mode
|
||||||
description: Learn how to configure Windows to execute the Take a Test app in kiosk mode, using Intune and provisioning packages.
|
description: Learn how to configure Windows to execute the Take a Test app in kiosk mode, using Intune and provisioning packages.
|
||||||
ms.date: 11/08/2023
|
ms.date: 09/06/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -26,7 +26,7 @@ The other options allow you to configure Take a Test in kiosk mode using a local
|
|||||||
|
|
||||||
Follow the instructions below to configure your devices, selecting the option that best suits your needs.
|
Follow the instructions below to configure your devices, selecting the option that best suits your needs.
|
||||||
|
|
||||||
# [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune)
|
# [:::image type="icon" source="images/icons/intune.svg"::: **Intune/CSP**](#tab/intune)
|
||||||
|
|
||||||
You can use Intune for Education or a custom profile in Microsoft Intune:
|
You can use Intune for Education or a custom profile in Microsoft Intune:
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Take a Test app technical reference
|
title: Take a Test app technical reference
|
||||||
description: List of policies and settings applied by the Take a Test app.
|
description: List of policies and settings applied by the Take a Test app.
|
||||||
ms.date: 11/02/2023
|
ms.date: 09/06/2024
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -15,7 +15,7 @@ Assessment vendors can use Take a Test as a platform to lock down the operating
|
|||||||
|
|
||||||
## PC lock-down for assessment
|
## PC lock-down for assessment
|
||||||
|
|
||||||
When the assessment page initiates lock-down, the student's desktop is locked and the app executes above the Windows lock screen. This provides a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test applies local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied.
|
When the assessment page initiates lock-down, the student's desktop is locked and the app executes above the Windows lock screen. This provides a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test applies local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied.
|
||||||
|
|
||||||
When running above the lock screen:
|
When running above the lock screen:
|
||||||
|
|
||||||
@ -64,7 +64,7 @@ When Take a Test is running, the following functionality is available to student
|
|||||||
- Assistive technology that might be running
|
- Assistive technology that might be running
|
||||||
- Lock screen (not available if student is using a dedicated test account)
|
- Lock screen (not available if student is using a dedicated test account)
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The app will exit if the student signs in to an account from the lock screen.
|
> The app will exit if the student signs in to an account from the lock screen.
|
||||||
> Progress made in the test may be lost or invalidated.
|
> Progress made in the test may be lost or invalidated.
|
||||||
- The student can exit the test by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd>
|
- The student can exit the test by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd>
|
||||||
|
@ -127,5 +127,4 @@ Depending on your configuration, you can have a user to automatically sign in to
|
|||||||
<!--links-->
|
<!--links-->
|
||||||
|
|
||||||
[MEM-1]: /mem/intune/configuration/custom-settings-windows-10
|
[MEM-1]: /mem/intune/configuration/custom-settings-windows-10
|
||||||
[MEM-2]: /mem/intune/fundamentals/licenses#device-only-licenses
|
|
||||||
[WIN-3]: /windows/client-management/mdm/assignedaccess-csp
|
[WIN-3]: /windows/client-management/mdm/assignedaccess-csp
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Configure a shared or guest Windows device
|
title: Configure a shared or guest Windows device
|
||||||
description: Description of how to configured Shared PC mode, which is a Windows feature that optimizes devices for shared use scenarios.
|
description: Description of how to configured Shared PC mode, which is a Windows feature that optimizes devices for shared use scenarios.
|
||||||
ms.date: 11/08/2023
|
ms.date: 09/06/2024
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -25,9 +25,7 @@ Shared PC can be configured using the following methods:
|
|||||||
|
|
||||||
Follow the instructions below to configure your devices, selecting the option that best suits your needs.
|
Follow the instructions below to configure your devices, selecting the option that best suits your needs.
|
||||||
|
|
||||||
#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune**](#tab/intune)
|
#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Shared PC`**:
|
To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Shared PC`**:
|
||||||
|
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
---
|
---
|
||||||
ms.date: 11/07/2023
|
ms.date: 09/06/2024
|
||||||
title: Access Control overview
|
title: Access Control overview
|
||||||
description: Learn about access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer.
|
description: Learn about access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer.
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
||||||
|
@ -1,9 +1,9 @@
|
|||||||
---
|
---
|
||||||
ms.date: 11/07/2023
|
ms.date: 09/06/2024
|
||||||
title: Local Accounts
|
title: Local Accounts
|
||||||
description: Learn how to secure and manage access to the resources on a standalone or member server for services or users.
|
description: Learn how to secure and manage access to the resources on a standalone or member server for services or users.
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
|
||||||
@ -37,7 +37,7 @@ The default Administrator account can't be deleted or locked out, but it can be
|
|||||||
|
|
||||||
Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group.
|
Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group.
|
||||||
|
|
||||||
Members of the Administrators groups can run apps with elevated permissions without using the *Run as Administrator* option. Fast User Switching is more secure than using `runas` or different-user elevation.
|
Members of the Administrators groups can run apps with elevated permissions without using the *Run as Administrator* option. Fast User Switching is more secure than using `runas` or different-user elevation.
|
||||||
|
|
||||||
#### Account group membership
|
#### Account group membership
|
||||||
|
|
||||||
@ -219,7 +219,7 @@ The following table shows the Group Policy and registry settings that are used t
|
|||||||
||Registry value data|0|
|
||Registry value data|0|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates.
|
> You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates.
|
||||||
|
|
||||||
#### To enforce local account restrictions for remote access
|
#### To enforce local account restrictions for remote access
|
||||||
|
|
||||||
|
@ -4,7 +4,7 @@ description: Learn about passkeys and how to use them on Windows devices.
|
|||||||
ms.collection:
|
ms.collection:
|
||||||
- tier1
|
- tier1
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 11/07/2023
|
ms.date: 09/06/2024
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
|
||||||
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Deploy Virtual Smart Cards
|
title: Deploy Virtual Smart Cards
|
||||||
description: Learn about what to consider when deploying a virtual smart card authentication solution
|
description: Learn about what to consider when deploying a virtual smart card authentication solution
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy Virtual Smart Cards
|
# Deploy Virtual Smart Cards
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Evaluate Virtual Smart Card Security
|
title: Evaluate Virtual Smart Card Security
|
||||||
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
|
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Evaluate Virtual Smart Card Security
|
# Evaluate Virtual Smart Card Security
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Get Started with Virtual Smart Cards - Walkthrough Guide
|
title: Get Started with Virtual Smart Cards - Walkthrough Guide
|
||||||
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
|
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
|
||||||
ms.topic: get-started
|
ms.topic: get-started
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Get Started with Virtual Smart Cards: Walkthrough Guide
|
# Get Started with Virtual Smart Cards: Walkthrough Guide
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Virtual Smart Card Overview
|
title: Virtual Smart Card Overview
|
||||||
description: Learn about virtual smart card technology for Windows.
|
description: Learn about virtual smart card technology for Windows.
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Virtual Smart Card Overview
|
# Virtual Smart Card Overview
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Tpmvscmgr
|
title: Tpmvscmgr
|
||||||
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
|
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
|
||||||
ms.topic: reference
|
ms.topic: reference
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Tpmvscmgr
|
# Tpmvscmgr
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Understanding and Evaluating Virtual Smart Cards
|
title: Understanding and Evaluating Virtual Smart Cards
|
||||||
description: Learn how smart card technology can fit into your authentication design.
|
description: Learn how smart card technology can fit into your authentication design.
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Understand and Evaluate Virtual Smart Cards
|
# Understand and Evaluate Virtual Smart Cards
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Use Virtual Smart Cards
|
title: Use Virtual Smart Cards
|
||||||
description: Learn about the requirements for virtual smart cards, how to use and manage them.
|
description: Learn about the requirements for virtual smart cards, how to use and manage them.
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
ms.date: 11/06/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use Virtual Smart Cards
|
# Use Virtual Smart Cards
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Configure Windows Firewall logging
|
title: Configure Windows Firewall logging
|
||||||
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy.
|
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Windows Firewall logging
|
# Configure Windows Firewall logging
|
||||||
@ -137,7 +137,7 @@ If not, add *FullControl* permissions for `mpssvc` to the folder, subfolders and
|
|||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
$LogPath = Join-Path -path $env:windir -ChildPath "System32\LogFiles\Firewall"
|
$LogPath = Join-Path -path $env:windir -ChildPath "System32\LogFiles\Firewall"
|
||||||
$NewAcl = Get-Acl -Path $LogPath
|
$NewAcl = Get-Acl -Path $LogPath
|
||||||
|
|
||||||
$identity = "NT SERVICE\mpssvc"
|
$identity = "NT SERVICE\mpssvc"
|
||||||
$fileSystemRights = "FullControl"
|
$fileSystemRights = "FullControl"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Manage Windows Firewall with the command line
|
title: Manage Windows Firewall with the command line
|
||||||
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
|
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Windows Firewall with the command line
|
# Manage Windows Firewall with the command line
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Configure firewall rules with group policy
|
title: Configure firewall rules with group policy
|
||||||
description: Learn how to configure firewall rules using group policy with the Windows Firewall with Advanced Security console.
|
description: Learn how to configure firewall rules using group policy with the Windows Firewall with Advanced Security console.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure rules with group policy
|
# Configure rules with group policy
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Firewall dynamic keywords
|
title: Windows Firewall dynamic keywords
|
||||||
description: Learn about Windows Firewall dynamic keywords and how to configure it using Windows PowerShell.
|
description: Learn about Windows Firewall dynamic keywords and how to configure it using Windows PowerShell.
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 01/16/2024
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Firewall dynamic keywords
|
# Windows Firewall dynamic keywords
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Filter origin audit log
|
title: Filter origin audit log
|
||||||
description: Learn about Windows Firewall and filter origin audit log to troubleshoot packet drops.
|
description: Learn about Windows Firewall and filter origin audit log to troubleshoot packet drops.
|
||||||
ms.topic: troubleshooting
|
ms.topic: troubleshooting
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Filter origin audit log
|
# Filter origin audit log
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Hyper-V firewall
|
title: Hyper-V firewall
|
||||||
description: Learn how to configure Hyper-V firewall rules and settings using PowerShell or Configuration Service Provider (CSP).
|
description: Learn how to configure Hyper-V firewall rules and settings using PowerShell or Configuration Service Provider (CSP).
|
||||||
ms.topic: how-to
|
ms.topic: how-to
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
appliesto:
|
appliesto:
|
||||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
|
||||||
---
|
---
|
||||||
@ -21,18 +21,18 @@ This section describes the steps to manage Hyper-V firewall using PowerShell.
|
|||||||
|
|
||||||
### Obtain the WSL GUID
|
### Obtain the WSL GUID
|
||||||
|
|
||||||
Hyper-V firewall rules are enabled per *VMCreatorId*. To obtain the VMCreatorId, use the cmdlet:
|
Hyper-V firewall rules are enabled per *VMCreatorId*. To obtain the VMCreatorId, use the cmdlet:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Get-NetFirewallHyperVVMCreator
|
Get-NetFirewallHyperVVMCreator
|
||||||
```
|
```
|
||||||
|
|
||||||
The output contains a VmCreator object type, which has unique identifier `VMCreatorId` and `friendly name` properties. For example, the following output shows the properties of WSL:
|
The output contains a VmCreator object type, which has unique identifier `VMCreatorId` and `friendly name` properties. For example, the following output shows the properties of WSL:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
PS C:\> Get-NetFirewallHyperVVMCreator
|
PS C:\> Get-NetFirewallHyperVVMCreator
|
||||||
VMCreatorId : {40E0AC32-46A5-438A-A0B2-2B479E8F2E90}
|
VMCreatorId : {40E0AC32-46A5-438A-A0B2-2B479E8F2E90}
|
||||||
FriendlyName : WSL
|
FriendlyName : WSL
|
||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -63,7 +63,7 @@ The output contains the following values:
|
|||||||
To configure Hyper-V firewall, use the [Set-NetFirewallHyperVVMSetting][PS-2] command. For example, the following command sets the default inbound connection to *Allow*:
|
To configure Hyper-V firewall, use the [Set-NetFirewallHyperVVMSetting][PS-2] command. For example, the following command sets the default inbound connection to *Allow*:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Set-NetFirewallHyperVVMSetting -Name '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -DefaultInboundAction Allow
|
Set-NetFirewallHyperVVMSetting -Name '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -DefaultInboundAction Allow
|
||||||
```
|
```
|
||||||
|
|
||||||
### Firewall Rules
|
### Firewall Rules
|
||||||
@ -76,10 +76,10 @@ Get-NetFirewallHyperVRule -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}'
|
|||||||
|
|
||||||
To configure specific rules, use the [Set-NetFirewallHyperVRule][PS-4] cmdlet.
|
To configure specific rules, use the [Set-NetFirewallHyperVRule][PS-4] cmdlet.
|
||||||
|
|
||||||
For example, to create an inbound rule to allow TCP traffic to WSL on port 80, use the following command:
|
For example, to create an inbound rule to allow TCP traffic to WSL on port 80, use the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
New-NetFirewallHyperVRule -Name MyWebServer -DisplayName "My Web Server" -Direction Inbound -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -Protocol TCP -LocalPorts 80
|
New-NetFirewallHyperVRule -Name MyWebServer -DisplayName "My Web Server" -Direction Inbound -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -Protocol TCP -LocalPorts 80
|
||||||
```
|
```
|
||||||
|
|
||||||
### Target Hyper-V firewall rules and settings to specific profiles
|
### Target Hyper-V firewall rules and settings to specific profiles
|
||||||
@ -95,7 +95,7 @@ The policy options are similar to the ones already described, but are applied to
|
|||||||
To view the settings per profile, use the following command:
|
To view the settings per profile, use the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Get-NetFirewallHyperVProfile -PolicyStore ActiveStore
|
Get-NetFirewallHyperVProfile -PolicyStore ActiveStore
|
||||||
```
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Windows Firewall overview
|
title: Windows Firewall overview
|
||||||
description: Learn overview information about the Windows Firewall security feature.
|
description: Learn overview information about the Windows Firewall security feature.
|
||||||
ms.topic: overview
|
ms.topic: overview
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Firewall overview
|
# Windows Firewall overview
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Quarantine behavior
|
title: Quarantine behavior
|
||||||
description: Learn about Windows Firewall and the quarantine feature behavior.
|
description: Learn about Windows Firewall and the quarantine feature behavior.
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Quarantine behavior
|
# Quarantine behavior
|
||||||
@ -77,7 +77,7 @@ Inside the wfpdiag.xml, search for `netEvents` that have `FWPM_NET_EVENT_TYPE_CL
|
|||||||
The characters in the application ID name are separated by periods:
|
The characters in the application ID name are separated by periods:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
<asString> \\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e... </asString>
|
<asString> \\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e... </asString>
|
||||||
```
|
```
|
||||||
|
|
||||||
The `netEvent` contains more information about the dropped packet, including information about its capabilities, the filter that dropped the packet, and much more.
|
The `netEvent` contains more information about the dropped packet, including information about its capabilities, the filter that dropped the packet, and much more.
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows Firewall rules
|
title: Windows Firewall rules
|
||||||
description: Learn about Windows Firewall rules and design recommendations.
|
description: Learn about Windows Firewall rules and design recommendations.
|
||||||
ms.date: 11/21/2023
|
ms.date: 09/06/2024
|
||||||
ms.topic: concept-article
|
ms.topic: concept-article
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Windows Firewall tools
|
title: Windows Firewall tools
|
||||||
description: Learn about the available tools to configure Windows Firewall and firewall rules.
|
description: Learn about the available tools to configure Windows Firewall and firewall rules.
|
||||||
ms.date: 11/20/2023
|
ms.date: 09/06/2024
|
||||||
ms.topic: best-practice
|
ms.topic: best-practice
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Troubleshooting UWP App Connectivity Issues in Windows Firewall
|
title: Troubleshooting UWP App Connectivity Issues in Windows Firewall
|
||||||
description: Troubleshooting UWP App Connectivity Issues in Windows Firewall
|
description: Troubleshooting UWP App Connectivity Issues in Windows Firewall
|
||||||
ms.topic: troubleshooting
|
ms.topic: troubleshooting
|
||||||
ms.date: 11/07/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshooting UWP App Connectivity Issues
|
# Troubleshooting UWP App Connectivity Issues
|
||||||
@ -83,7 +83,7 @@ package SID, or application ID name. The characters in the application ID name
|
|||||||
will be separated by periods:
|
will be separated by periods:
|
||||||
|
|
||||||
```XML
|
```XML
|
||||||
(ex)
|
(ex)
|
||||||
|
|
||||||
<asString>
|
<asString>
|
||||||
\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e...
|
\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e...
|
||||||
@ -118,18 +118,18 @@ remote address, capabilities, etc.
|
|||||||
<item>FWPM_NET_EVENT_FLAG_LOCAL_PORT_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_LOCAL_PORT_SET</item>
|
||||||
<item>FWPM_NET_EVENT_FLAG_REMOTE_PORT_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_REMOTE_PORT_SET</item>
|
||||||
<item>FWPM_NET_EVENT_FLAG_APP_ID_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_APP_ID_SET</item>
|
||||||
<item>FWPM_NET_EVENT_FLAG_USER_ID_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_USER_ID_SET</item>
|
||||||
<item>FWPM_NET_EVENT_FLAG_IP_VERSION_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_IP_VERSION_SET</item>
|
||||||
<item>FWPM_NET_EVENT_FLAG_PACKAGE_ID_SET</item>
|
<item>FWPM_NET_EVENT_FLAG_PACKAGE_ID_SET</item>
|
||||||
</flags>
|
</flags>
|
||||||
<ipVersion>FWP_IP_VERSION_V6</ipVersion>
|
<ipVersion>FWP_IP_VERSION_V6</ipVersion>
|
||||||
<ipProtocol>6</ipProtocol>
|
<ipProtocol>6</ipProtocol>
|
||||||
<localAddrV6.byteArray16>2001:4898:30:3:256c:e5ba:12f3:beb1</localAddrV6.byteArray16>
|
<localAddrV6.byteArray16>2001:4898:30:3:256c:e5ba:12f3:beb1</localAddrV6.byteArray16>
|
||||||
<remoteAddrV6.byteArray16>2620:1ec:c11::200</remoteAddrV6.byteArray16>
|
<remoteAddrV6.byteArray16>2620:1ec:c11::200</remoteAddrV6.byteArray16>
|
||||||
<localPort>52127</localPort>
|
<localPort>52127</localPort>
|
||||||
<remotePort>443</remotePort>
|
<remotePort>443</remotePort>
|
||||||
<scopeId>0</scopeId>
|
<scopeId>0</scopeId>
|
||||||
<appId>
|
<appId>
|
||||||
<data>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</data>
|
<data>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</data>
|
||||||
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
||||||
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.0...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.0...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
||||||
@ -152,7 +152,7 @@ remote address, capabilities, etc.
|
|||||||
<internalFields>
|
<internalFields>
|
||||||
<internalFlags/>
|
<internalFlags/>
|
||||||
<remoteAddrBitmap>0000000000000000</remoteAddrBitmap>
|
<remoteAddrBitmap>0000000000000000</remoteAddrBitmap>
|
||||||
<capabilities numItems="3">
|
<capabilities numItems="3">
|
||||||
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
|
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
|
||||||
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
|
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
|
||||||
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
|
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
|
||||||
@ -195,7 +195,7 @@ allowed by Filter #125918, from the InternetClient Default Rule.
|
|||||||
<asString>.+......</asString>
|
<asString>.+......</asString>
|
||||||
</providerData>
|
</providerData>
|
||||||
<layerKey>FWPM_LAYER_ALE_AUTH_CONNECT_V6</layerKey>
|
<layerKey>FWPM_LAYER_ALE_AUTH_CONNECT_V6</layerKey>
|
||||||
<subLayerKey>FWPM_SUBLAYER_MPSSVC_WSH</subLayerKey
|
<subLayerKey>FWPM_SUBLAYER_MPSSVC_WSH</subLayerKey
|
||||||
<weight>
|
<weight>
|
||||||
<type>FWP_EMPTY</type>
|
<type>FWP_EMPTY</type>
|
||||||
</weight>
|
</weight>
|
||||||
@ -284,7 +284,7 @@ The important part of this condition is **S-1-15-3-1**, which is the capability
|
|||||||
From the **netEvent** capabilities section, capabilities from netEvent, Wfpdiag-Case-1.xml.
|
From the **netEvent** capabilities section, capabilities from netEvent, Wfpdiag-Case-1.xml.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<capabilities numItems="3">
|
<capabilities numItems="3">
|
||||||
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
|
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
|
||||||
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
|
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
|
||||||
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
|
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
|
||||||
@ -575,7 +575,7 @@ In this example, the UWP app is unable to reach the Intranet target address, 10.
|
|||||||
<localPort>52998</localPort>
|
<localPort>52998</localPort>
|
||||||
<remotePort>53</remotePort>
|
<remotePort>53</remotePort>
|
||||||
<scopeId>0</scopeId>
|
<scopeId>0</scopeId>
|
||||||
<appId>
|
<appId>
|
||||||
<data>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</data>
|
<data>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</data>
|
||||||
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
||||||
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.1...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.1...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
||||||
@ -653,7 +653,7 @@ In this example, the UWP app is unable to reach the Intranet target address, 10.
|
|||||||
<localPort>52956</localPort>
|
<localPort>52956</localPort>
|
||||||
<remotePort>53</remotePort>
|
<remotePort>53</remotePort>
|
||||||
<scopeId>0</scopeId>
|
<scopeId>0</scopeId>
|
||||||
<appId>
|
<appId>
|
||||||
<data>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</data>
|
<data>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</data>
|
||||||
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
|
||||||
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.3...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.3...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
|
||||||
|
@ -5,7 +5,7 @@ ms.topic: concept-article
|
|||||||
manager: aaroncz
|
manager: aaroncz
|
||||||
ms.author: paoloma
|
ms.author: paoloma
|
||||||
author: paolomatarazzo
|
author: paolomatarazzo
|
||||||
ms.date: 11/07/2023
|
ms.date: 09/06/2024
|
||||||
---
|
---
|
||||||
|
|
||||||
# Zero Trust and Windows device health
|
# Zero Trust and Windows device health
|
||||||
|
Loading…
x
Reference in New Issue
Block a user