Resolving PubOps comments

This commit is contained in:
Alekhya Jupudi 2022-05-11 11:19:45 +05:30
parent 63817612bd
commit 5c02555034
4 changed files with 27 additions and 24 deletions

View File

@ -19514,6 +19514,21 @@
"source_path": "windows/education/developers.yml",
"redirect_url": "/education/",
"redirect_document_id": true
},
{
"source_path": "windows/client-management/mdm/enterpriseappmanagement-csp.md",
"redirect_url": "windows/client-management/mdm/configuration-service-provider-reference",
"redirect_document_id": true
},
{
"source_path": "windows/client-management/mdm/messaging-ddf.md",
"redirect_url": "windows/client-management/mdm/configuration-service-provider-reference",
"redirect_document_id": true
},
{
"source_path": "windows/client-management/mdm/messaging-csp.md",
"redirect_url": "windows/client-management/mdm/configuration-service-provider-reference",
"redirect_document_id": true
}
]
}

View File

@ -832,18 +832,6 @@ Additional lists:
<!--EndSKU-->
<!--EndCSP-->
<!--StartCSP-->
[SurfaceHub](surfacehub-csp.md)
<!--StartSKU-->
|Home|Pro|Business|Enterprise|Education|
|--- |--- |--- |--- |--- |
||||||
<!--EndSKU-->
<!--EndCSP-->
<!--StartCSP-->
[TenantLockdown CSP](tenantlockdown-csp.md)
@ -935,7 +923,7 @@ Additional lists:
|Home|Pro|Business|Enterprise|Education|
|--- |--- |--- |--- |--- |
||||||
|Yes|Yes|Yes|Yes|Yes|
<!--EndSKU-->
<!--EndCSP-->
@ -1032,7 +1020,7 @@ Additional lists:
|Home|Pro|Business|Enterprise|Education|
|--- |--- |--- |--- |--- |
||||||
|Yes|Yes|Yes|Yes|Yes|
<!--EndSKU-->
<!--EndCSP-->

View File

@ -384,7 +384,7 @@ If not specified - a new rule is enabled by default.
Boolean value. Supported operations are Get and Replace.
<a href="" id="profiles"></a>**FirewallRules/_FirewallRuleName_/Profiles**
Specifies the profiles to which the rule belongs: Domain, Private, Public. . See [FW_PROFILE_TYPE](/openspecs/windows_protocols/ms-fasp/7704e238-174d-4a5e-b809-5f3787dd8acc) for the bitmasks that are used to identify profile types.
Specifies the profiles to which the rule belongs: Domain, Private, or Public. See [FW_PROFILE_TYPE](/openspecs/windows_protocols/ms-fasp/7704e238-174d-4a5e-b809-5f3787dd8acc) for the bitmasks that are used to identify profile types.
If not specified, the default is All.
Value type is integer. Supported operations are Get and Replace.

View File

@ -946,8 +946,8 @@ If BitLockerStatus = 1 (On), then allow access.
If BitLockerStatus = 0 (Off), then take one of the following actions that align with your enterprise policies:
- Disallow all access..
- Disallow access to HBI assets..
- Disallow all access.
- Disallow access to HBI assets.
- Allow conditional access based on other data points that are present at evaluation time. For example, other attributes on the health certificate, or a device's past activities and trust history.
- Take one of the previous actions and additionally place the device in a watch list to monitor the device more closely for potential risks.
@ -957,10 +957,10 @@ This attribute indicates the version of the Boot Manager that is running on the
If BootManagerRevListVersion = [CurrentVersion], then allow access.
If BootManagerRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:
If `BootManagerRevListVersion !`= [CurrentVersion], then take one of the following actions that align with your enterprise policies:
- Disallow all access..
- Disallow access to HBI and MBI assets..
- Disallow all access.
- Disallow access to HBI and MBI assets.
- Place the device in a watch list to monitor the device more closely for potential risks.
- Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue.
@ -970,10 +970,10 @@ This attribute indicates the version of the code that is performing integrity ch
If CodeIntegrityRevListVersion = [CurrentVersion], then allow access.
If CodeIntegrityRevListVersion != [CurrentVersion], then take one of the following actions that align with your enterprise policies:
If `CodeIntegrityRevListVersion !`= [CurrentVersion], then take one of the following actions that align with your enterprise policies:
- Disallow all access..
- Disallow access to HBI and MBI assets..
- Disallow all access.
- Disallow access to HBI and MBI assets.
- Place the device in a watch list to monitor the device more closely for potential risks.
- Trigger a corrective action, such as informing the technical support team to contact the owner investigate the issue.