Merge branch 'main' into windows-docs-Release-branch
@ -2,6 +2,21 @@
|
||||
|
||||
|
||||
|
||||
## Week of June 19, 2023
|
||||
|
||||
|
||||
| Published On |Topic title | Change |
|
||||
|------|------------|--------|
|
||||
| 6/23/2023 | [Important considerations before deploying apps with managed installer](/education/windows/tutorial-deploy-apps-winse/considerations) | added |
|
||||
| 6/23/2023 | [Create policies to enable applications](/education/windows/tutorial-deploy-apps-winse/create-policies) | added |
|
||||
| 6/23/2023 | [Applications deployment considerations](/education/windows/tutorial-deploy-apps-winse/deploy-apps) | added |
|
||||
| 6/23/2023 | [Deploy policies to enable applications](/education/windows/tutorial-deploy-apps-winse/deploy-policies) | added |
|
||||
| 6/23/2023 | [Deploy applications to Windows 11 SE with Intune](/education/windows/tutorial-deploy-apps-winse/index) | added |
|
||||
| 6/23/2023 | [Troubleshoot app deployment issues in Windows SE](/education/windows/tutorial-deploy-apps-winse/troubleshoot) | added |
|
||||
| 6/23/2023 | [Validate the applications deployed to Windows SE devices](/education/windows/tutorial-deploy-apps-winse/validate-apps) | added |
|
||||
| 6/23/2023 | [Configure applications with Microsoft Intune](/education/windows/tutorial-school-deployment/configure-device-apps) | modified |
|
||||
|
||||
|
||||
## Week of May 29, 2023
|
||||
|
||||
|
||||
|
@ -6,6 +6,8 @@ items:
|
||||
items:
|
||||
- name: Deploy and manage Windows devices in a school
|
||||
href: tutorial-school-deployment/toc.yml
|
||||
- name: Deploy applications to Windows 11 SE
|
||||
href: tutorial-deploy-apps-winse/toc.yml
|
||||
- name: Concepts
|
||||
items:
|
||||
- name: Windows 11 SE
|
||||
|
@ -0,0 +1,53 @@
|
||||
---
|
||||
title: Important considerations before deploying apps with managed installer
|
||||
description: Learn about important aspects to consider before deploying apps with managed installer.
|
||||
ms.date: 06/19/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Important considerations before deploying apps with Managed Installer
|
||||
|
||||
This article describes important aspects to consider before deploying apps with managed installer.
|
||||
|
||||
## Existing apps deployed in Intune
|
||||
|
||||
If you have Windows 11 SE devices that already have apps deployed through Intune, the apps won't get retroactively tagged with the *managed installer* mark. You may need to redeploy the apps through Intune to get them properly tagged with managed installer and allowed to run.
|
||||
|
||||
## Enrollment Status Page
|
||||
|
||||
The Enrollment Status Page (ESP) is compatible with Windows 11 SE. However, due to the Windows 11 SE base policy, devices can be blocked from completing enrollment if:
|
||||
|
||||
1. You have the ESP configured to block device use until required apps are installed, and
|
||||
2. You deploy an app that is blocked by the Windows 11 SE base policy, not installable via a managed installer (without more policies), and not allowed by any supplemental policies or AppLocker policies
|
||||
<!--
|
||||
For example, if you deploy a UWP LOB app but haven't deployed a supplemental policy to allow the app, ESP will fail.-->
|
||||
|
||||
If you choose to block device use on the installation of apps, you must ensure that apps are also not blocked from installation.
|
||||
|
||||
:::image type="content" source="./images/esp-error.png" alt-text="Screenshot of the Enrollment Status Page showing an error in OOBE on Windows 11 SE." border="false":::
|
||||
|
||||
### ESP errors mitigation
|
||||
|
||||
To ensure that you don't run into installation or enrollment blocks, you can pick one of the following options, in accordance with your internal policies:
|
||||
|
||||
1. Ensure that all apps are unblocked from installation. Apps must be compatible with the Windows 11 SE managed installer flow, and if they aren't compatible out-of-box, have the corresponding supplemental policy to allow them
|
||||
2. Don't deploy apps that you haven't validated
|
||||
3. Set your Enrollment Status Page configuration to not block device use based on required apps
|
||||
|
||||
To learn more about the ESP, see [Set up the Enrollment Status Page][MEM-1].
|
||||
|
||||
## Potential impact to events collected by Log Analytics integrations
|
||||
|
||||
Log Analytics is a cloud service that can be used to collect data from AppLocker policy events. Windows 11 SE devices enrolled in an Intune Education tenant will automatically receive an AppLocker policy. The result is an increase in events generated by the AppLocker policy.
|
||||
|
||||
If your organization is using Log Analytics, it's recommended to review your Log Analytics setup to:
|
||||
|
||||
- Ensure there's an appropriate data collection cap in place to avoid unexpected billing costs
|
||||
- Turn off the collection of non-error AppLocker events in Log Analytics, except for MSI and Script logs
|
||||
|
||||
For more information, see [Use Event Viewer with AppLocker][WIN-1]
|
||||
|
||||
[MEM-1]: /mem/intune/enrollment/windows-enrollment-status
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker
|
210
education/windows/tutorial-deploy-apps-winse/create-policies.md
Normal file
@ -0,0 +1,210 @@
|
||||
---
|
||||
title: Create policies to enable applications
|
||||
description: Learn how to create policies to enable the installation and execution of apps on Windows SE.
|
||||
ms.date: 06/19/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Create policies to enable applications
|
||||
|
||||
:::row:::
|
||||
:::column span="":::
|
||||
<a href="deploy-apps.md"><img src="images/phase-1-off.svg" alt="Icon representing the first phase."/></a><br>
|
||||
[**Deploy an application via Microsoft Intune**](deploy-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="validate-apps.md"><img src="images/phase-2-off.svg" alt="Icon representing the second phase."/></a><br>
|
||||
[**Validate the application**](validate-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="create-policies.md"><img src="images/phase-3-on.svg" alt="Icon representing the third phase."/></a><br>
|
||||
[**Create additional policies (optional)**](create-policies.md)
|
||||
:::column-end:::
|
||||
:::row-end:::
|
||||
|
||||
|
||||
You can create AppLocker policies to allow apps that are [semi-compatible](./validate-apps.md#semi-compatible-apps) or [incompatible](./validate-apps.md#incompatible-apps) with the managed installer to run.
|
||||
|
||||
<!--
|
||||
You can create policies to allow applications that are [semi-compatible](./validate-apps.md#semi-compatible-apps) or [incompatible](./validate-apps.md#incompatible-apps) with the managed installer.
|
||||
|
||||
The following table details the two policy types to allow apps to run:
|
||||
|
||||
| **Policy type** | **How it works** | **When should I use this policy?** | **Security risk** |
|
||||
|---|---|---|---|
|
||||
| WDAC supplemental policy | Allows apps meeting the rule criteria to run | For executables that the Windows 11 SE base policy blocks. The blocked executables are visible from the Event Viewer in the [CodeIntegrity events](./troubleshoot.md). | Low |
|
||||
| AppLocker policy | Sets an app to be considered as a managed installer | Only for executables that do installations or updates, that the Windows 11 SE base policy blocks. | High |
|
||||
|
||||
> [!NOTE]
|
||||
> The specifics of the policy you will need to create vary from app to app. Public documentation can help you determine which rules would be useful for your app.
|
||||
|
||||
|
||||
## WDAC supplemental policies
|
||||
|
||||
A *supplemental policy* can expand only one base policy, but multiple supplemental policies can expand the same base policy. When you use supplemental policies, the apps allowed by the base or its supplemental policies will be allowed to execute.\
|
||||
The base policy that you must target for Windows SE devices has a PolicyID of **{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}**.
|
||||
|
||||
> [!WARNING]
|
||||
> The maximum number of active policies is 32, which includes the Windows 11 SE base policy, the Microsoft vulnerable driver block list, and potentially other inbox policies. When planning your supplemental policy strategy, avoid adding too many. For example, avoid creating a supplemental policy per app, which can add up very quickly.
|
||||
|
||||
After you create WDAC supplemental policies, you must sign them and deploy them through Intune.\
|
||||
To create supplemental policies, download and install the [WDAC Policy Wizard][EXT-1] from a **non-Windows SE device**.
|
||||
|
||||
The following video provides an overview and explains how to create supplemental policies for apps blocked by the Windows 11 SE base policy.
|
||||
|
||||
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RWWReO]
|
||||
|
||||
### Create a supplemental policy for Win32 apps
|
||||
|
||||
There are different ways to write a supplemental policy. The suggested method is to use [audit events][WIN-3], as they list the actions that Windows 11 SE would block. From the audit events, you can create a policy to allow those actions.\
|
||||
From a non-Windows SE device with the WDAC Policy Wizard installed, follow these steps:
|
||||
|
||||
1. Apply an audit mode WDAC Base policy. The WDAC Wizard includes a template policy called *WinSEPolicy.xml*, which is based on the Windows 11 SE base policy:
|
||||
- Open the **WDAC Wizard** and select **Policy Editor**
|
||||
- In the Policy Path to Edit field, browse for *%ProgramFiles%\WindowsApps\Microsoft.WDAC\** and select the file called *WinSEPolicy.xml*. Select **Next**
|
||||
:::image type="content" source="images/wdac-winsepolicy.png" alt-text="Screenshot of the WDAC wizard - creation of a policy targeting the base WinSEPolicy.xml policy.":::
|
||||
- Toggle the option for **Audit Mode** and complete the wizard. Note the location of the *.cip* and *.xml* files shown on the final page of the wizard
|
||||
- From an elevated PowerShell session, run the following command to activate the policy:
|
||||
|
||||
```cmd
|
||||
citool.exe -up <"Path to the .cip file">
|
||||
```
|
||||
|
||||
1. With the *Base audit mode policy* for Windows 11 SE in place:
|
||||
- Download and run the app install for your app
|
||||
- Launch the app and exercise the app's capabilities
|
||||
- Uninstall the app
|
||||
1. Use the WDAC Wizard to create a policy from audit events:
|
||||
- Open the **WDAC Wizard** and select **Policy Editor**
|
||||
- Select **Convert Event Log to a WDAC Policy** then select **Parse Event Log** to parse from the system Event Viewer. Select **Next**
|
||||
- Review each row in the table and choose the type of rule to create. You may want to sort the table by FileName to group duplicate rows together. You need to create a single rule if the values are duplicates
|
||||
- Complete the wizard to generate the policy. The policy will be a *Base* policy. Note the location of the *.xml* shown, as you'll use it in the next step.
|
||||
- Check the event log **AppLocker** > **MSI and Script** for any events
|
||||
- If any events are shown, you can use the **WDAC Wizard** to edit the policy and add more rules
|
||||
- Alternatively, you can save all events to *.evtx* file and create a policy from audit events, but browse for the saved *.evtx* file rather than parsing events from the system Event Viewer
|
||||
1. Convert the policy created in the previous step to a supplemental policy, specifying the Base audit policy you created in the first step as its base
|
||||
|
||||
```PowerShell
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to.xml file from step #4>" -BasePolicyToSupplementPath "<Path to the WDAC Base policy .xml created from step #2>"
|
||||
```
|
||||
|
||||
1. From an elevated PowerShell session, run the following command to activate the policy:
|
||||
|
||||
```cmd
|
||||
citool.exe -up '<Path to the .cip file>'
|
||||
```
|
||||
|
||||
1. Clear the two event logs:
|
||||
- **CodeIntegrity** > **Operational**
|
||||
- **AppLocker** > **MSI and Script**
|
||||
1. Repeat the app testing from step 3. Repeat these steps as needed until no further events are generated.
|
||||
1. Once you have a policy that works for your app, reset the supplemental policy's Base policy to the official Windows 11 SE BasePolicyId. From an elevated PowerShell session, run the following command:
|
||||
|
||||
```PowerShell
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to .xml from step #4>" -SupplementsBasePolicyId "{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}"
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> If you have created multiple supplemental policies for different apps, it's recommended to merge all supplemental policies together before deploying. You can merge policies using the WDAC Wizard.
|
||||
1. The creation of the supplemental policy is complete. You must sign and deploy the policy to your devices to take effect.
|
||||
|
||||
### Create a supplemental policy for UWP LOB apps
|
||||
|
||||
UWP apps don't work out-of-box due to the Windows 11 SE Windows 11 SE base policy.\
|
||||
From a non-Windows SE device with the WDAC Policy Wizard installed, you can create and deploy a supplemental policy using these steps:
|
||||
|
||||
1. Open the **WDAC Wizard** and select **Policy Creator > Supplemental policy**
|
||||
- Choose a **Policy Name** and **Policy File Location**
|
||||
- In the **Base Policy** path to, browse for *%ProgramFiles%\WindowsApps\Microsoft.WDAC\** and select the file called *WinSEPolicy.xml*. Select **Next**
|
||||
- In **Policy Rules**, select **Next**
|
||||
- In **Signing Rules**, select **Add Custom Rule** and choose:
|
||||
- **Rule scope**: **Usermode Rule**
|
||||
- **Rule action**: **Allow**
|
||||
- **Rule type**: **Packaged App**
|
||||
- **Package Name**: specify the package name of app. If the app is installed, you can search by name. If the app isn't installed, check the **Use Custom Package Family** box and specify the package family name of the app
|
||||
:::image type="content" source="images/wdac-uwp-policy.png" alt-text="Screenshot of the WDAC wizard - selection of an installed UWP app package.":::
|
||||
- Select the app name
|
||||
- Select **Create Rule**
|
||||
- Select **Next**
|
||||
1. The policy should be created and output an *.xml* and *.cip* files to the policy file location specified earlier
|
||||
1. The policy isn't yet targeting the right base policy. Run the following PowerShell command to set the base policy to the Windows 11 SE Windows 11 SE base policy:
|
||||
|
||||
```PowerShell
|
||||
Set-CiPolicyIdInfo -FilePath "<Path to.xml file from previous step>" -SupplementsBasePolicyId "{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}"
|
||||
```
|
||||
|
||||
1. The creation of the supplemental policy is complete. You must sign and deploy the policy to your devices to take effect.
|
||||
|
||||
### Guidelines for authoring WDAC supplemental policy rules
|
||||
|
||||
Here are some general guidelines to follow when writing WDAC supplemental policies:
|
||||
|
||||
- For packaged apps (*.appx* or *.msix*), choose **PackagedApp** and allow the file by its **PackageFamilyName**
|
||||
- For other apps, try to create **Publisher** rules wherever possible, combining the **Publisher** with other properties like **Product**, **Filename**, and **Version**
|
||||
|
||||
> [!NOTE]
|
||||
> The WDAC Wizard defaults to use all of the properties, if present. In some cases, you may want to combine a subset of the properties to allow multiple files. For example: Publisher + ProductName + Version.
|
||||
|
||||
- When a **Publisher** rule isn't an option (for example, when the file is unsigned), use *Hash* as the most restrictive option
|
||||
- You might have to opt for a **FileAttribute** rule, but it can be easily spoofed
|
||||
|
||||
For additional information:
|
||||
|
||||
- [WDAC Policy Wizard][EXT-1]
|
||||
- [Policy creation for common WDAC usage scenarios][WIN-1]
|
||||
- [Create a new supplemental policy with the wizard][WIN-2]
|
||||
|
||||
## AppLocker policies
|
||||
|
||||
> [!WARNING]
|
||||
> It's recommended to use AppLocker policies for processes that perform **updates** or **install as managed installers** only. The preferred method to allow incompatible applications or other executables to run, is to write **WDAC supplemental policies** instead of modifying AppLocker policies.
|
||||
|
||||
Additional AppLocker policies work by configuring other apps to be *managed installers*. However, since anything downloaded or installed by a managed installer is trusted to run, it creates a significant security risk. For example, if the executable for a third-party browser is set as a managed installer, anything downloaded from that browser will be allowed to run.\
|
||||
Using a WDAC supplemental policy instead, allows you to have more control over what is allowed to run without the risk of those permissions propagating unintentionally.
|
||||
|
||||
To allow apps to run by setting their installers as managed installers, follow the guidance here:
|
||||
-->
|
||||
|
||||
## AppLocker policies
|
||||
|
||||
Additional AppLocker policies work by configuring other apps to be *managed installers*. However, since anything downloaded or installed by a managed installer is trusted to run, it creates a significant security risk. For example, if the executable for a third-party browser is set as a managed installer, anything downloaded from that browser will be allowed to run.
|
||||
|
||||
To allow apps to run by setting their installers as managed installers, follow the guidance here:
|
||||
|
||||
- [Edit an AppLocker policy][WIN-5]
|
||||
- [Allow apps deployed with a WDAC managed installer][WIN-6]
|
||||
|
||||
## Next steps
|
||||
|
||||
<!--
|
||||
Before moving on to the next section, ensure that you've completed the following tasks.
|
||||
|
||||
For a WDAC supplemental policy:
|
||||
|
||||
> [!div class="checklist"]
|
||||
>
|
||||
> - Create a policy, targeting the base policy: **82443e1e-8a39-4b4a-96a8-f40ddc00b9f3**
|
||||
|
||||
For an AppLocker policy:
|
||||
|
||||
> [!div class="checklist"]
|
||||
>
|
||||
> - Only applied to an updater or installer
|
||||
> - Created the policy with the **Merge** option
|
||||
|
||||
Advance to the next article to learn how to deploy the WDAC supplemental policies or AppLocker policies to Windows 11 SE devices.
|
||||
-->
|
||||
|
||||
Advance to the next article to learn how to deploy the AppLocker policies to Windows 11 SE devices.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: deploy policies >](deploy-policies.md)
|
||||
|
||||
[EXT-1]: https://webapp-wdac-wizard.azurewebsites.net/
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/types-of-devices
|
||||
[WIN-2]: /windows/security/threat-protection/windows-defender-application-control/wdac-wizard-create-supplemental-policy
|
||||
[WIN-3]: /windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies
|
||||
[WIN-5]: /windows/security/threat-protection/windows-defender-application-control/applocker/edit-an-applocker-policy
|
||||
[WIN-6]: /windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer
|
109
education/windows/tutorial-deploy-apps-winse/deploy-apps.md
Normal file
@ -0,0 +1,109 @@
|
||||
---
|
||||
title: Applications deployment considerations
|
||||
description: Learn how to deploy different types of applications to Windows 11 SE and some considerations before deploying them.
|
||||
ms.date: 05/23/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Applications deployment considerations
|
||||
|
||||
:::row:::
|
||||
:::column span="":::
|
||||
<a href="deploy-apps.md"><img src="images/phase-1-on.svg" alt="Icon representing the first phase."/></a><br>
|
||||
[**Deploy an application via Microsoft Intune**](deploy-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="validate-apps.md"><img src="images/phase-2-off.svg" alt="Icon representing the second phase."/></a><br>
|
||||
[**Validate the application**](validate-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="create-policies.md"><img src="images/phase-3-off.svg" alt="Icon representing the third phase."/></a><br>
|
||||
[**Create additional policies (optional)**](create-policies.md)
|
||||
:::column-end:::
|
||||
:::row-end:::
|
||||
|
||||
The process to deploy applications to Windows SE devices via Microsoft Intune is the same used for non-SE devices. Applications must be defined in Intune, and then assigned to the correct groups.\
|
||||
However, on Windows SE devices, apps may successfully install, but they need validation to be certain that they're functional.
|
||||
|
||||
The following table provides an overview of the applications types that can be deployed to Windows devices via Intune, and considerations about the installation on Windows SE:
|
||||
|
||||
|**Installer/App type**|**Installer extensions**|**Available installation methods via Intune**|**Considerations for Windows 11 SE**|
|
||||
|-|-|-|-|
|
||||
|[Win32][WIN-1]|`.exe`<br>`.msi`|- Intune Management Extension (IME)<br> - Microsoft Store integration|⚠️ There are known limitations that might prevent an app to install or run.|
|
||||
|[Universal Windows Platform (UWP)][WIN-2]|`.appx`<br>`.appxbundle`<br>`.msix`<br>|- For public apps: Microsoft Store integration<br>- For private apps: line-of-business (LOB) apps|⛔ UWP apps are currently unsupported.<!--⚠️ LOB apps require a supplemental policy.-->|
|
||||
|[Progressive Web Apps (PWAs)][EDGE-2] |`.msix`|- Settings catalog policies<br>- Microsoft Store integration|✅ PWAs are supported.|
|
||||
|Web links| n/a |- Windows web links|✅ Web links are supported.|
|
||||
|
||||
<!--after Intune 2307 update the table above with ✅ UWP public apps are supported.<br><br>⛔ UWP private apps are currently unsupported.-->
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Store apps must be installed in device context. Deploying apps in user context fails with error code `0x800711C7`.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Although you'll be able to install apps on Windows 11 SE devices via Intune, some apps may not perform well on these devices due those apps' minimum spec requirements.
|
||||
> Before deploying apps, first check which apps will be targeting your Windows 11 SE devices, and ensure that they meet the requirements.
|
||||
|
||||
## Win32 apps
|
||||
|
||||
The addition of Win32 applications to Intune consists of repackaging the apps and defining the commands to silently install them. The process is described in the article [Add, assign, and monitor a Win32 app in Microsoft Intune][MEM-1].
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If you have Windows 11 SE devices that already have apps deployed through Intune, the apps will not get retroactively tagged with the *managed installer* mark. The reason is to avoid making any security assumptions for these apps. You may need to redeploy the apps through Intune to get them properly tagged with managed installer and allowed to run.
|
||||
|
||||
There are known limitations that might prevent applications to install or execute. For more information, see the next section [validate applications](validate-apps.md).
|
||||
|
||||
## UWP apps
|
||||
|
||||
UWP apps are currently unsupported for Windows 11 SE.
|
||||
|
||||
<!-- 2307
|
||||
### Microsoft Store apps
|
||||
|
||||
Public UWP apps available in the Microsoft Store are supported for Windows 11 SE.
|
||||
|
||||
### Line of business apps
|
||||
|
||||
Private UWP apps are currently unsupported for Windows 11 SE.
|
||||
|
||||
<!--### Line of business apps
|
||||
|
||||
For private, line-of-business (LOB) UWP apps, [deploy as line-of-business apps][MEM-2]
|
||||
|
||||
> [!IMPORTANT]
|
||||
> UWP apps require the creation and deployment of supplemental policies. For more information, see the next section [validate applications](validate-apps.md).
|
||||
|
||||
-->
|
||||
## PWA apps
|
||||
|
||||
PWAs can be deployed using the [Force-installed web Apps][EDGE-1] option via [settings catalog policies][MEM-3], or using the Microsoft Store integration with Intune.
|
||||
|
||||
## Web links
|
||||
|
||||
Web link can be deployed via Intune using [Windows web links][MEM-4], and will be available in the Start menu of the targeted devices.
|
||||
|
||||
## Section review
|
||||
|
||||
Before moving on to the next section, ensure that you've completed the following tasks:
|
||||
|
||||
> [!div class="checklist"]
|
||||
> - `.intunewin` package created (for Win32 apps)
|
||||
> - App uploaded via Intune (for Win32 and UWP LOB apps)
|
||||
> - App assigned to the correct groups
|
||||
|
||||
## Next steps
|
||||
|
||||
Advance to the next article to learn how to validate the applications deployed to Windows 11 SE devices.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: validate apps >](validate-apps.md)
|
||||
|
||||
[EDGE-1]: /deployedge/microsoft-edge-policies#configure-list-of-force-installed-web-apps
|
||||
[EDGE-2]: /microsoft-edge/progressive-web-apps-chromium
|
||||
[MEM-1]: /mem/intune/apps/apps-win32-add
|
||||
[MEM-2]: /mem/intune/apps/lob-apps-windows
|
||||
[MEM-3]: /mem/intune/configuration/settings-catalog
|
||||
[MEM-4]: /mem/intune/apps/web-app
|
||||
[WIN-1]: /windows/win32
|
||||
[WIN-2]: /windows/uwp/get-started/universal-application-platform-guide
|
@ -0,0 +1,96 @@
|
||||
---
|
||||
title: Deploy policies to enable applications
|
||||
description: Learn how to deploy AppLocker policies to enable apps execution on Windows SE devices.
|
||||
ms.date: 05/23/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
<!--description: Learn how to sign WDAC policies and how to deploy WDAC and AppLocker policies to enable apps execution on Windows SE devices.-->
|
||||
|
||||
# Deploy policies to enable applications
|
||||
|
||||
Once the policies are created, you must deploy them to the Windows SE devices.\
|
||||
AppLocker policies can be deployed via Intune. This article describes how to deploy AppLocker policies to enable apps execution on Windows SE devices.
|
||||
|
||||
<!--
|
||||
WDAC and AppLocker policies can be deployed via Intune, but WDAC policies must be signed before they can be deployed.
|
||||
|
||||
This article describes how to sign WDAC policies and how to deploy WDAC and AppLocker policies to enable apps execution on Windows SE devices.
|
||||
|
||||
## Sign WDAC supplemental policies
|
||||
|
||||
> [!IMPORTANT]
|
||||
> *This section will be updated when the process using Azure CodeSigning for CI policy is released in April.*
|
||||
|
||||
## Deploy WDAC supplemental policies
|
||||
|
||||
Policies can be deployed via Intune using a custom OMA-URI.
|
||||
|
||||
> [!TIP]
|
||||
> To prevent these policies from being applied to non-Windows SE devices, you can create and target a group with only Windows 11 SE devices in it, or use assignment filters.
|
||||
|
||||
[Deploy WDAC policies using Mobile Device Management][WIN-4]
|
||||
|
||||
### Troubleshoot WDAC policies
|
||||
|
||||
For information how to validate and troubleshoot WDAC supplemental policies, see [WDAC supplemental policy validation](./troubleshoot.md#wdac-supplemental-policy-validation)
|
||||
|
||||
-->
|
||||
|
||||
## Deploy AppLocker policies
|
||||
|
||||
Intune doesn't currently offer the option to modify AppLocker policies. The deployment of AppLocker policies can be done using PowerShell scripts deployed via Intune.
|
||||
|
||||
You can create a PowerShell script that stores the contents of the policy in a variable, then use the `Set-AppLockerPolicy` PowerShell command to merge it. Here's a sample function for the task:
|
||||
|
||||
```PowerShell
|
||||
function MergeAppLockerPolicy([string]$policyXml)
|
||||
{
|
||||
$policyFile = '.\AppLockerPolicy.xml'
|
||||
$policyXml | Out-File $policyFile
|
||||
Write-Host "Merging and setting AppLocker policy"
|
||||
Set-AppLockerPolicy -XmlPolicy $policyFile -Merge -ErrorAction SilentlyContinue
|
||||
Remove-Item $policyFile
|
||||
}
|
||||
```
|
||||
|
||||
> [!WARNING]
|
||||
> Intune deploys a script with the AppLocker policy to set **Intune Management Extension as a managed installer** on all Windows 11 SE devices enrolled into an Intune EDU tenant. If you want to deploy your own AppLocker policy to set another Managed Installer (in addition to Intune), be sure to use the `-Merge` parameter with `Set-AppLockerPolicy`. The `-Merge` parameter ensures that your policy plays well with Intune's AppLocker policy. Without using the `-Merge` parameter, it will result in issues with apps not getting tagged properly and their ability to run on impacted devices. To learn more about AppLocker Merge policy, see [Merge AppLocker policies][WIN-7].
|
||||
|
||||
Once finished, you can deploy the script via Intune. For more information, see [Add PowerShell scripts to Windows devices in Microsoft Intune][MEM-1].
|
||||
|
||||
### Troubleshoot AppLocker policies
|
||||
|
||||
For information how to validate and troubleshoot AppLocker policies, see [AppLocker policy validation](./troubleshoot.md#applocker-policy-validation)
|
||||
|
||||
## Next steps
|
||||
|
||||
<!--
|
||||
Before moving on to the next section, ensure that you've completed the following tasks.
|
||||
|
||||
For a WDAC supplemental policy:
|
||||
|
||||
> [!div class="checklist"]
|
||||
>
|
||||
> - Signed .cip .p7b file with Device Guard
|
||||
> - Policy created in Intune and assigned to the correct groups
|
||||
> - Policy applied in Event Viewer
|
||||
|
||||
For an AppLocker policy:
|
||||
|
||||
> [!div class="checklist"]
|
||||
>
|
||||
> - Policy created in Intune and assigned to the correct groups
|
||||
-->
|
||||
|
||||
Advance to the next article to learn about important considerations when deploying apps and policies to Windows SE devices.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
>
|
||||
> [Next: important deployment considerations >](considerations.md)
|
||||
|
||||
[MEM-1]: /mem/intune/apps/intune-management-extension
|
||||
[WIN-4]: /windows/security/threat-protection/windows-defender-application-control/deployment/deploy-windows-defender-application-control-policies-using-intune
|
||||
[WIN-7]: /windows/security/threat-protection/windows-defender-application-control/applocker/merge-applocker-policies-by-using-set-applockerpolicy
|
After Width: | Height: | Size: 58 KiB |
After Width: | Height: | Size: 659 KiB |
After Width: | Height: | Size: 293 KiB |
After Width: | Height: | Size: 165 KiB |
After Width: | Height: | Size: 200 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.9" fill="#e6e6e6" stroke="#666666" stroke-opacity="0.9" stroke-width="2" pointer-events="all"/><image x="113" y="18" width="75" height="75" xlink:href="data:image/svg+xml;base64,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" preserveAspectRatio="none" opacity="0.5"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#e6e6e6" stroke="#666666" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)" opacity="0.5"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: rgb(0, 0, 0); " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(0, 0, 0); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">1</div></div></div></foreignObject><text x="21" y="36" fill="rgb(0, 0, 0)" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">1</text></switch></g></g></svg>
|
After Width: | Height: | Size: 3.4 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.95" fill="rgb(255, 255, 255)" stroke="#0078d4" stroke-opacity="0.95" stroke-width="2" pointer-events="all"/><image x="113" y="18" width="75" height="75" xlink:href="data:image/svg+xml;base64,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" preserveAspectRatio="none"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#0078d4" stroke="#ffffff" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: #ffffff; " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(255, 255, 255); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">1</div></div></div></foreignObject><text x="21" y="36" fill="#ffffff" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">1</text></switch></g></g></svg>
|
After Width: | Height: | Size: 3.4 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.9" fill="#e6e6e6" stroke="#666666" stroke-opacity="0.9" stroke-width="2" pointer-events="all"/><image x="105.5" y="15.5" width="80" height="80" xlink:href="data:image/svg+xml;base64,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" preserveAspectRatio="none" opacity="0.5"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#e6e6e6" stroke="#666666" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)" opacity="0.5"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: rgb(0, 0, 0); " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(0, 0, 0); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">2</div></div></div></foreignObject><text x="21" y="36" fill="rgb(0, 0, 0)" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">2</text></switch></g></g></svg>
|
After Width: | Height: | Size: 2.8 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.95" fill="rgb(255, 255, 255)" stroke="#0078d4" stroke-opacity="0.95" stroke-width="2" pointer-events="all"/><image x="105.5" y="15.5" width="80" height="80" xlink:href="data:image/svg+xml;base64,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" preserveAspectRatio="none"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#0078d4" stroke="#ffffff" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: #ffffff; " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(255, 255, 255); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">2</div></div></div></foreignObject><text x="21" y="36" fill="#ffffff" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">2</text></switch></g></g></svg>
|
After Width: | Height: | Size: 2.7 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.9" fill="#e6e6e6" stroke="#666666" stroke-opacity="0.9" stroke-width="2" pointer-events="all"/><image x="105.5" y="15.5" width="80" height="80" xlink:href="data:image/svg+xml;base64,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" preserveAspectRatio="none" opacity="0.5"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#e6e6e6" stroke="#666666" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)" opacity="0.5"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: rgb(0, 0, 0); " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(0, 0, 0); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">3</div></div></div></foreignObject><text x="21" y="36" fill="rgb(0, 0, 0)" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">3</text></switch></g></g></svg>
|
After Width: | Height: | Size: 3.3 KiB |
@ -0,0 +1,3 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" version="1.1" width="272px" height="112px" viewBox="-0.5 -0.5 272 112"><defs/><g><rect x="21" y="1" width="250" height="110" rx="4.4" ry="4.4" fill-opacity="0.95" fill="rgb(255, 255, 255)" stroke="#0078d4" stroke-opacity="0.95" stroke-width="2" pointer-events="all"/><image x="105.5" y="15.5" width="80" height="80" xlink:href="data:image/svg+xml;base64,PHN2ZyB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciIGZpbGw9Im5vbmUiIHZpZXdCb3g9IjAgMCAyNCAyNCIgaGVpZ2h0PSIyNCIgd2lkdGg9IjI0Ij4mI3hhOyAgPHBhdGggZmlsbD0iIzIxMjEyMSIgZD0iTTE3Ljc0OSAzTDE3LjkzMzQgMy4wMDUxNEMxOS41ODI3IDMuMDk3MzQgMjAuOTAyOSA0LjQxNzUgMjAuOTk1MSA2LjA2NTU4TDIxLjAwMDIgNi4yNVYxMi42MTA4QzIwLjMxMzMgMTIuNDc5MyAxOS42NTU0IDEyLjEwODggMTkuMDA1NCAxMS40MzA1TDE4Ljk5OTQgMTEuNDI0M0wxOC45OTkgOEg1LjAwMDIyTDQuOTk5MDIgMTcuNzVDNC45OTkwMiAxOC4zOTcyIDUuNDkwODkgMTguOTI5NSA2LjEyMTIxIDE4Ljk5MzVMNi4yNDkwMiAxOUgxMy4zNzUzQzEzLjU3ODggMTkuNTk1MyAxMy44NjY5IDIwLjE0NjIgMTQuMjQzOSAyMC42NDU3QzE0LjMzNjEgMjAuNzY3OCAxNC40MzI4IDIwLjg4NTkgMTQuNTM0IDIxSDYuMjQ5MDJDNC41MTU5OSAyMSAzLjA5OTc3IDE5LjY0MzUgMy4wMDQxNiAxNy45MzQ0TDIuOTk5MDIgMTcuNzVWNi4yNUMyLjk5OTAyIDQuNTE2OTcgNC4zNTU0NyAzLjEwMDc1IDYuMDY0NiAzLjAwNTE0TDYuMjQ5MDIgM0gxNy43NDlaTTE4Ljk5OTYgMTIuNzY0NEMxOS42MjUxIDEzLjIzNzUgMjAuMjkwNiAxMy41MjMgMjEuMDAwMiAxMy42MjQ1QzIxLjE5NjYgMTMuNjUyNyAyMS4zOTY0IDEzLjY2NjcgMjEuNTk5NiAxMy42NjY3QzIxLjc5MjkgMTMuNjY2NyAyMS45NTQyIDEzLjgwOTUgMjEuOTkxNSAxMy45OTk0TDIxLjk5OTYgMTQuMDgzM1YxNi41ODQ0QzIxLjk5OTYgMTkuMjY2MyAyMC42ODY2IDIxLjA4OTYgMTguMTI2MSAyMS45Nzg2QzE4LjA0NCAyMi4wMDcxIDE3Ljk1NTIgMjIuMDA3MSAxNy44NzMxIDIxLjk3ODZDMTcuMTQ3OSAyMS43MjY4IDE2LjUyMjcgMjEuNCAxNS45OTkxIDIxQzE1LjI5NyAyMC40NjM2IDE0Ljc3NzYgMTkuNzk1NiAxNC40NDQzIDE5QzE0LjE3NzkgMTguMzY0IDE0LjAzMDYgMTcuNjQ2NiAxNC4wMDQgMTYuODQ5N0wxMy45OTk2IDE2LjU4NDRWMTQuMDgzM0MxMy45OTk2IDEzLjg1MzIgMTQuMTc4NyAxMy42NjY3IDE0LjM5OTYgMTMuNjY2N0MxNS42MjMgMTMuNjY2NyAxNi43MjMgMTMuMTU3NSAxNy43MTc1IDEyLjEyMkMxNy44NzM4IDExLjk1OTIgMTguMTI3MiAxMS45NTk0IDE4LjI4MzMgMTIuMTIyM0MxOC41MTYxIDEyLjM2NTIgMTguNzU0OCAxMi41NzkyIDE4Ljk5OTYgMTIuNzY0NFoiLz4mI3hhOzwvc3ZnPg==" preserveAspectRatio="none"/><ellipse cx="21" cy="31" rx="20" ry="20" fill="#0078d4" stroke="#ffffff" stroke-width="2" pointer-events="all"/><g transform="translate(-0.5 -0.5)"><switch><foreignObject pointer-events="none" width="100%" height="100%" requiredFeatures="http://www.w3.org/TR/SVG11/feature#Extensibility" style="overflow: visible; text-align: left;"><div xmlns="http://www.w3.org/1999/xhtml" style="display: flex; align-items: unsafe center; justify-content: unsafe center; width: 38px; height: 1px; padding-top: 31px; margin-left: 2px;"><div data-drawio-colors="color: #ffffff; " style="box-sizing: border-box; font-size: 0px; text-align: center;"><div style="display: inline-block; font-size: 18px; font-family: "Segoe UI semibold"; color: rgb(255, 255, 255); line-height: 1.2; pointer-events: all; font-weight: bold; white-space: normal; overflow-wrap: normal;">3</div></div></div></foreignObject><text x="21" y="36" fill="#ffffff" font-family="Segoe UI semibold" font-size="18px" text-anchor="middle" font-weight="bold">3</text></switch></g></g></svg>
|
After Width: | Height: | Size: 3.2 KiB |
After Width: | Height: | Size: 447 KiB |
After Width: | Height: | Size: 594 KiB |
After Width: | Height: | Size: 420 KiB |
After Width: | Height: | Size: 162 KiB |
After Width: | Height: | Size: 304 KiB |
After Width: | Height: | Size: 651 KiB |
85
education/windows/tutorial-deploy-apps-winse/index.md
Normal file
@ -0,0 +1,85 @@
|
||||
---
|
||||
title: Deploy applications to Windows 11 SE with Intune
|
||||
description: Learn how to deploy applications to Windows 11 SE with Intune and how to validate the apps.
|
||||
ms.date: 06/07/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Tutorial: deploy applications to Windows 11 SE with Intune
|
||||
|
||||
This guide describes how to deploy applications to Windows 11 SE devices that are managed by Microsoft Intune in an education environment. The guide also describes how to validate the apps and how to create policies to allow apps that aren't installable or don't behave as intended.
|
||||
|
||||
## Windows 11 SE and application deployment
|
||||
|
||||
Windows 11 SE is designed to provide a simplified and secure experience for students. Windows 11 SE prevents the installation and execution of third party applications with a technology called *Windows Defender Application Control (WDAC)*.
|
||||
|
||||
WDAC applies an *allowlist* policy called *Windows 11 SE base policy*, which ensures that unwanted apps don't run or get installed. However, it also prevents IT admins from deploying apps to Windows 11 SE devices, unless they're included in the Windows 11 SE base policy.
|
||||
|
||||
With the use of WDAC *supplemental policies*, Intune allows specific third party applications to be installed and executed. The [allowlist process][EDU-1] is done on an app-by-app basis, and the time to request an application to be allowed and have the supplemental policy deployed can be lengthy.
|
||||
|
||||
Starting with Windows 11 SE, version 22H2, IT admins have more flexibility to deploy applications to Windows 11 SE devices. When a Windows 11 SE device is enrolled in an Intune education tenant, it will automatically receive an AppLocker policy that sets the *Intune Management Extension (IME)* as a *managed installer*.
|
||||
|
||||
As a managed installer, applications deployed through the IME will be automatically allowed on Windows 11 SE, removing the allowlist process requirement. For more information about managed installer, see [How does a managed installer work?][WIN-2]
|
||||
|
||||
> [!NOTE]
|
||||
> End-users of Windows 11 SE devices still cannot install and use arbitrary applications without being blocked. Only IT admins can control what apps are allowed.
|
||||
|
||||
## Tutorial objectives
|
||||
|
||||
Even when using managed installer, some applications may not execute due to their type or complexity. In these scenarios, the IT admin must create their own policies that allow the apps execution.\
|
||||
The policies can then be deployed to the Windows SE devices via Intune.
|
||||
|
||||
In this tutorial you'll learn:
|
||||
|
||||
- Which types of apps can be deployed via Intune to Windows 11 SE devices
|
||||
- How to verify that the apps are installed correctly
|
||||
- How to mitigate app installation issues
|
||||
- Special considerations when deploying apps to Windows 11 SE
|
||||
|
||||
## Installation process
|
||||
|
||||
There are three main steps to install an application on Windows 11 SE using the managed installer. Each step will be covered in detail in the next sections of this tutorial:
|
||||
|
||||
:::row:::
|
||||
:::column span="":::
|
||||
<a href="deploy-apps.md"><img src="images/phase-1-on.svg" alt="Icon representing the first phase."/></a><br>
|
||||
[**Deploy an application via Microsoft Intune**](deploy-apps.md)<br>
|
||||
Applications are deployed via Microsoft Intune. There are some restrictions on the types of apps that are compatible with managed installers, but the process is the same used for non-Windows 11 SE devices
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="validate-apps.md"><img src="images/phase-2-on.svg" alt="Icon representing the second phase."/></a><br>
|
||||
[**Validate the application**](validate-apps.md)<br>
|
||||
Applications are validated to ensure that they're installed and execute successfully. The process is the same for non-Windows 11 SE devices. Some applications may be incompatible due to how they're installed, how they execute, or how they update. You'll learn about known limitations in a later section of the tutorial
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="create-policies.md"><img src="images/phase-3-on.svg" alt="Icon representing the third phase."/></a><br>
|
||||
[**Create additional policies (optional)**](create-policies.md)<br>
|
||||
To allow apps that aren't installable or don't behave as intended, more policies can be created and deployed so that the apps can be used
|
||||
:::column-end:::
|
||||
:::row-end:::
|
||||
|
||||
All the steps are done by the IT administrator. Once the steps are complete, users of Windows 11 SE devices should be able to run the applications deployed via Intune.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
To receive policies on your Windows 11 SE devices, allowing app installation from Intune, you must have:
|
||||
|
||||
- Windows 11 SE, version 22H2 with [KB5019980][KB-1] and later
|
||||
- Intune for Education licenses. The license requirement is for the managed installer to deploy apps and supplemental policies via Intune
|
||||
|
||||
If you don't have an Intune for Education license for your devices yet, refer to [Microsoft Intune for Education][EXT-1] for access to a free trial version.
|
||||
|
||||
## Next steps
|
||||
|
||||
Advance to the next article to learn which applications can be deployed to Windows 11 SE devices, and how to deploy them via Intune.
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: deploy apps >](deploy-apps.md)
|
||||
|
||||
[KB-1]: https://support.microsoft.com/kb/5019980
|
||||
[EDU-1]: /education/windows/windows-11-se-overview#add-your-own-applications
|
||||
[EXT-1]: https://www.microsoft.com/en-us/education/intune
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create
|
||||
[WIN-2]: /windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer#how-does-a-managed-installer-work
|
17
education/windows/tutorial-deploy-apps-winse/toc.yml
Normal file
@ -0,0 +1,17 @@
|
||||
items:
|
||||
- name: Introduction
|
||||
href: index.md
|
||||
- name: 1. Deploy apps
|
||||
href: deploy-apps.md
|
||||
- name: 2. Validate apps
|
||||
href: validate-apps.md
|
||||
- name: 3. Create and deploy policies to allow apps
|
||||
items:
|
||||
- name: Create policies
|
||||
href: create-policies.md
|
||||
- name: Deploy policies
|
||||
href: deploy-policies.md
|
||||
- name: Important app deployment considerations
|
||||
href: considerations.md
|
||||
- name: Troubleshoot common issues
|
||||
href: troubleshoot.md
|
109
education/windows/tutorial-deploy-apps-winse/troubleshoot.md
Normal file
@ -0,0 +1,109 @@
|
||||
---
|
||||
title: Troubleshoot app deployment issues in Windows SE
|
||||
description: Troubleshoot common issues when deploying apps to Windows SE devices.
|
||||
ms.date: 06/19/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Troubleshoot app deployment issues in Windows SE
|
||||
|
||||
The following table lists common app deployment issues on Windows 11 SE, and options to resolve them:
|
||||
|
||||
| **Problem** | **Potential solution** |
|
||||
|---|---|
|
||||
| **App hasn't installed** | <li>Check the type of app:<ul><li>Win32 apps should be able to install with no problem</li><li>UWP LOB apps apps aren't supported</li></ul></li><li>It's possible the app is trying to execute a blocked binary. Check the AppLocker and CodeIntegrity logs in the Event Viewer and verify if any executables related to the app are blocked. If so, you'll need to write a supplemental policy to support the app</li><li> Check the Intune Management Extension logs to see if there was an attempt to install your app</li>|
|
||||
| **App has problems when running** | It's possible the app is trying to execute a blocked binary<br> Check the **AppLocker** and **CodeIntegrity** logs in Event Viewer to see if any executables related to the app are being blocked. If so, you'll need to write a supplemental policy to support the app. |
|
||||
| **My supplemental policy hasn't deployed** |<li>Your XML policy is malformed. Double-check to see if all markup is tagged correctly</li><li>Check that your policy is correctly applied|
|
||||
|
||||
<!--
|
||||
The following table lists common app deployment issues on Windows 11 SE, and options to resolve them:
|
||||
|
||||
| **Problem** | **Potential solution** |
|
||||
|---|---|
|
||||
| **App hasn't installed** | <li>Check the type of app:<ul><li>Win32 apps should be able to install with no problem</li><li>UWP LOB apps require writing an additional supplemental policy</li><li>Microsoft Sore apps aren't supported</li></ul></li><li>Check that the managed installer policies are deployed correctly</li><li>It's possible the app is trying to execute a blocked binary. Check the AppLocker and CodeIntegrity logs in the Event Viewer and verify if any executables related to the app are blocked. If so, you'll need to write a supplemental policy to support the app</li><li> Check the Intune Management Extension logs to see if there was an attempt to install your app</li>|
|
||||
| **App has problems when running** | It's possible the app is trying to execute a blocked binary<br> Check the **AppLocker** and **CodeIntegrity** logs in Event Viewer to see if any executables related to the app are being blocked. If so, you'll need to write a supplemental policy to support the app. |
|
||||
| **My supplemental policy hasn't deployed** |<li>Your XML policy is malformed. Double-check to see if all markup is tagged correctly</li><li>Check that your policy is correctly applied|
|
||||
|
||||
|
||||
## WDAC Supplemental policy validation
|
||||
|
||||
Use the Event Viewer to see if a supplemental policy is deployed correctly. These rules apply to both the policy that allows managed installers and any supplemental policies that you deploy.
|
||||
|
||||
1. Open the **Event viewer** on a target device
|
||||
1. Expand **Applications and Services > Microsoft > Windows > CodeIntegrity > Operational**
|
||||
1. Check for **event ID 3099**: *the policy was Refreshed and activated*
|
||||
- For example: `Refreshed and activated Code Integrity policy {GUID} . id . Status 0x0`
|
||||
- The policy that allows managed installers is **`C0DB889B-59C5-453C-B297-399C851934E4`**. Checking that this policy is applied correctly, indicates that a device is setup to allow managed installers (and therefore, can allow installation of Win32 apps via the Intune Management Extension).\
|
||||
You can check that the **Managed Installer policy** rule was set in the policy, by checking the **Options** field in the **details** pane. For more information, see: [Understanding Application Control event IDs][WIN-1]
|
||||
|
||||
:::image type="content" source="images/troubleshoot-managed-installer-policy.png" alt-text="Screenshot of the CodeIntegrity operational log." lightbox="images/troubleshoot-managed-installer-policy.png":::
|
||||
|
||||
You can also verify that the policy has been activated by running the following from the <kbd>Win</kbd> + <kbd>R</kbd> *Run dialog* on a target device as an Administrator (hold <kbd>CTRL</kbd> + <kbd>Shift</kbd> when pressing Enter to run the command):
|
||||
|
||||
```
|
||||
citool.exe -lp
|
||||
```
|
||||
|
||||
- For the policy that allows managed installers to run, a policyID `C0DB889B-59C5-453C-B297-399C851934E4` and Friendly Name *[Win-EDU] Microsoft Apps Supplemental Policy - Prod* should be present, and have **Is Currently Enforced** showing as **true**
|
||||
- For any additional policies that you deploy, check that a policy with a matching ID and Friendly Name is shown in the list and the **Is Currently Enforced** and **Is Authorized** properties are both showing as **true**
|
||||
|
||||
:::image type="content" source="images/troubleshoot-citool.png" alt-text="Screenshot of the output of citool.exe with the Win-EDU supplemental policy.":::
|
||||
|
||||
1. Check for **error events** with code **3077**: and reference [Understanding Application Control event IDs][WIN-1]
|
||||
|
||||
:::image type="content" source="images/troubleshoot-codeintegrity-log.png" alt-text="Screenshot of the error in the CodeIntegrity operational log showing that PowerShell execution is prevented by policy." lightbox="images/troubleshoot-codeintegrity-log.png":::
|
||||
|
||||
When checking an error event, you can observe that the information in the *General* tab may show something like the following:
|
||||
|
||||
```
|
||||
Code Integrity determined that a process (\Device\HarddiskVolume3\Windows\System32\svchost.exe) attempted to load **\Device\HarddiskVolume3\Windows\System32\WindowsPowerShell\v1.0\powershell.exe** that did not meet the Enterprise signing level requirements or violated code integrity policy (Policy ID:**{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}**).
|
||||
```
|
||||
|
||||
The important things to parse are:
|
||||
|
||||
- **Failing application**: the path and executable here inform you which application failed. It's important to check that this executable is expected for the application you're validating. (for example. You would expect zoom.exe to fail for Zoom as opposed to cmd.exe.)
|
||||
- **Error reason**: indicates why the application was unable to run. `...did not meet the Enterprise signing level requirements or violated code integrity policy` is what should be seen
|
||||
- **Policy ID**: is the policy that is being violated, meaning that a rule in the policy is preventing the application from running
|
||||
|
||||
> [!NOTE]
|
||||
> **{82443e1e-8a39-4b4a-96a8-f40ddc00b9f3}** is the base policy, which is what restricts most third-party apps from running. If you see another policy ID, it's worth taking note of that.
|
||||
|
||||
Alternatively you can use `cidiag.exe /stop`, which copies all potentially relevant logs and policy files to a folder. The command also parses the critical events from the **CodeIntegrity** and **AppLocker** logs to a text file.
|
||||
|
||||
-->
|
||||
|
||||
## AppLocker policy validation
|
||||
|
||||
To query AppLocker policies and validate that they're configured correctly, follow these steps:
|
||||
|
||||
1. Open the **Local Security Policy** mmc console (`secpol.msc`)
|
||||
1. Select **Security Settings > Application Control Policies**
|
||||
1. Right-click **AppLocker** and select **Export Policy…**
|
||||
:::image type="content" source="images/applocker-export-policy.png" alt-text="Screenshot of the export of the AppLocker policies from the Local Security Policy mmc console." lightbox="images/applocker-export-policy.png" border="false":::
|
||||
1. For the policy that sets the Intune Management Extension as a Managed installer, *MICROSOFT.MANAGEMENT.SERVICES.INTUNEWINDOWSAGENT.EXE* should be nested under a RuleCollection section of Type *ManagedInstaller*
|
||||
:::image type="content" source="images/applocker-policy-validation.png" alt-text="Screenshot of the xml file generated by the get-applockerpolicy PowerShell cmdlet." lightbox="images/applocker-policy-validation.png":::
|
||||
1. For any policies you added to set other executables you want to be managed installers, look for the rules you defined nested under a RuleCollection section of Type *ManagedInstaller*
|
||||
|
||||
### AppLocker service
|
||||
|
||||
To verify that the AppLocker service is running, follow these steps:
|
||||
|
||||
1. Open the **Services** mmc console (`services.msc`)
|
||||
1. Verify that the service **Application Identity** has a status of **Running**
|
||||
|
||||
### AppLocker event log validation
|
||||
|
||||
1. Open the **Event Viewer** on a target device
|
||||
1. Expand **Applications and Services > Microsoft > Windows > AppLocker > MSI and Script**
|
||||
1. Check for **error events** with code **8040**, and reference [Understanding Application Control event IDs][WIN-2]
|
||||
|
||||
## Intune Management Extension
|
||||
|
||||
- [Collect diagnostics from a Windows device][MEM-1]
|
||||
- Logs can be collected from `%programdata%\Microsoft\IntuneManagementExtension\Logs`
|
||||
|
||||
[MEM-1]: /mem/intune/remote-actions/collect-diagnostics
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/event-tag-explanations#policy-activation-event-options
|
||||
[WIN-2]: /windows/security/threat-protection/windows-defender-application-control/event-id-explanations
|
172
education/windows/tutorial-deploy-apps-winse/validate-apps.md
Normal file
@ -0,0 +1,172 @@
|
||||
---
|
||||
title: Validate the applications deployed to Windows SE devices
|
||||
description: Learn how to validate the applications deployed to Windows SE devices via Intune.
|
||||
ms.date: 06/19/2023
|
||||
ms.topic: tutorial
|
||||
appliesto:
|
||||
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11 SE, version 22H2 and later</a>
|
||||
---
|
||||
|
||||
# Validate the applications deployed to Windows SE devices
|
||||
|
||||
:::row:::
|
||||
:::column span="":::
|
||||
<a href="deploy-apps.md"><img src="images/phase-1-off.svg" alt="Icon representing the first phase."/></a><br>
|
||||
[**Deploy an application via Microsoft Intune**](deploy-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="validate-apps.md"><img src="images/phase-2-on.svg" alt="Icon representing the second phase."/></a><br>
|
||||
[**Validate the application**](validate-apps.md)
|
||||
:::column-end:::
|
||||
:::column span="":::
|
||||
<a href="create-policies.md"><img src="images/phase-3-off.svg" alt="Icon representing the third phase."/></a><br>
|
||||
[**Create additional policies (optional)**](create-policies.md)
|
||||
:::column-end:::
|
||||
:::row-end:::
|
||||
|
||||
A fundamental step in deploying apps to Windows 11 SE devices is to validate that the apps work as expected.
|
||||
|
||||
Application validation consists of the following steps:
|
||||
|
||||
1. Wait for the application to install
|
||||
1. Verify that the app installed successfully
|
||||
1. Open the app and exercise all user workflows
|
||||
1. Inspect the app and take note of any potential problems
|
||||
|
||||
> [!NOTE]
|
||||
> Apps must be validated on a case-by-case basis. A successful installation doesn't mean that the app will run properly. A successful execution of the app, doesn't mean it will *always* run properly.
|
||||
|
||||
## Wait for the application to install
|
||||
|
||||
Application installation depends on two factors:
|
||||
|
||||
- When the managed installer policies are applied to the device. These policies are automatically applied to Windows SE devices when they are enrolled in Intune
|
||||
- When the apps are deployed to a device
|
||||
|
||||
> [!IMPORTANT]
|
||||
> The Intune management extension agent checks every hour (or on service or device restart) for any new Win32 app assignments.
|
||||
|
||||
If the Windows 11 SE base policy doesn't block the application that you're trying to deploy, the process to deploy the app to Windows SE devices should be consistent with non-SE devices.
|
||||
|
||||
## Check for installation
|
||||
|
||||
There are two ways to verify that an app installed successfully:
|
||||
|
||||
- Intune portal
|
||||
- On the device
|
||||
|
||||
Both options are worth checking. Installation in Intune can be used to check the installation status remotely and to ensure that the installation detection rules are configured correctly. Checking on the device can indicate if the app installed and if it runs properly.
|
||||
|
||||
### Check for installation from Intune
|
||||
|
||||
To check the installation status of an app from the Intune portal:
|
||||
|
||||
1. Sign in to the <a href="https://intune.microsoft.com/" target="_blank"><b>Microsoft Intune admin center</b></a>
|
||||
1. Select **App > All apps**
|
||||
1. Select the application you want to check
|
||||
1. From the **Overview** page, you can verify the overall installation status
|
||||
|
||||
:::image type="content" source="./images/intune-app-install-overview.png" alt-text="Screenshot of the Microsoft Intune admin center - App installation details." lightbox="./images/intune-app-install-overview.png":::
|
||||
|
||||
1. From the **Device install status** page, you can verify the installation status for each device, and the status code that indicates the cause of the failure
|
||||
|
||||
:::image type="content" source="./images/intune-app-install-status.png" alt-text="Screenshot of the Microsoft Intune admin center - App installation status for each device." lightbox="./images/intune-app-install-status.png":::
|
||||
|
||||
> [!NOTE]
|
||||
> A Win32 application may install correctly, but report to Intune as failed.\
|
||||
> A Win32 app may also fail to install, but report as installed to Intune.
|
||||
>
|
||||
> In both cases, the issue may be in the detection rules defined in Intune, which must be configured correctly to detect the installation of the app.
|
||||
|
||||
### Check for installation on the device
|
||||
|
||||
On a Windows SE device, open the **Settings** app and select **Apps** > **Installed apps**. You can see the list of installed apps and validate that your targeted app is listed.
|
||||
|
||||
Another way to validate that the app has installed is to check its installation directory. The path is usually `C:\Program Files` or `C:\Program Files (x86)`, but can vary from app to app.
|
||||
|
||||
Lastly, launch the app to ensure that it has installed correctly.
|
||||
|
||||
## Check for compatibility
|
||||
|
||||
Checking for compatibility often means to execute the app and verify its functionalities. Here are some things to try while testing the behavior of your app:
|
||||
|
||||
- Open the app
|
||||
- Test the core functionality and common user scenarios. Exercise a common workflow that a user would do with the app
|
||||
- Force an update of the app
|
||||
|
||||
Here are things to pay attention to:
|
||||
|
||||
- Know how the apps you deploy are updated, and if they offer controls for automatic updates
|
||||
- Dialogs may pop up during the app use, indicating that something is blocked
|
||||
- Multiple apps are installed, especially if one app appears to be a launcher/updater. For example, Adobe Photoshop includes the Adobe Creative Cloud launcher, which updates Photoshop and other apps
|
||||
- Any messages indicating that the app is doing pre-installation work or downloading more content
|
||||
- Logs in the Event Viewer
|
||||
|
||||
### Compatible apps
|
||||
|
||||
If an app appears to be functioning correctly without being blocked, it's likely compatible with managed installer installation.
|
||||
However, just because an app works initially doesn't mean it will *always* work. Self-updates or separate launchers/clients may update the apps.
|
||||
|
||||
### Semi-compatible apps
|
||||
|
||||
Semi-compatible apps may run without problems initially, but in the future they can be restricted to run after it self-updates or another installer/updater app installs over it.
|
||||
|
||||
### Incompatible apps
|
||||
|
||||
Incompatible apps may launch initially, but immediately begin to download more resources.\
|
||||
These apps are eventually blocked before any of their functionalities can be accessed. Or, these apps may not launch due to a dependent file blocked by the Windows 11 SE base policy.
|
||||
|
||||
### Visual error notifications
|
||||
|
||||
You may see a dialog indicating **This app won't run on your PC**. Check the indicated executable and verify that it matches the executable of the installed application.
|
||||
|
||||
:::image type="content" source="images/winse-app-block.png" alt-text="Screenshot of Windows SE - error window while opening an app.":::
|
||||
|
||||
### Event Viewer
|
||||
|
||||
More detail can be obtained when looking for events indicating blocked executables in the Event Viewer.\
|
||||
The event logs are:
|
||||
|
||||
- **CodeIntegrity > Operational**
|
||||
- **AppLocker > MSI and Script**
|
||||
|
||||
For more information, see the [Troubleshoot](troubleshoot.md) section.
|
||||
|
||||
## Known limitations
|
||||
|
||||
Not all apps are compatible with managed installers, even after installation.
|
||||
|
||||
To learn about known limitations with apps deployed via a managed installer, see [Known limitations with managed installer][WIN-1].
|
||||
|
||||
<!--
|
||||
> [!NOTE]
|
||||
> UWP LOB apps aren't installed using the Intune Management Extension and thus aren't tracked by the managed installer heuristic. LOB apps must be authorized separately in your WDAC policy.
|
||||
-->
|
||||
|
||||
## Section review
|
||||
|
||||
Before moving on to the next section, ensure that you've completed the following tasks:
|
||||
|
||||
> [!div class="checklist"]
|
||||
> - Verified any installation errors from Intune
|
||||
> - Verified the app installation on the device
|
||||
> - Checked for any errors when opening the app from the device
|
||||
> - Checked for any errors in the Event Viewer
|
||||
|
||||
## Next steps
|
||||
|
||||
Select one of the following options to learn the next steps:
|
||||
|
||||
<!--- If the apps don't work as expected, you must create and deploy WDAC or AppLocker policies to allow the apps to run-->
|
||||
- If the apps don't work as expected, you must create and deploy AppLocker policies to allow the apps to run
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Create policies>](create-policies.md)
|
||||
- If the applications you are deploying don't have any issues, you can skip to important considerations when deploying apps and policies
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: Important deployment considerations>](considerations.md)
|
||||
|
||||
[M365-1]: /microsoft-365/education/deploy/microsoft-store-for-education
|
||||
|
||||
[WIN-1]: /windows/security/threat-protection/windows-defender-application-control/configure-authorized-apps-deployed-with-a-managed-installer#known-limitations-with-managed-installer
|
||||
[WIN-2]: /windows/msix/
|
||||
[WIN-3]: /windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Configure applications with Microsoft Intune
|
||||
description: Learn how to configure applications with Microsoft Intune in preparation for device deployment.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 03/08/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -54,21 +54,10 @@ To assign applications to a group of users or devices:
|
||||
|
||||
## Considerations for Windows 11 SE
|
||||
|
||||
Windows 11 SE supports all web applications and a *curated list* of desktop applications.
|
||||
You can prepare and add a desktop app to Microsoft Intune as a Win32 app from the [approved app list][EDU-1].
|
||||
Windows 11 SE prevents the installation and execution of third party applications with a technology called **Windows Defender Application Control** (WDAC).
|
||||
WDAC applies an *allowlist* policy, which ensures that unwanted apps don't run or get installed. However, it also prevents IT admins from deploying apps to Windows 11 SE devices, unless they're included in the E Mode policy.
|
||||
|
||||
The process to add Win32 applications to Intune is described in the article [Add, assign, and monitor a Win32 app in Microsoft Intune][MEM-1].
|
||||
|
||||
> [!NOTE]
|
||||
> If the applications you need aren't included in the list, anyone in your school district can submit an application request at <a href="https://edusupport.microsoft.com/support?product_id=win11se" target="_blank"><u>Microsoft Education Support</u></a>.
|
||||
|
||||
> [!CAUTION]
|
||||
> If you assign an app to a device running **Windows 11 SE** and receive the **0x87D300D9** error code with a **Failed** state:
|
||||
> - Be sure the app is on the [<u>approved app list</u>][EDU-1]
|
||||
> - If you submitted a request to add your own app and it was approved, check that the app meets package requirements
|
||||
> - If the app is not approved, it will not run on Windows 11 SE. In this case, you will have to verify if the app can run in a web browser, such as a web app or PWA
|
||||
|
||||
________________________________________________________
|
||||
To learn more about which apps are supported in Windows 11 SE, and how to deploy them, see the tutorial [Deploy applications to Windows 11 SE with Intune][EDU-1].
|
||||
|
||||
## Next steps
|
||||
|
||||
@ -79,7 +68,7 @@ With the applications configured, you can now deploy students' and teachers' dev
|
||||
|
||||
<!-- Reference links in article -->
|
||||
|
||||
[EDU-1]: /education/windows/windows-11-se-overview
|
||||
[EDU-1]: ../tutorial-deploy-apps-winse/index.md
|
||||
|
||||
[MEM-1]: /mem/intune/apps/apps-win32-add
|
||||
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Enrollment in Intune with Windows Autopilot
|
||||
description: Learn how to join Azure AD and enroll in Intune using Windows Autopilot.
|
||||
ms.date: 08/31/2022
|
||||
ms.date: 03/08/2023
|
||||
ms.topic: tutorial
|
||||
---
|
||||
|
||||
@ -97,7 +97,7 @@ To deploy the ESP to devices, you need to create an ESP profile in Microsoft Int
|
||||
For more information, see [Set up the Enrollment Status Page][MEM-3].
|
||||
|
||||
> [!CAUTION]
|
||||
> When targeting an ESP to **Windows 11 SE** devices, only applications included in the [<u>approved app list</u>][EDU-1] should part of the ESP configuration.
|
||||
> The Enrollment Status Page (ESP) is compatible with Windows 11 SE. However, due to the E Mode policy, devices may not complete the enrollment. For more information, see [Enrollment Status Page][EDU-3].
|
||||
|
||||
### Autopilot end-user experience
|
||||
|
||||
@ -144,5 +144,6 @@ With the devices joined to Azure AD tenant and managed by Intune, you can use In
|
||||
|
||||
[EDU-1]: /education/windows/windows-11-se-overview
|
||||
[EDU-2]: /intune-education/windows-11-se-overview#windows-autopilot
|
||||
[EDU-3]: ../tutorial-deploy-apps-winse/considerations.md#enrollment-status-page
|
||||
|
||||
[SURF-1]: /surface/surface-autopilot-registration-support
|
@ -75,6 +75,7 @@ The following list shows the SurfaceHub configuration service provider nodes:
|
||||
- [Properties](#properties)
|
||||
- [AllowAutoProxyAuth](#propertiesallowautoproxyauth)
|
||||
- [AllowSessionResume](#propertiesallowsessionresume)
|
||||
- [DefaultAutomaticFraming](#propertiesdefaultautomaticframing)
|
||||
- [DefaultVolume](#propertiesdefaultvolume)
|
||||
- [DisableSigninSuggestions](#propertiesdisablesigninsuggestions)
|
||||
- [DoNotShowMyMeetingsAndFiles](#propertiesdonotshowmymeetingsandfiles)
|
||||
@ -1878,7 +1879,7 @@ The name of the domain admin group to add to the administrators group on the dev
|
||||
|
||||
<!-- Device-Management-GroupSid-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
The sid of the domain admin group to add to the administrators group on the device.
|
||||
The side of the domain admin group to add to the administrators group on the device.
|
||||
<!-- Device-Management-GroupSid-Description-End -->
|
||||
|
||||
<!-- Device-Management-GroupSid-Editable-Begin -->
|
||||
@ -2154,6 +2155,46 @@ Specifies whether to allow the ability to resume a session when the session time
|
||||
|
||||
<!-- Device-Properties-AllowSessionResume-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Begin -->
|
||||
### Properties/DefaultAutomaticFraming
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Applicability-Begin -->
|
||||
| Scope | Editions | Applicable OS |
|
||||
|:--|:--|:--|
|
||||
| ✅ Device <br> ❌ User | ✅ Pro <br> ✅ Enterprise <br> ✅ Education <br> ✅ Windows SE | ✅ Windows 10, version 20H2 [10.0.19042] and later |
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Applicability-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-OmaUri-Begin -->
|
||||
```Device
|
||||
./Vendor/MSFT/SurfaceHub/Properties/DefaultAutomaticFraming
|
||||
```
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-OmaUri-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Specifies whether the Surface Hub 2 Smart Camera feature to automatically zoom and keep users centered in the video is enabled.
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Description-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Editable-Begin -->
|
||||
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Editable-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-DFProperties-Begin -->
|
||||
**Description framework properties**:
|
||||
|
||||
| Property name | Property value |
|
||||
|:--|:--|
|
||||
| Format | `bool` |
|
||||
| Access Type | Get, Replace |
|
||||
| Default Value | true |
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-DFProperties-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Examples-Begin -->
|
||||
<!-- Add any examples for this policy here. Examples outside this section will get overwritten. -->
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-Examples-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultAutomaticFraming-End -->
|
||||
|
||||
<!-- Device-Properties-DefaultVolume-Begin -->
|
||||
### Properties/DefaultVolume
|
||||
|
||||
|
@ -8,7 +8,7 @@ ms.author: mstewart
|
||||
manager: aaroncz
|
||||
ms.topic: article
|
||||
ms.technology: itpro-updates
|
||||
ms.date: 06/16/2023
|
||||
ms.date: 06/22/2023
|
||||
---
|
||||
|
||||
# Deploy drivers and firmware updates with Windows Update for Business deployment service
|
||||
@ -81,7 +81,7 @@ To create a policy without any deployment settings, in the request body specify
|
||||
|
||||
{
|
||||
"audience": {
|
||||
"@odata.id": "d39ad1ce-0123-4567-89ab-cdef01234567"
|
||||
"id": "d39ad1ce-0123-4567-89ab-cdef01234567"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft 365 Apps for enterprise
|
||||
description: This article explains how Windows Autopatch manages Microsoft 365 Apps for enterprise updates
|
||||
ms.date: 03/10/2023
|
||||
ms.date: 06/23/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: how-to
|
||||
@ -41,9 +41,9 @@ For a device to be eligible for Microsoft 365 Apps for enterprise updates (both
|
||||
|
||||
## Update release schedule
|
||||
|
||||
All devices registered for Windows Autopatch will receive updates from the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). This practice provides your users with new features each month, and they'll receive just one update per month on a predictable release schedule. Updates are released on the second Tuesday of the month; these updates can include feature, security, and quality updates. These updates occur automatically and pulled directly from the Office Content Delivery Network (CDN).
|
||||
All devices registered for Windows Autopatch receive updates from the [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview). This practice provides your users with new features each month, and they receive just one update per month on a predictable release schedule. Updates are released on the second Tuesday of the month; these updates can include feature, security, and quality updates. These updates occur automatically and pulled directly from the Office Content Delivery Network (CDN).
|
||||
|
||||
Unlike Windows update, the Office CDN doesn't make the update available to all devices at once. Over the course of the release, the Office CDN gradually makes the update available to the whole population of devices. Windows Autopatch doesn't control the order in which updates are offered to devices across your estate. After the update downloads, there's a seven day [update deadline](/deployoffice/configure-update-settings-microsoft-365-apps) that specifies how long the user has until the user must apply the update.
|
||||
Unlike Windows update, the Office CDN doesn't make the update available to all devices at once. Over the course of the release, the Office CDN gradually makes the update available to the whole population of devices. Windows Autopatch doesn't control the order in which updates are offered to devices across your estate. After the update downloads, there's a seven day [update deadline](../references/windows-autopatch-microsoft-365-policies.md) that specifies how long the user has until the user must apply the update.
|
||||
|
||||
## Deployment rings
|
||||
|
||||
@ -81,7 +81,7 @@ Windows Autopatch doesn't allow you to pause or roll back an update in the Micro
|
||||
|
||||
## Allow or block Microsoft 365 App updates
|
||||
|
||||
For organizations seeking greater control, you can allow or block Microsoft 365 App updates for Windows Autopatch-enrolled devices. When the Microsoft 365 App update setting is set to **Block**, Windows Autopatch won't provide Microsoft 365 App updates on your behalf, and your organizations will have full control over these updates. For example, you can continue to receive updates from [channels](/deployoffice/overview-update-channels) other than the default [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview).
|
||||
For organizations seeking greater control, you can allow or block Microsoft 365 App updates for Windows Autopatch-enrolled devices. When the Microsoft 365 App update setting is set to **Block**, Windows Autopatch doesn't provide Microsoft 365 App updates on your behalf, and your organizations have full control over these updates. For example, you can continue to receive updates from [channels](/deployoffice/overview-update-channels) other than the default [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview).
|
||||
|
||||
**To allow or block Microsoft 365 App updates:**
|
||||
|
||||
@ -120,12 +120,12 @@ For organizations seeking greater control, you can allow or block Microsoft 365
|
||||
|
||||
[Servicing profiles](/deployoffice/admincenter/servicing-profile) is a feature in the [Microsoft 365 Apps admin center](https://config.office.com/) that provides controlled update management of monthly Office updates, including controls for user and device targeting, scheduling, rollback, and reporting.
|
||||
|
||||
A [service profile](/deployoffice/admincenter/servicing-profile#compatibility-with-other-management-tools) takes precedence over other policies, such as a Microsoft Intune policy or the Office Deployment Tool. The servicing profile will affect all devices that meet the [device eligibility requirements](#device-eligibility) regardless of existing management tools in your environment. So, if you're targeting a managed device with a servicing profile it will be ineligible for Microsoft 365 App update management.
|
||||
A [service profile](/deployoffice/admincenter/servicing-profile#compatibility-with-other-management-tools) takes precedence over other policies, such as a Microsoft Intune policy or the Office Deployment Tool. The servicing profile affects all devices that meet the [device eligibility requirements](#device-eligibility) regardless of existing management tools in your environment. So, if you're targeting a managed device with a servicing profile it's ineligible for Microsoft 365 App update management.
|
||||
|
||||
However, the device may still be eligible for other managed updates. For more information about a device's eligibility for a given [software update workload](windows-autopatch-update-management.md#software-update-workloads), see the Device eligibility section of each respective software update workload.
|
||||
|
||||
## Incidents and outages
|
||||
|
||||
If devices in your tenant aren't meeting the [service level objective](#service-level-objective) for Microsoft 365 Apps for enterprise updates, an incident will be raised. The Windows Autopatch Service Engineering Team will work to bring the devices back into compliance.
|
||||
If devices in your tenant aren't meeting the [service level objective](#service-level-objective) for Microsoft 365 Apps for enterprise updates, an incident is raised. The Windows Autopatch Service Engineering Team will work to bring the devices back into compliance.
|
||||
|
||||
If you're experiencing issues related to Microsoft 365 Apps for enterprise updates, [submit a support request](../operate/windows-autopatch-support-request.md).
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Changes made at tenant enrollment
|
||||
description: This reference article details the changes made to your tenant when enrolling into Windows Autopatch
|
||||
ms.date: 01/24/2023
|
||||
ms.date: 06/23/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: reference
|
||||
@ -108,7 +108,7 @@ The following groups target Windows Autopatch configurations to devices and mana
|
||||
|
||||
| Policy name | Policy description | Properties | Value |
|
||||
| ----- | ----- | ----- | ----- |
|
||||
| Windows Autopatch - Office Configuration | Sets Office Update Channel to the Monthly Enterprise servicing branch.<p>Assigned to:<ol><li>Modern Workplace Devices-Windows Autopatch-Test</li><li>Modern Workplace Devices-Windows Autopatch-First</li><li>Modern Workplace Devices-Windows Autopatch-Fast</li><li>Modern Workplace Devices-Windows Autopatch-Broad</li></ol>|<ol><li>Enable Automatic Updates</li><li>Hide option to enable or disable updates</li><li>Update Channel</li><li>Channel Name (Device)</li><li>Hide Update Notifications</li><li>Update Path</li></ol> |<ol><li>Enabled</li><li>Enabled</li><li>Enabled</li><li>Monthly Enterprise Channel</li><li>Disabled</li><li>Enabled</li></ol> |
|
||||
| Windows Autopatch - Office Configuration | Sets Office Update Channel to the Monthly Enterprise servicing branch.<p>Assigned to:<ol><li>Modern Workplace Devices-Windows Autopatch-Test</li><li>Modern Workplace Devices-Windows Autopatch-First</li><li>Modern Workplace Devices-Windows Autopatch-Fast</li><li>Modern Workplace Devices-Windows Autopatch-Broad</li></ol>|<ol><li>Enable Automatic Updates</li><li>Hide option to enable or disable updates</li><li>Update Channel</li><li>Channel Name (Device)</li><li>Hide Update Notifications</li><li>Update Path</li><li>Location for updates (Device)</li></ol> |<ol><li>Enabled</li><li>Enabled</li><li>Enabled</li><li>Monthly Enterprise Channel</li><li>Disabled</li><li>Enabled</li><li>`http://officecdn.microsoft.com/pr/55336b82-a18d-4dd6-b5f6-9e5095c314a6`</li></ol> |
|
||||
| Windows Autopatch - Office Update Configuration [Test] | Sets the Office update deadline<p>Assigned to:<ol><li>Modern Workplace Devices-Windows Autopatch-Test</li></ol> |<ol><li>Delay downloading and installing updates for Office</li><li>Update Deadline</li></ol>|<ol><li>Enabled; `Days(Device) == 0 days`</li></li><li>Enabled; `Update Deadline(Device) == 7 days`</li></ol>|
|
||||
| Windows Autopatch - Office Update Configuration [First] | Sets the Office update deadline<p>Assigned to:<ol><li>Modern Workplace Devices-Windows Autopatch-First</li></ol> |<ol><li>Delay downloading and installing updates for Office</li><li>Update Deadline</li></ol> | <ol><li>Enabled; `Days(Device) == 0 days`</li><li>Enabled; `Update Deadline(Device) == 7 days`</li></ol>|
|
||||
| Windows Autopatch - Office Update Configuration [Fast] | Sets the Office update deadline<p>Assigned to:<ol><li>Modern Workplace Devices-Windows Autopatch-Fast</li></ol>|<ol><li>Delay downloading and installing updates for Office</li><li>Update Deadline</li></ol>| <ol><li>Enabled; `Days(Device) == 3 days`</li><li>Enabled; `Update Deadline(Device) == 7 days`</li></ol>|
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: Microsoft 365 Apps for enterprise update policies
|
||||
description: This article explains the Microsoft 365 Apps for enterprise policies in Windows Autopatch
|
||||
ms.date: 07/11/2022
|
||||
ms.date: 06/23/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: conceptual
|
||||
@ -22,14 +22,14 @@ Deploying any of the following policies to a managed device makes that device in
|
||||
|
||||
### Update policies
|
||||
|
||||
Window Autopatch deploys mobile device management (MDM) policies to configure Microsoft 365 Apps and requires a specific configuration. If any [Microsoft 365 Apps update settings](/deployoffice/configure-update-settings-microsoft-365-apps) are deployed which conflict with our policies, then the device won't be eligible for management.
|
||||
Window Autopatch deploys mobile device management (MDM) policies to configure Microsoft 365 Apps and requires a specific configuration. If any [Microsoft 365 Apps update settings](/deployoffice/configure-update-settings-microsoft-365-apps) are deployed which conflict with our policies, then the device isn't eligible for management.
|
||||
|
||||
| Update setting | Value | Usage reason |
|
||||
| ----- | ----- | ----- |
|
||||
| Set updates to occur automatically | Enabled | Enable automatic updates |
|
||||
| Specify a location to look for updates | Blank | Don't use this setting since it overwrites the update branch |
|
||||
| Update channel | Monthly Enterprise | Supported channel for Windows Autopatch |
|
||||
| Specify the version of Microsoft 365 Apps to update to | Variable | Used to roll back to a previous version if an error occurs |
|
||||
| Set a deadline by when updates must be applied | 7 | Update deadline |
|
||||
| Hide update notifications from users | Turned off | Users should be notified when Microsoft 365 Apps are being updated |
|
||||
| Hide the option to turn on or off automatic Office updates | Turned on | Prevents users from disabling automatic updates |
|
||||
| Setting name | Test | First | Fast | Broad | Usage reason |
|
||||
| ----- | ----- | ----- | ----- | ----- | ----- |
|
||||
| Set updates to occur automatically | Turned on | Turned on | Turned on | Turned on | Turn on automatic updates |
|
||||
| Specify a location to look for updates | Blank | Blank | Blank | Blank | Don't use this setting because it overwrites the update branch |
|
||||
| Specify the version of Microsoft Apps to update to | Variable | Variable | Variable | Variable | Used to roll back to a previous version if an error occurs |
|
||||
| Set a deadline when updates must be applied | 7 | 7 | 7 | 7 | Updates must be applied by the specified deadline |
|
||||
| Sets the Office update deferral | 0 | 0 | 3 | 7| Delay downloading and installing updates for Office |
|
||||
| Hide update notifications from end users | Turned off | Turned off | Turned off | Turned off | End users should be notified when Microsoft 365 Apps are being updated |
|
||||
| Hide the option to turn on or off automatic Office updates | Turned on | Turned on | Turned on | Turned on | Prevents end users from turning off automatic updates |
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: What's new 2023
|
||||
description: This article lists the 2023 feature releases and any corresponding Message center post numbers.
|
||||
ms.date: 06/12/2023
|
||||
ms.date: 06/23/2023
|
||||
ms.prod: windows-client
|
||||
ms.technology: itpro-updates
|
||||
ms.topic: whats-new
|
||||
@ -21,9 +21,26 @@ This article lists new and updated feature releases, and service releases, with
|
||||
|
||||
Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
|
||||
## June 2023
|
||||
|
||||
### June feature releases or updates
|
||||
|
||||
| Article | Description |
|
||||
| ----- | ----- |
|
||||
| [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md) | Added Location for updates (Device) setting and value to the [Windows Autopatch - Office Configuration policy](../references/windows-autopatch-changes-to-tenant.md#microsoft-office-update-policies) |
|
||||
| [Microsoft 365 Apps for enterprise](../operate/windows-autopatch-microsoft-365-apps-enterprise.md) | Updated [deadline link](../operate/windows-autopatch-microsoft-365-apps-enterprise.md#behavior-during-updates) |
|
||||
| [Microsoft 365 Apps for enterprise update policies](../references/windows-autopatch-microsoft-365-policies.md) | Updated the [Update policies](../references/windows-autopatch-microsoft-365-policies.md#update-policies) section |
|
||||
|
||||
### June service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
| [MC602590](https://admin.microsoft.com/adminportal/home#/MessageCenter) | June 2023 Windows Autopatch baseline configuration update |
|
||||
| [MC591864](https://admin.microsoft.com/adminportal/home#/MessageCenter) | Updated ticket categories to reduce how long it takes to resolve support requests |
|
||||
|
||||
## May 2023
|
||||
|
||||
### May 2023 feature release
|
||||
### May feature releases or updates
|
||||
|
||||
| Article | Description |
|
||||
| ----- | ----- |
|
||||
@ -51,7 +68,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
| [Policy health and remediation](../operate/windows-autopatch-policy-health-and-remediation.md) | Add new Policy health and remediation feature. This feature is in public preview |
|
||||
| [Windows Autopatch groups public preview addendum](../references/windows-autopatch-groups-public-preview-addendum.md) | Added addendum for the Windows Autopatch groups public preview |
|
||||
|
||||
## May service release
|
||||
### May service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
@ -65,7 +82,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
| ----- | ----- |
|
||||
| [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md) | Updated the [Deployment rings for Windows 10 and later](../references/windows-autopatch-changes-to-tenant.md#deployment-rings-for-windows-10-and-later) section |
|
||||
|
||||
### April service release
|
||||
### April service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
@ -83,7 +100,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
| [Microsoft 365 Apps for enterprise](../operate/windows-autopatch-microsoft-365-apps-enterprise.md) | <ul><li>Added support for subscription versions of Microsoft Project and Visio desktop apps</li><li>Updated device eligibility criteria</li><li>Clarified update controls</li></ul> |
|
||||
| [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) | New [Customize Windows Update settings](../operate/windows-autopatch-windows-update.md) feature. This feature is in public preview<ul><li>[MC524715](https://admin.microsoft.com/adminportal/home#/MessageCenter)</li></ul>|
|
||||
|
||||
### March service release
|
||||
### March service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
@ -107,7 +124,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
| [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md) | Updated Feature update policies section with Windows Autopatch - DSS Policy [deployment ring] |
|
||||
| [Register your devices](../deploy/windows-autopatch-register-devices.md) |<ul><li>Updated the [Built-in roles required for registration](../deploy/windows-autopatch-register-devices.md#built-in-roles-required-for-device-registration) section</li><li>Added more information about assigning less-privileged user accounts</li></ul> |
|
||||
|
||||
### February service release
|
||||
### February service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
@ -126,7 +143,7 @@ Minor corrections such as typos, style, or formatting issues aren't listed.
|
||||
| [Submit a tenant enrollment support request](../prepare/windows-autopatch-enrollment-support-request.md) | Added the Submit a tenant enrollment support request section. You can submit a tenant enrollment support request through the Tenant enrollment tool if you're running into issues with enrollment |
|
||||
| [Submit a support request](../operate/windows-autopatch-support-request.md) | Added Premier and Unified support options section |
|
||||
|
||||
### January service release
|
||||
### January service releases
|
||||
|
||||
| Message center post number | Description |
|
||||
| ----- | ----- |
|
||||
|
@ -1,28 +0,0 @@
|
||||
- name: Windows
|
||||
href: index.yml
|
||||
items:
|
||||
- name: What's new
|
||||
expanded: true
|
||||
items:
|
||||
- name: What's new in Windows
|
||||
href: /windows/whats-new
|
||||
- name: Windows 11
|
||||
href: /windows/whats-new/windows-11
|
||||
- name: Release information
|
||||
href: /windows/release-health
|
||||
- name: Deployment
|
||||
href: /windows/deployment
|
||||
- name: Configuration
|
||||
href: /windows/configuration
|
||||
- name: Client management
|
||||
href: /windows/client-management
|
||||
- name: Application management
|
||||
href: /windows/application-management
|
||||
- name: Security
|
||||
href: /windows/security
|
||||
- name: Privacy
|
||||
href: /windows/privacy
|
||||
- name: Troubleshooting
|
||||
href: /windows/client-management/windows-10-support-solutions
|
||||
- name: Previous Windows versions
|
||||
href: /previous-versions/windows
|
@ -37,9 +37,13 @@ items:
|
||||
tocHref: /windows/security/
|
||||
topicHref: /windows/security/
|
||||
items:
|
||||
- name: Windows Hello for Business
|
||||
tocHref: /windows/security/identity-protection/hello-for-business/
|
||||
topicHref: /windows/security/identity-protection/hello-for-business/
|
||||
- name: Identity protection
|
||||
tocHref: /windows/security/identity-protection/
|
||||
topicHref: /windows/security/identity-protection/
|
||||
items:
|
||||
- name: Windows Hello for Business
|
||||
tocHref: /windows/security/identity-protection/hello-for-business/
|
||||
topicHref: /windows/security/identity-protection/hello-for-business
|
||||
- name: Security auditing
|
||||
tocHref: /windows/security/threat-protection/auditing/
|
||||
topicHref: /windows/security/threat-protection/auditing/security-auditing-overview
|
||||
@ -52,6 +56,13 @@ items:
|
||||
- name: Application Control for Windows
|
||||
tocHref: /windows/security/threat-protection/windows-defender-application-control/
|
||||
topicHref: /windows/security/threat-protection/windows-defender-application-control/
|
||||
- name: OS
|
||||
tocHref: /windows/security/operating-system-security/
|
||||
topicHref: /windows/security/operating-system-security/
|
||||
- name: Network
|
||||
tocHref: /windows/security/operating-system-security/network-security/
|
||||
topicHref: /windows/security/operating-system-security/network-security/
|
||||
- name: Windows Defender Firewall
|
||||
tocHref: /windows/security/threat-protection/windows-firewall/
|
||||
topicHref: /windows/security/threat-protection/windows-firewall/windows-firewall-with-advanced-security
|
||||
tocHref: /windows/security/operating-system-security/network-security/windows-firewall/
|
||||
topicHref: /windows/security/operating-system-security/network-security/windows-firewall/windows-firewall-with-advanced-security
|
||||
|
||||
|
Before Width: | Height: | Size: 85 KiB |
Before Width: | Height: | Size: 140 KiB |
Before Width: | Height: | Size: 334 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:#0070c0;}.cls-3,.cls-4{fill:none;stroke:#0070c0;stroke-miterlimit:10;}.cls-3{stroke-width:3.02px;}.cls-4{stroke-width:3px;}</style></defs><title>AccessProtection</title><g id="Icons"><polygon class="cls-2" points="52.5 18 36 18 36 1.5 39 1.5 39 15 52.5 15 52.5 18"/><path class="cls-2" d="M9,57V3H36.88L51,17.12V28.2a10.09,10.09,0,0,1,3,1.15V15.88L38.12,0H6V60H35V57Z"/><rect class="cls-3" x="39.5" y="43.5" width="19" height="15"/><path class="cls-4" d="M43.5,43.5V38a5.5,5.5,0,0,1,11,0v5.5"/></g></svg>
|
Before Width: | Height: | Size: 632 B |
Before Width: | Height: | Size: 206 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}</style></defs><title>ApplicationManagement</title><g id="Icons"><polyline class="cls-2" points="50.75 46.5 58.5 46.5 58.5 5.5 9.5 5.5 9.5 13.5"/><rect class="cls-2" x="1.5" y="13.5" width="49" height="41"/><line class="cls-2" x1="1.5" y1="21.5" x2="50.5" y2="21.5"/><rect class="cls-2" x="8.5" y="28.5" width="16" height="19"/><line class="cls-2" x1="30" y1="28.5" x2="45" y2="28.5"/><line class="cls-2" x1="30" y1="36.5" x2="45" y2="36.5"/><line class="cls-2" x1="30" y1="44.5" x2="40" y2="44.5"/></g></svg>
|
Before Width: | Height: | Size: 696 B |
Before Width: | Height: | Size: 322 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}.cls-3{fill:#0070c0;}</style></defs><title>ClientManagement</title><g id="Icons"><path class="cls-2" d="M1.5,48.5a2.09,2.09,0,0,0,2,2h53a2.09,2.09,0,0,0,2-2,5.1,5.1,0,0,0-.84-3l-6.16-7H8.5l-6.16,7A5.1,5.1,0,0,0,1.5,48.5Z"/><rect class="cls-2" x="8.5" y="9.5" width="43" height="29"/><circle class="cls-3" cx="30" cy="15" r="1.75"/></g></svg>
|
Before Width: | Height: | Size: 528 B |
Before Width: | Height: | Size: 742 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}</style></defs><title>Configuration</title><g id="Icons"><path class="cls-2" d="M50.63,30c0-.64,0-1.28-.1-1.91l7.25-4.52-3.59-8.66-8.32,1.92a20.87,20.87,0,0,0-2.7-2.7l1.92-8.32L36.43,2.22,31.91,9.47c-.63-.06-1.27-.09-1.91-.09s-1.28,0-1.91.09L23.57,2.22,14.91,5.81l1.92,8.32a20.87,20.87,0,0,0-2.7,2.7L5.81,14.91,2.22,23.57l7.25,4.52c-.06.63-.09,1.27-.09,1.91s0,1.28.09,1.91L2.22,36.43l3.59,8.66,8.32-1.92a20.87,20.87,0,0,0,2.7,2.7l-1.92,8.32,8.66,3.59,4.52-7.25c.63.06,1.27.1,1.91.1s1.28,0,1.91-.1l4.52,7.25,8.66-3.59-1.92-8.32a20.87,20.87,0,0,0,2.7-2.7l8.32,1.92,3.59-8.66-7.25-4.52C50.59,31.28,50.63,30.64,50.63,30ZM20.5,30A9.5,9.5,0,1,1,30,39.5,9.5,9.5,0,0,1,20.5,30Z"/></g></svg>
|
Before Width: | Height: | Size: 869 B |
Before Width: | Height: | Size: 3.3 KiB |
Before Width: | Height: | Size: 1.6 KiB |
Before Width: | Height: | Size: 3.7 KiB |
Before Width: | Height: | Size: 6.6 KiB |
Before Width: | Height: | Size: 324 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2,.cls-3{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}.cls-3{stroke-dasharray:2.4 2.4;}.cls-4{mask:url(#mask);}.cls-5{filter:url(#luminosity-noclip);}</style><filter id="luminosity-noclip" x="-3" y="3" width="66" height="54" filterUnits="userSpaceOnUse" color-interpolation-filters="sRGB"><feFlood flood-color="#fff" result="bg"/><feBlend in="SourceGraphic" in2="bg"/></filter><mask id="mask" x="-3" y="3" width="66" height="54" maskUnits="userSpaceOnUse"><g class="cls-5"><rect x="-3" y="18" width="24" height="24"/><rect x="39" y="3" width="24" height="24"/><rect x="39" y="33" width="24" height="24"/></g></mask></defs><title>Deployment</title><g id="Icons"><rect class="cls-2" x="1.5" y="22.5" width="15" height="15"/><polyline class="cls-2" points="58.5 21 58.5 22.5 57 22.5"/><line class="cls-3" x1="54.6" y1="22.5" x2="46.2" y2="22.5"/><polyline class="cls-2" points="45 22.5 43.5 22.5 43.5 21"/><line class="cls-3" x1="43.5" y1="18.6" x2="43.5" y2="10.2"/><polyline class="cls-2" points="43.5 9 43.5 7.5 45 7.5"/><line class="cls-3" x1="47.4" y1="7.5" x2="55.8" y2="7.5"/><polyline class="cls-2" points="57 7.5 58.5 7.5 58.5 9"/><line class="cls-3" x1="58.5" y1="11.4" x2="58.5" y2="19.8"/><polyline class="cls-2" points="58.5 51 58.5 52.5 57 52.5"/><line class="cls-3" x1="54.6" y1="52.5" x2="46.2" y2="52.5"/><polyline class="cls-2" points="45 52.5 43.5 52.5 43.5 51"/><line class="cls-3" x1="43.5" y1="48.6" x2="43.5" y2="40.2"/><polyline class="cls-2" points="43.5 39 43.5 37.5 45 37.5"/><line class="cls-3" x1="47.4" y1="37.5" x2="55.8" y2="37.5"/><polyline class="cls-2" points="57 37.5 58.5 37.5 58.5 39"/><line class="cls-3" x1="58.5" y1="41.4" x2="58.5" y2="49.8"/><g class="cls-4"><line class="cls-2" x1="16.5" y1="22.5" x2="43.5" y2="14.5"/><line class="cls-2" x1="16.5" y1="37.5" x2="43.5" y2="45.5"/></g></g></svg>
|
Before Width: | Height: | Size: 2.0 KiB |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:#0070c0;}.cls-3{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}</style></defs><title>DeviceSecurity</title><g id="Icons"><path class="cls-2" d="M29.89,49H3.5a.62.62,0,0,1-.5-.5,3.88,3.88,0,0,1,.47-2L9.18,40H28V37H10V11H50V26.7a11.62,11.62,0,0,1,3,1.42h0V8H7V37.93l-5.82,6.6A6.62,6.62,0,0,0,0,48.5,3.6,3.6,0,0,0,3.5,52H31.64A22.74,22.74,0,0,1,29.89,49Z"/><path class="cls-3" d="M58.5,33.5V41c0,6.25-4.65,12.38-12.14,16.31l-.86.45-.86-.45C37.15,53.38,32.5,47.25,32.5,41V33.5h2a11.13,11.13,0,0,0,6-1.66,9.85,9.85,0,0,1,10,0,11.17,11.17,0,0,0,6,1.62Z"/></g></svg>
|
Before Width: | Height: | Size: 704 B |
Before Width: | Height: | Size: 553 B |
Before Width: | Height: | Size: 388 KiB |
Before Width: | Height: | Size: 378 KiB |
Before Width: | Height: | Size: 429 KiB |
Before Width: | Height: | Size: 27 KiB |
Before Width: | Height: | Size: 6.1 KiB |
Before Width: | Height: | Size: 6.6 KiB |
Before Width: | Height: | Size: 134 KiB |
Before Width: | Height: | Size: 27 KiB |
Before Width: | Height: | Size: 406 KiB |
Before Width: | Height: | Size: 52 KiB |
Before Width: | Height: | Size: 280 KiB |
Before Width: | Height: | Size: 52 KiB |
Before Width: | Height: | Size: 37 KiB |
Before Width: | Height: | Size: 863 B |
Before Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 745 B |
Before Width: | Height: | Size: 22 KiB |
Before Width: | Height: | Size: 786 B |
Before Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 3.7 KiB |
Before Width: | Height: | Size: 25 KiB |
Before Width: | Height: | Size: 1010 B |
Before Width: | Height: | Size: 25 KiB |
Before Width: | Height: | Size: 610 B |
Before Width: | Height: | Size: 21 KiB |
Before Width: | Height: | Size: 896 KiB |
Before Width: | Height: | Size: 2.1 KiB |
Before Width: | Height: | Size: 2.2 KiB |
Before Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 1.1 KiB |
Before Width: | Height: | Size: 5.3 KiB |
Before Width: | Height: | Size: 24 KiB |
Before Width: | Height: | Size: 941 B |
Before Width: | Height: | Size: 23 KiB |
Before Width: | Height: | Size: 7.8 KiB |
Before Width: | Height: | Size: 8.7 KiB |
Before Width: | Height: | Size: 739 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2{fill:#0070c0;}.cls-3{fill:none;stroke:#0070c0;stroke-miterlimit:10;stroke-width:3px;}</style></defs><title>ThreatProtection</title><g id="Icons"><rect class="cls-2" x="28" y="41" width="3" height="3"/><rect class="cls-2" x="28" y="11" width="3" height="26"/><path class="cls-3" d="M55.5,21.5c0,13.78-9.93,26.31-26,35.34-16.07-9-26-21.56-26-35.34V9.5A30.48,30.48,0,0,0,20.21,4.29,15.89,15.89,0,0,1,29.5,1.5a15.89,15.89,0,0,1,9.29,2.79A30.48,30.48,0,0,0,55.5,9.5Z"/></g></svg>
|
Before Width: | Height: | Size: 597 B |
Before Width: | Height: | Size: 3.9 KiB |
Before Width: | Height: | Size: 286 B |
@ -1 +0,0 @@
|
||||
<svg xmlns="http://www.w3.org/2000/svg" width="60" height="60" viewBox="0 0 60 60"><defs><style>.cls-1{opacity:0.5;}.cls-2,.cls-3{fill:none;stroke:#107c10;stroke-miterlimit:10;stroke-width:3px;}.cls-3{stroke-linecap:round;}</style></defs><title>WhatsNew</title><g id="Icons"><path class="cls-2" d="M58.5,41.5a6,6,0,0,1-6,6H7.5a6,6,0,0,1-6-6V9.5h49v7h8Z"/><line class="cls-3" x1="50.5" y1="16.5" x2="50.5" y2="39.5"/><line class="cls-2" x1="45" y1="16.5" x2="7" y2="16.5"/><line class="cls-2" x1="45" y1="40.5" x2="29" y2="40.5"/><line class="cls-2" x1="45" y1="32.5" x2="29" y2="32.5"/><line class="cls-2" x1="45" y1="24.5" x2="29" y2="24.5"/><rect class="cls-2" x="8.5" y="24.5" width="15" height="16"/></g></svg>
|
Before Width: | Height: | Size: 714 B |
@ -1,96 +0,0 @@
|
||||
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
|
||||
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd">
|
||||
<!-- Generated by Microsoft Visio, SVG Export winlogo.svg Page-1 -->
|
||||
<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:ev="http://www.w3.org/2001/xml-events"
|
||||
xmlns:v="http://schemas.microsoft.com/visio/2003/SVGExtensions/" width="6.06944in" height="6.09028in"
|
||||
viewBox="0 0 437 438.5" xml:space="preserve" color-interpolation-filters="sRGB" class="st2">
|
||||
<v:documentProperties v:langID="1033" v:viewMarkup="false"/>
|
||||
|
||||
<style type="text/css">
|
||||
<![CDATA[
|
||||
.st1 {fill:none;stroke:none;stroke-width:0.25}
|
||||
.st2 {fill:none;fill-rule:evenodd;font-size:12px;overflow:visible;stroke-linecap:square;stroke-miterlimit:3}
|
||||
]]>
|
||||
</style>
|
||||
|
||||
<g v:mID="0" v:index="1" v:groupContext="foregroundPage">
|
||||
<title>Page-1</title>
|
||||
<v:pageProperties v:drawingScale="1" v:pageScale="1" v:drawingUnits="0" v:shadowOffsetX="9" v:shadowOffsetY="-9"/>
|
||||
<g id="shape1-1" v:mID="1" v:groupContext="shape" transform="translate(0.25,-0.25)">
|
||||
<title>Sheet.1</title>
|
||||
<rect v:rectContext="foreign" x="0" y="0.500011" width="436.5" height="438" class="st1"/>
|
||||
<image x="0" y="0.500011" width="436.5" height="438" preserveAspectRatio="none" xlink:href="data:image/png;base64,iV
|
||||
BORw0KGgoAAAANSUhEUgAAAkYAAAJICAYAAACE1yscAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAAFiUAABYlAU
|
||||
lSJPAAABTLSURBVHhe7dYxTiBQDENBjs1B9z6shL4r3EREaZgnTe/SH1+SJEn6zjGSJEl6OUaSJEkvx0iSJOnlGEmSJL1+HKOPz38Av3
|
||||
Jd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bAD
|
||||
CRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2
|
||||
DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQ
|
||||
PARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEco
|
||||
yAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117
|
||||
UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8
|
||||
kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l
|
||||
3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AE
|
||||
wkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCF
|
||||
h3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2w
|
||||
AwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHC
|
||||
Ng3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW
|
||||
0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARH
|
||||
KMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdd
|
||||
e1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNAB
|
||||
PJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAt
|
||||
Zd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNg
|
||||
BMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxw
|
||||
hYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3Xd
|
||||
sAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkR
|
||||
wjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3X
|
||||
VtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwE
|
||||
RyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgH
|
||||
XXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQ
|
||||
ATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQ
|
||||
LWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1z
|
||||
YATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJM
|
||||
cIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd1
|
||||
3bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJ
|
||||
EcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN
|
||||
11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8
|
||||
BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjI
|
||||
B117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BE+nGMJEmS/mqOkSRJ0ssxkiRJejlGkiRJL8dIkiTp5RhJkiS9HCNJkqSXYy
|
||||
RJkvRyjCRJkl6OkSRJ0ssxkiRJejlGkiRJL8dIkiTp5RhJkiS9HCNJkqSXYyRJkvRyjCRJkl6OkSRJ0ssxkiRJejlGkiRJL8dIkiTp5R
|
||||
hJkiS9HCNJkqSXYyRJkvRyjCRJkl6OkSRJ0ssxkiRJejlGkiRJrx/H6OPzH8CvXNc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQ
|
||||
ATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQ
|
||||
LWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1z
|
||||
YATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJM
|
||||
cIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd1
|
||||
3bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJ
|
||||
EcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN
|
||||
11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8
|
||||
BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjI
|
||||
B117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ
|
||||
0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyT
|
||||
EC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXd
|
||||
c2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATC
|
||||
THCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWH
|
||||
dd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bAD
|
||||
CRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2
|
||||
DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQ
|
||||
PARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEco
|
||||
yAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117
|
||||
UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8
|
||||
kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l
|
||||
3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AE
|
||||
wkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCF
|
||||
h3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2w
|
||||
AwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHC
|
||||
Ng3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW
|
||||
0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARH
|
||||
KMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdd
|
||||
e1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNAB
|
||||
PJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAt
|
||||
Zd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxwhYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNg
|
||||
BMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3XdsAMJEcI2DddW0DwERyjIB117UNABPJMQLWXdc2AEwkxw
|
||||
hYd13bADCRHCNg3XVtA8BEcoyAdde1DQATyTEC1l3XNgBMJMcIWHdd2wAwkRwjYN11bQPARHKMgHXXtQ0AE8kxAtZd1zYATCTHCFh3Xd
|
||||
sAMJF+HCNJkqS/mmMkSZL0cowkSZK++/r6DwqOoucNyrLNAAAAAElFTkSuQmCC"/>
|
||||
<rect v:rectContext="foreign" x="0" y="0.500011" width="436.5" height="438" class="st1"/>
|
||||
</g>
|
||||
</g>
|
||||
</svg>
|
Before Width: | Height: | Size: 9.0 KiB |
Before Width: | Height: | Size: 406 KiB |
@ -1,255 +1,168 @@
|
||||
### YamlMime:Hub
|
||||
|
||||
title: Windows client documentation for IT Pros # < 60 chars
|
||||
summary: Evaluate, plan, deploy, secure, and manage devices running Windows 10 and Windows 11. # < 160 chars
|
||||
# brand: aspnet | azure | dotnet | dynamics | m365 | ms-graph | office | power-apps | power-automate | power-bi | power-platform | power-virtual-agents | sql | sql-server | vs | visual-studio | windows | xamarin
|
||||
title: Windows client documentation for IT Pros
|
||||
summary: Learn how to deploy, secure, and manage Windows clients for your organization.
|
||||
brand: windows
|
||||
|
||||
metadata:
|
||||
title: Windows client documentation for IT Pros # Required; page title displayed in search results. Include the brand. < 60 chars.
|
||||
description: Evaluate, plan, deploy, secure, and manage devices running Windows 10 and Windows 11. # Required; article description that is displayed in search results. < 160 chars.
|
||||
title: Windows client documentation
|
||||
description: Learn how to deploy, secure, and manage Windows clients for your organization.
|
||||
ms.topic: hub-page
|
||||
ms.prod: windows-client
|
||||
ms.collection:
|
||||
- highpri
|
||||
- tier1
|
||||
author: aczechowski #Required; your GitHub user alias, with correct capitalization.
|
||||
ms.author: aaroncz #Required; microsoft alias of author; optional team alias.
|
||||
ms.date: 10/01/2021 #Required; mm/dd/yyyy format.
|
||||
localization_priority: medium
|
||||
author: paolomatarazzo
|
||||
ms.author: paoloma
|
||||
manager: aaroncz
|
||||
ms.date: 06/20/2023
|
||||
|
||||
# highlightedContent section (optional)
|
||||
# Maximum of 8 items
|
||||
highlightedContent:
|
||||
# itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
|
||||
items:
|
||||
# Card
|
||||
- title: Become a Windows Insider
|
||||
itemType: overview
|
||||
url: https://insider.windows.com
|
||||
# Card
|
||||
- title: See what's new in Windows release health
|
||||
itemType: overview
|
||||
url: /windows/release-health/
|
||||
# Card
|
||||
- title: Empower your hybrid workforce
|
||||
itemType: overview
|
||||
url: https://www.microsoft.com/microsoft-365/blog/2021/10/04/empower-your-hybrid-workforce-today-with-windows-11/
|
||||
- title: Get started with Windows 11
|
||||
itemType: get-started
|
||||
url: /windows/whats-new/windows-11-overview
|
||||
- title: Windows 11, version 22H2
|
||||
itemType: whats-new
|
||||
url: /windows/whats-new/whats-new-windows-11-version-22H2
|
||||
- title: Windows 11, version 22H2 group policy settings reference
|
||||
itemType: download
|
||||
url: https://www.microsoft.com/en-us/download/details.aspx?id=104594
|
||||
- title: Windows release health
|
||||
itemType: whats-new
|
||||
url: /windows-insider/get-started
|
||||
- title: Windows commercial licensing
|
||||
itemType: overview
|
||||
url: /windows/whats-new/windows-licensing
|
||||
- title: Windows 365 documentation
|
||||
itemType: overview
|
||||
url: /windows-365
|
||||
- title: Explore all Windows trainings and learning paths for IT pros
|
||||
itemType: learn
|
||||
url: https://learn.microsoft.com/en-us/training/browse/?products=windows&roles=administrator
|
||||
- title: Enroll Windows client devices in Microsoft Intune
|
||||
itemType: how-to-guide
|
||||
url: /mem/intune/fundamentals/deployment-guide-enrollment-windows
|
||||
|
||||
# productDirectory section (optional)
|
||||
productDirectory:
|
||||
title: Get to know Windows 11 # < 60 chars (optional)
|
||||
summary: Learn more about what's new, what's updated, and what you get in Windows 11 # < 160 chars (optional)
|
||||
title: Get started
|
||||
items:
|
||||
# Card
|
||||
- title: Windows 11 overview
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: Get more information about features and improvements that are important to admins
|
||||
url: /windows/whats-new/windows-11-overview
|
||||
- title: Windows 11 requirements
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: See the system requirements for Windows 11, including running Windows 11 on a virtual machine
|
||||
url: /windows/whats-new/windows-11-requirements
|
||||
- title: Learn more about Windows 11 Enterprise
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: Get more information on the features, security, and licensing plans designed for organizations
|
||||
url: https://www.microsoft.com/microsoft-365/windows/windows-11-enterprise
|
||||
- title: FAQ - Upgrade to Windows 11
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: See some common questions and answers when upgrading to Windows 11
|
||||
url: https://support.microsoft.com/windows/upgrade-to-windows-11-faq-fb6206a2-1a0f-448a-80f1-8668ee5b2bf9
|
||||
- title: Windows 11 chip to cloud protection - Security challenges of hybrid work
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: Blog from the Microsoft Windows Security Team
|
||||
url: https://www.microsoft.com/security/blog/2021/10/04/windows-11-offers-chip-to-cloud-protection-to-meet-the-new-security-challenges-of-hybrid-work
|
||||
- title: Trusted Platform Module (TPM)
|
||||
imageSrc: /windows/resources/images/winlogo.svg
|
||||
summary: Learn more about TPM, and why it's a good thing
|
||||
url: /windows/security/information-protection/tpm/trusted-platform-module-overview
|
||||
|
||||
# conceptualContent section (optional)
|
||||
conceptualContent:
|
||||
# Supports up to 3 sections
|
||||
# itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new
|
||||
|
||||
title: Windows client resources and documentation for IT Pros
|
||||
summary: Plan, deploy, secure, and manage devices running Windows 10 and Windows 11.
|
||||
items:
|
||||
# card
|
||||
- title: Overview
|
||||
- title: Learn how to deploy Windows
|
||||
imageSrc: /media/common/i_deploy.svg
|
||||
links:
|
||||
- url: /windows/whats-new/windows-11-overview
|
||||
itemType: overview
|
||||
text: Windows 11 overview
|
||||
- url: /windows/whats-new/windows-11-plan
|
||||
itemType: overview
|
||||
text: Plan for Windows 11
|
||||
- url: /windows/whats-new/windows-11-prepare
|
||||
itemType: overview
|
||||
text: Prepare for Windows 11
|
||||
- url: /windows/whats-new/whats-new-windows-10-version-21H1
|
||||
itemType: overview
|
||||
text: What's new in Windows 10, version 21H1
|
||||
- url: /windows/release-health/release-information
|
||||
itemType: overview
|
||||
text: Windows release information
|
||||
|
||||
# Card (optional)
|
||||
- title: Configuration
|
||||
links:
|
||||
- url: /windows/configuration/index
|
||||
itemType: overview
|
||||
text: Configure Windows
|
||||
- url: /windows/configuration/provisioning-packages/provisioning-packages
|
||||
itemType: how-to-guide
|
||||
text: Use Provisioning packages to configure new devices
|
||||
- url: /windows/configuration/windows-accessibility-for-itpros
|
||||
itemType: overview
|
||||
text: Accessibility information for IT Pros
|
||||
- url: /windows/configuration/customize-start-menu-layout-windows-11
|
||||
itemType: how-to-guide
|
||||
text: Customize the Start menu layout
|
||||
- url: /windows/configuration/stop-employees-from-using-microsoft-store
|
||||
itemType: how-to-guide
|
||||
text: Control access to Microsoft Store
|
||||
- url: /windows/configuration/set-up-shared-or-guest-pc
|
||||
itemType: how-to-guide
|
||||
text: Set up a shared or guest PC
|
||||
|
||||
# Card (optional)
|
||||
- title: Deployment
|
||||
links:
|
||||
- url: /windows/deployment/index
|
||||
itemType: deploy
|
||||
text: Deploy and update Windows
|
||||
- url: /windows/deployment/windows-10-deployment-scenarios
|
||||
itemType: deploy
|
||||
text: Windows deployment scenarios
|
||||
- url: /windows/deployment/update/create-deployment-plan
|
||||
itemType: deploy
|
||||
text: Create a deployment plan
|
||||
- url: /windows/deployment/update/prepare-deploy-windows
|
||||
itemType: deploy
|
||||
text: Prepare to deploy Windows client
|
||||
- url: /mem/autopilot/
|
||||
text: Windows Autopilot overview
|
||||
- url: /mem/autopilot/tutorial/autopilot-scenarios
|
||||
text: "Tutorial: Windows Autopilot scenarios"
|
||||
- url: /windows/deployment/do/
|
||||
text: Delivery optimization
|
||||
- url: /windows/deployment/update/deployment-service-overview
|
||||
text: Windows Update for Business deployment service
|
||||
- url: /windows/deployment/windows-autopatch
|
||||
itemType: deploy
|
||||
text: Windows Autopatch
|
||||
|
||||
# Card
|
||||
- title: App management
|
||||
links:
|
||||
- url: /windows/application-management/index
|
||||
itemType: overview
|
||||
text: Windows application management
|
||||
- url: /windows/application-management/apps-in-windows-10
|
||||
itemType: overview
|
||||
text: Learn more about the different apps types for Windows
|
||||
- url: /windows/application-management/private-app-repository-mdm-company-portal-windows-11
|
||||
itemType: how-to-guide
|
||||
text: Use the private app repo on Windows 11
|
||||
- url: /windows/application-management/remove-provisioned-apps-during-update
|
||||
itemType: how-to-guide
|
||||
text: Keep removed apps from returning during an update
|
||||
- url: https://blogs.windows.com/windowsdeveloper/2021/10/04/developing-for-windows-11/
|
||||
itemType: overview
|
||||
text: Blog - Develop apps for Windows 11
|
||||
text: Windows Autopatch overview
|
||||
- url: /windows/deployment
|
||||
text: Learn more about Windows deployment >
|
||||
|
||||
# Card
|
||||
- title: Client management
|
||||
- title: Learn how to secure Windows
|
||||
imageSrc: /media/common/i_security-management.svg
|
||||
links:
|
||||
- url: /windows/security/threat-protection/windows-security-configuration-framework/windows-security-baselines
|
||||
text: Windows security baselines
|
||||
- url: /windows/security/identity-protection/credential-guard/credential-guard-how-it-works
|
||||
text: Windows Defender Credential Guard
|
||||
- url: /windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust
|
||||
text: Windows Hello for Business cloud Kerberos trust
|
||||
- url: /education/windows/tutorial-school-deployment/windows/security/threat-protection/windows-defender-application-control/
|
||||
text: Windows Defender Application Control (WDAC)
|
||||
- url: /windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview
|
||||
text: Microsoft Defender Application Guard
|
||||
- url: /windows/security
|
||||
text: Learn more about Windows security >
|
||||
|
||||
- url: /windows/client-management/index
|
||||
itemType: overview
|
||||
text: Windows client management
|
||||
- title: Learn about privacy in Windows
|
||||
imageSrc: /media/common/i_lock.svg
|
||||
links:
|
||||
- url: /windows/privacy/required-diagnostic-events-fields-windows-11-22h2
|
||||
text: Windows 11 required diagnostic data
|
||||
- url: /windows/privacy/configure-windows-diagnostic-data-in-your-organization
|
||||
text: Configure Windows diagnostic data in your organization
|
||||
- url: /windows/privacy/diagnostic-data-viewer-overview
|
||||
text: Diagnostic Data Viewer
|
||||
- url: /windows/privacy/manage-connections-from-windows-operating-system-components-to-microsoft-services
|
||||
text: Manage connections to Microsoft services
|
||||
- url: /windows/privacy/windows-10-and-privacy-compliance
|
||||
text: Windows privacy compliance guide
|
||||
- url: /windows/privacy
|
||||
text: Learn more about privacy in Windows >
|
||||
|
||||
- title: Learn how to manage Windows
|
||||
imageSrc: /media/common/i_management.svg
|
||||
links:
|
||||
- url: /windows/client-management/mobile-device-enrollment
|
||||
text: MDM enrollment
|
||||
- url: /windows/client-management/mdm/
|
||||
text: Configuration Service Provider (CSP)
|
||||
- url: /windows/client-management/administrative-tools-in-windows-10
|
||||
itemType: overview
|
||||
text: Administrative tools
|
||||
- url: /windows/client-management/mandatory-user-profile
|
||||
itemType: how-to-guide
|
||||
text: Create mandatory user profiles
|
||||
- url: /windows/client-management/new-policies-for-windows-10
|
||||
itemType: overview
|
||||
text: New policies for Windows 10
|
||||
- url: /windows/client-management/mdm/configuration-service-provider-reference
|
||||
itemType: reference
|
||||
text: Configuration service provider reference
|
||||
text: Windows administrative tools
|
||||
- url: /windows/client-management/client-tools/quick-assist
|
||||
text: Use Quick Assist to help users
|
||||
- url: /windows/application-management/index
|
||||
text: Learn more about application management >
|
||||
- url: /windows/client-management
|
||||
text: Learn more about Windows management >
|
||||
|
||||
# Card (optional)
|
||||
- title: Security and Privacy
|
||||
- title: Learn how to configure Windows
|
||||
imageSrc: /media/common/i_config-tools.svg
|
||||
links:
|
||||
- url: /windows/security/index
|
||||
itemType: overview
|
||||
text: Windows Enterprise Security
|
||||
- url: /windows/security/hardware
|
||||
itemType: overview
|
||||
text: Hardware security
|
||||
- url: /windows/security/operating-system
|
||||
itemType: overview
|
||||
text: Operating system security
|
||||
- url: /windows/security/apps
|
||||
itemType: overview
|
||||
text: Application security
|
||||
- url: /windows/security/identity
|
||||
itemType: overview
|
||||
text: Identity and privacy
|
||||
- url: /windows/security/cloud
|
||||
itemType: overview
|
||||
text: Cloud services
|
||||
- url: /windows/privacy/index
|
||||
itemType: overview
|
||||
text: Windows Privacy
|
||||
- url: /windows/configuration/windows-accessibility-for-itpros
|
||||
text: Accessibility information
|
||||
- url: /windows/configuration/provisioning-packages/provisioning-packages
|
||||
text: Use Provisioning packages to configure new devices
|
||||
- url: /windows/configuration/customize-start-menu-layout-windows-11
|
||||
text: Customize the Start menu layout
|
||||
- url: /windows/configuration/set-up-shared-or-guest-pc
|
||||
text: Set up a shared or guest PC
|
||||
- url: /windows/configuration/kiosk-methods
|
||||
text: Configure kiosks and digital signs
|
||||
- url: /windows/configuration
|
||||
text: Learn more about Windows configuration >
|
||||
|
||||
- title: Learn about Windows for Education
|
||||
imageSrc: /media/common/i_advanced.svg
|
||||
links:
|
||||
- url: /education/windows/windows-11-se-overview
|
||||
text: Windows 11 SE Overview
|
||||
- url: /education/windows/federated-sign-in
|
||||
text: Configure federated sign-in for Windows devices
|
||||
- url: /education/windows/get-minecraft-for-education
|
||||
text: Get and deploy Minecraft Education
|
||||
- url: /education/windows/tutorial-school-deployment/
|
||||
text: "Tutorial: deploy and manage Windows devices in a school"
|
||||
- url: /education/windows/tutorial-deploy-apps-winse/
|
||||
text: "Tutorial: deploy applications to Windows 11 SE"
|
||||
- url: /education/Windows
|
||||
text: Learn more about Windows for Education >
|
||||
|
||||
# additionalContent section (optional)
|
||||
# Card with summary style
|
||||
additionalContent:
|
||||
# Supports up to 4 subsections
|
||||
sections:
|
||||
- title: More Windows resources # < 60 chars (optional)
|
||||
- title: More Windows resources
|
||||
items:
|
||||
# Card
|
||||
- title: Windows product site
|
||||
summary: Find out how Windows enables your business to do more
|
||||
url: https://www.microsoft.com/microsoft-365/windows
|
||||
- title: "Windows 11: A new era for the PC begins today"
|
||||
summary: Blog article that describes how Windows 11 empowers you to produce and inspires you to create
|
||||
url: https://blogs.windows.com/windowsexperience/2021/10/04/windows-11-a-new-era-for-the-pc-begins-today/
|
||||
- title: Windows IT Pro blogs
|
||||
summary: The latest Windows blog articles for the IT Pro
|
||||
url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog
|
||||
- title: Windows blogs
|
||||
summary: Keep up with the latest news about Windows
|
||||
url: https://blogs.windows.com/
|
||||
- title: Participate in the Tech Community
|
||||
summary: Learn how to be part of the Windows Tech Community
|
||||
url: https://techcommunity.microsoft.com/t5/windows/ct-p/Windows10
|
||||
- title: Ask the community
|
||||
summary: Get help, and help others
|
||||
url: https://answers.microsoft.com/windows/forum
|
||||
|
||||
- title: Other resources
|
||||
items:
|
||||
- title: Microsoft endpoint management with Intune
|
||||
- title: Windows hardware
|
||||
links:
|
||||
- text: Intune is a family of products
|
||||
url: /mem/endpoint-manager-overview
|
||||
- text: What is Microsoft Intune?
|
||||
url: /mem/intune/fundamentals/what-is-intune
|
||||
- text: Microsoft Intune services simplify upgrades to Windows 11
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/endpoint-manager-simplifies-upgrades-to-windows-11/ba-p/2771886
|
||||
- text: Understanding readiness for Windows 11 with Microsoft Intune services
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/understanding-readiness-for-windows-11-with-microsoft-endpoint/ba-p/2770866
|
||||
- text: Microsoft endpoint management blog
|
||||
url: https://aka.ms/memblog
|
||||
- title: Windows 365
|
||||
links:
|
||||
- text: Windows 365 documentation
|
||||
url: /windows-365
|
||||
- text: What is Windows 365
|
||||
url: /windows-365/overview
|
||||
- text: Windows 365 Enterprise now supports Windows 11
|
||||
url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-365-enterprise-now-supports-windows-11/ba-p/2810334
|
||||
- text: Windows 365 blog
|
||||
url: https://www.microsoft.com/microsoft-365/blog/
|
||||
- text: Windows hardware developer documentation
|
||||
url: /windows-hardware/drivers/
|
||||
- text: Get started with building Windows devices
|
||||
url: /windows-hardware/get-started
|
||||
- text: Download the Windows Driver Kit
|
||||
url: /windows-hardware/drivers/download-the-wdk
|
||||
- text: Device and driver installation
|
||||
url: /windows-hardware/drivers/install/overview-of-device-and-driver-installation
|
||||
- text: Windows Driver Frameworks
|
||||
url: /windows-hardware/drivers/wdf/
|
||||
- text: Kernel-mode driver architecture design guide
|
||||
url: /windows-hardware/drivers/kernel/
|
||||
|
||||
- title: Windows Server
|
||||
links:
|
||||
@ -257,7 +170,27 @@ additionalContent:
|
||||
url: /windows-server
|
||||
- text: What's new in Windows Server 2022?
|
||||
url: /windows-server/get-started/whats-new-in-windows-server-2022
|
||||
- text: Get started with Windows Server
|
||||
url: /windows-server/get-started/get-started-with-windows-server
|
||||
- text: Windows Server blog
|
||||
url: https://cloudblogs.microsoft.com/windowsserver/
|
||||
|
||||
- title: Windows product site and blogs
|
||||
links:
|
||||
- text: Find out how Windows enables your business to do more
|
||||
url: https://www.microsoft.com/microsoft-365/windows
|
||||
- text: Windows blogs
|
||||
url: https://blogs.windows.com/
|
||||
- text: Windows IT Pro blog
|
||||
url: https://techcommunity.microsoft.com/t5/windows-it-pro-blog/bg-p/Windows10Blog
|
||||
- text: Microsoft Intune blog
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-intune-blog/bg-p/MicrosoftEndpointManagerBlog
|
||||
- text: "Windows help & learning: end-user documentation"
|
||||
url: https://support.microsoft.com/windows
|
||||
|
||||
- title: Participate in the community
|
||||
links:
|
||||
- text: Windows community
|
||||
url: https://techcommunity.microsoft.com/t5/windows/ct-p/Windows10
|
||||
- text: Microsoft Intune community
|
||||
url: https://techcommunity.microsoft.com/t5/microsoft-intune/bd-p/Microsoft-Intune
|
||||
- text: Microsoft Support community
|
||||
url: https://answers.microsoft.com/windows/forum
|
||||
|