mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client into UCazure
This commit is contained in:
commit
61c887615e
@ -19,7 +19,7 @@ Battery Limit option is a UEFI setting that changes how the Surface device batte
|
||||
|
||||
Setting the device on Battery Limit changes the protocol for charging the device battery. When Battery Limit is enabled, the battery charge will be limited to 50% of its maximum capacity. The charge level reported in Windows will reflect this limit. Therefore, it will show that the battery is charged up to 50% and will not charge beyond this limit. If you enable Battery Limit while the device is above 50% charge, the Battery icon will show that the device is plugged in but discharging until the device reaches 50% of its maximum charge capacity.
|
||||
|
||||
Adding the Battery Limit option to Surface UEFI will require a [Surface UEFI firmware update](update.md), which will be made available through Windows Update or via the MSI driver and firmware packages on the Microsoft Download Center. Check [support article](https://support.microsoft.com/help/4464941) for the specific Surface UEFI version required for each device and supported devices. Currently, Battery Limit is only supported on Surface Pro 4 and Surface Pro 3. However, the setting will be available in the future on other Surface device models.
|
||||
Adding the Battery Limit option to Surface UEFI will require a [Surface UEFI firmware update](update.md), which will be made available through Windows Update or via the MSI driver and firmware packages on the Microsoft Download Center. Check [Enable "Battery Limit" for Surface devices that have to be plugged in for extended periods of time](https://support.microsoft.com/help/4464941) for the specific Surface UEFI version required for each device and supported devices. Currently, Battery Limit is only supported on Surface Pro 4 and Surface Pro 3. However, the setting will be available in the future on other Surface device models.
|
||||
|
||||
## Enabling Battery Limit in Surface UEFI (Surface Pro 4 and later)
|
||||
|
||||
|
@ -19,8 +19,6 @@ You can use an App-V 5.0 project template to save commonly applied settings asso
|
||||
**Note**
|
||||
You can, and often should apply an App-V 5.0 project template during a package upgrade. For example, if you sequenced an application with a custom exclusion list, it is recommended that an associated template is created and saved for later use while upgrading the sequenced application.
|
||||
|
||||
|
||||
|
||||
App-V 5.0 project templates differ from App-V 5.0 Application Accelerators because App-V 5.0 Application Accelerators are application-specific, and App-V 5.0 project templates can be applied to multiple applications.
|
||||
|
||||
Use the following procedures to create and apply a new template.
|
||||
@ -29,25 +27,20 @@ Use the following procedures to create and apply a new template.
|
||||
|
||||
1. To start the App-V 5.0 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**.
|
||||
|
||||
2. **Note**
|
||||
**Note**
|
||||
If the virtual application package is currently open in the App-V 5.0 Sequencer console, skip to step 3 of this procedure.
|
||||
|
||||
|
||||
|
||||
To open the existing virtual application package that contains the settings you want to save with the App-V 5.0 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**.
|
||||
2. To open the existing virtual application package that contains the settings you want to save with the App-V 5.0 project template, click **File** / **Open**, and then click **Edit Package**. On the **Select Package** page, click **Browse** and locate the virtual application package that you want to open. Click **Edit**.
|
||||
|
||||
3. In the App-V 5.0 Sequencer console, to save the template file, click **File** / **Save As Template**. After you have reviewed the settings that will be saved with the new template, click **OK**. Specify a name that will be associated with the new App-V 5.0 project template. Click Save.
|
||||
|
||||
The new App-V 5.0 project template is saved in the directory specified in step 3 of this procedure.
|
||||
The new App-V 5.0 project template is saved in the directory specified in step 3 of this procedure.
|
||||
|
||||
**To apply a project template**
|
||||
|
||||
1. **Important**
|
||||
**Important**
|
||||
Creating a virtual application package using a project template in conjunction with a Package Accelerator is not supported.
|
||||
|
||||
|
||||
|
||||
To start the App-V 5.0 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**.
|
||||
1. To start the App-V 5.0 sequencer, on the computer that is running the sequencer, click **Start** / **All Programs** / **Microsoft Application Virtualization** / **Microsoft Application Virtualization Sequencer**.
|
||||
|
||||
2. To create or upgrade a new virtual application package by using an App-V 5.0 project template, click **File** / **New From Template**.
|
||||
|
||||
@ -62,9 +55,9 @@ Use the following procedures to create and apply a new template.
|
||||
|
||||
[Operations for App-V 5.0](operations-for-app-v-50.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
BIN
windows/configuration/images/enable-assigned-access-log.png
Normal file
BIN
windows/configuration/images/enable-assigned-access-log.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 48 KiB |
@ -34,6 +34,9 @@ For example:
|
||||
1. [Verify that the provisioning package is applied successfully](kiosk-validate.md).
|
||||
2. Verify that the account (config) is mapped to a profile in the configuration XML file.
|
||||
3. Verify that the configuration XML file is authored and formatted correctly. Correct any configuration errors, then create and apply a new provisioning package. Sign out and sign in again to check the new configuration.
|
||||
4. Additional logs about configuration and runtime issues can be obtained by enabling the **Applications and Services Logs\Microsoft\Windows\AssignedAccess\Operational** channel, which is disabled by default.
|
||||
|
||||

|
||||
|
||||
|
||||
## Apps configured in AllowedList are blocked
|
||||
|
@ -971,6 +971,8 @@
|
||||
#### [Security Compliance Toolkit](security-compliance-toolkit-10.md)
|
||||
#### [Get support](get-support-for-security-baselines.md)
|
||||
|
||||
### [MBSA removal and alternatives](mbsa-removal-and-guidance.md)
|
||||
|
||||
### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md)
|
||||
|
||||
## [Change history for Threat protection](change-history-for-threat-protection.md)
|
||||
|
@ -43,6 +43,7 @@ The attack surface reduction set of capabilities provide the first line of defen
|
||||
|
||||
- [Hardware based isolation](windows-defender-atp/overview-hardware-based-isolation.md)
|
||||
- [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||
- [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||
- [Exploit protection](windows-defender-exploit-guard/exploit-protection-exploit-guard.md)
|
||||
- [Network protection](windows-defender-exploit-guard/network-protection-exploit-guard.md)
|
||||
- [Controlled folder access](windows-defender-exploit-guard/controlled-folders-exploit-guard.md)
|
||||
|
@ -31,7 +31,7 @@ Topic | Description
|
||||
:---|:---
|
||||
[Overview](overview.md) | Understand the concepts behind the capabilities in Windows Defender ATP so you take full advantage of the complete threat protection platform.
|
||||
[Get started](get-started.md) | Learn about the requirements of the platform and the initial steps you need to take to get started with Windows Defender ATP.
|
||||
[Cconfigure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Windows Defender ATP.
|
||||
[Configure and manage capabilities](onboard.md)| Configure and manage the individual capabilities in Windows Defender ATP.
|
||||
[Troubleshoot Windows Defender ATP](troubleshoot-wdatp.md) | Learn how to address issues that you might encounter while using the platform.
|
||||
|
||||
## Related topic
|
||||
|
@ -51,7 +51,7 @@ Windows Autopilot self-deploying mode enables a zero touch device provisioning e
|
||||
|
||||
This self-deploying capability removes the current need to have an end user interact by pressing the “Next” button during the deployment process.
|
||||
|
||||
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider,and provision policies and applications, all with no user authentication or user interaction required.
|
||||
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
|
||||
|
||||
To learn more about Autopilot self-deploying mode and to see step-by-step instructions to perform such a deployment, [Windows Autopilot self-deploying mode](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/self-deploying).
|
||||
|
||||
@ -123,7 +123,7 @@ We added a new assessment for the Windows time service to the **Device performan
|
||||
|
||||
We’re continuing to work on how other security apps you’ve installed show up in the **Windows Security** app. There’s a new page called **Security providers** that you can find in the **Settings** section of the app. Click **Manage providers** to see a list of all the other security providers (including antivirus, firewall, and web protection) that are running on your device. Here you can easily open the providers’ apps or get more information on how to resolve issues reported to you through **Windows Security**.
|
||||
|
||||
This also means you’ll see more links to other security apps within **Windows Security**. For example, if you open the **Firewall & network protection** section, you’ll see the firewall apps that are running on your device under each firewall type, which inclueds domain, private, and public networks).
|
||||
This also means you’ll see more links to other security apps within **Windows Security**. For example, if you open the **Firewall & network protection** section, you’ll see the firewall apps that are running on your device under each firewall type, which includes domain, private, and public networks).
|
||||
|
||||
<pre>HKLM\SOFTWARE\Microsoft\Security Center\Feature DisableAvCheck (DWORD) = 1 </pre>
|
||||
|
||||
@ -131,7 +131,7 @@ This also means you’ll see more links to other security apps within **Windows
|
||||
|
||||
#### Silent enforcement on fixed drives
|
||||
|
||||
Through a Modern Decice Management (MDM) policy, BitLocker can be enabled silently for standard Azure Active Directory (AAD) joined users. In Windows 10, version 1803 automatic BitLocker encryption was enabled for standard AAD users, but this still required modern hardware that passed the Hardware Security Test Interface (HSTI). This new functionality enables BitLocker via policy even on devices that don’t pass the HSTI.
|
||||
Through a Modern Device Management (MDM) policy, BitLocker can be enabled silently for standard Azure Active Directory (AAD) joined users. In Windows 10, version 1803 automatic BitLocker encryption was enabled for standard AAD users, but this still required modern hardware that passed the Hardware Security Test Interface (HSTI). This new functionality enables BitLocker via policy even on devices that don’t pass the HSTI.
|
||||
|
||||
This is an update to the [BitLocker CSP](https://docs.microsoft.com/en-us/windows/client-management/mdm/bitlocker-csp), which was introduced in Windows 10, version 1703, and leveraged by Intune and others.
|
||||
|
||||
@ -147,7 +147,7 @@ For example, you can choose the XTS-AES 256 encryption algorithm, and have it ap
|
||||
|
||||
Windows Defender Application Guard (WDAG) introduced a new user interface inside **Windows Security** in this release. Standalone users can now install and configure their Windows Defender Application Guard settings in Windows Security without needing to change registry key settings.
|
||||
|
||||
Additionally, users who are managed by enterprise policies will be able to check their settings to see what their administrators have configured for their machines to better understand the behavior of Windows Defender Application Guard. This new UI improves the overall experience for users while managing and checking their Windows Defender Application Guard settings. As long as devices meet the minimum requirements, these settings will appear in Windows Security.For detailed information, click [here](https://techcommunity.microsoft.com/t5/Windows-Insider-Program/test/m-p/214102#M1709).
|
||||
Additionally, users who are managed by enterprise policies will be able to check their settings to see what their administrators have configured for their machines to better understand the behavior of Windows Defender Application Guard. This new UI improves the overall experience for users while managing and checking their Windows Defender Application Guard settings. As long as devices meet the minimum requirements, these settings will appear in Windows Security. For detailed information, click [here](https://techcommunity.microsoft.com/t5/Windows-Insider-Program/test/m-p/214102#M1709).
|
||||
|
||||
To try this,
|
||||
1. Go to**Windows Security** and select **App & browser control**.
|
||||
@ -203,7 +203,7 @@ Threat Analytics is a set of interactive reports published by the Windows Defend
|
||||
- [Managed security service provider (MSSP) support](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/mssp-support-windows-defender-advanced-threat-protection)<br>
|
||||
Windows Defender ATP adds support for this scenario by providing MSSP integration.
|
||||
The integration will allow MSSPs to take the following actions:
|
||||
Get access to MSSP customer's Windows Defender Security Center portal, fet email notifications, and fetch alerts through security information and event management (SIEM) tools.
|
||||
Get access to MSSP customer's Windows Defender Security Center portal, fetch email notifications, and fetch alerts through security information and event management (SIEM) tools.
|
||||
|
||||
- [Integration with Azure Security Center](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-server-endpoints-windows-defender-advanced-threat-protection#integration-with-azure-security-center)<br>
|
||||
Windows Defender ATP integrates with Azure Security Center to provide a comprehensive server protection solution. With this integration Azure Security Center can leverage the power of Windows Defender ATP to provide improved threat detection for Windows Servers.
|
||||
@ -239,4 +239,4 @@ Until now, Windows logon only supported the use of identities federated to ADFS
|
||||
3. On the lock screen, select web sign-in under sign-in options.
|
||||
4. Click the “Sign in” button to continue.
|
||||
|
||||

|
||||

|
||||
|
Loading…
x
Reference in New Issue
Block a user