mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 02:43:43 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into rs4
This commit is contained in:
@ -24,7 +24,7 @@ To let people in your organization sign in to Surface Hub with their phones and
|
|||||||
|
|
||||||
- Make sure you have at minimum an Office 365 E3 subscription.
|
- Make sure you have at minimum an Office 365 E3 subscription.
|
||||||
|
|
||||||
- [Configure Multi-Factor Authentication](https://docs.microsoft.com/azure/multi-factor-authentication/multi-factor-authentication). Make sure **Notification through mobile app** is selected.
|
- [Configure Multi-Factor Authentication](https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-mfasettings). Make sure **Notification through mobile app** is selected.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
@ -37,6 +37,9 @@ Organizations might want to deploy a customized Start and taskbar configuration
|
|||||||
|
|
||||||
Some areas of Start can be managed using Group Policy. The layout of Start tiles can be managed using either Group Policy or Mobile Device Management (MDM) policy.
|
Some areas of Start can be managed using Group Policy. The layout of Start tiles can be managed using either Group Policy or Mobile Device Management (MDM) policy.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The MDM policy settings in the table can also be configured [in a provisioning package](customize-windows-10-start-screens-by-using-provisioning-packages-and-icd.md) using **Policies** > **Start**. [See the reference for **Start** settings in Windows Configuration Designer.](https://docs.microsoft.com/windows/configuration/wcd/wcd-policies#start)
|
||||||
|
|
||||||
The following table lists the different parts of Start and any applicable policy settings or Settings options. Group Policy settings are in the **User Configuration**\\**Administrative Templates**\\**Start Menu and Taskbar** path except where a different path is listed in the table.
|
The following table lists the different parts of Start and any applicable policy settings or Settings options. Group Policy settings are in the **User Configuration**\\**Administrative Templates**\\**Start Menu and Taskbar** path except where a different path is listed in the table.
|
||||||
|
|
||||||
| Start | Policy | Local setting |
|
| Start | Policy | Local setting |
|
||||||
@ -54,6 +57,8 @@ The following table lists the different parts of Start and any applicable policy
|
|||||||
| All Settings | Group Policy: **Prevent changes to Taskbar and Start Menu Settings** | none |
|
| All Settings | Group Policy: **Prevent changes to Taskbar and Start Menu Settings** | none |
|
||||||
| Taskbar | MDM: **Start/NoPinningToTaskbar** | none |
|
| Taskbar | MDM: **Start/NoPinningToTaskbar** | none |
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>In local **Settings** > **Personalization** > **Start**, there is an option to **Show more tiles**. The default tile layout for Start tiles is 3 columns of medium sized tiles. **Show more tiles** enables 4 columns. To configure the 4-column layout when you [customize and export a Start layout](customize-and-export-start-layout.md), turn on the **Show more tiles** setting and then arrange your tiles.
|
||||||
|
|
||||||
[Learn how to customize and export Start layout](customize-and-export-start-layout.md)
|
[Learn how to customize and export Start layout](customize-and-export-start-layout.md)
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ In other words, the hotfix in each KB article provides the necessary code and fu
|
|||||||
|---|---|---|---|
|
|---|---|---|---|
|
||||||
|Windows Server 2016 domain controller (reading Active Directory)|“”|-|Everyone has read permissions to preserve compatibility.|
|
|Windows Server 2016 domain controller (reading Active Directory)|“”|-|Everyone has read permissions to preserve compatibility.|
|
||||||
|Earlier domain controller |-|-|No access check is performed by default.|
|
|Earlier domain controller |-|-|No access check is performed by default.|
|
||||||
|Windows 10, version 1607 non-domain controller|(O:SYG:SYD:(A;;RC;;;BA)| Owner: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>Primary group: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>DACL: <br>• Revision: 0x02 <br>• Size: 0x0020 <br>• Ace Count: 0x001 <br>• Ace[00]------------------------- <br> AceType:0x00 <br> (ACCESS\_ALLOWED_ACE_TYPE)<br> AceSize:0x0018 <br> InheritFlags:0x00 <br> Access Mask:0x00020000 <br> AceSid: BUILTIN\Administrators (Alias) (S-1-5-32-544) <br><br> SACL: Not present |Grants RC access (READ_CONTROL, also known as STANDARD_RIGHTS_READ) only to members of the local (built-in) Administrators group. |
|
|Windows 10, version 1607 non-domain controller|O:SYG:SYD:(A;;RC;;;BA)| Owner: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>Primary group: NTAUTHORITY/SYSTEM (WellKnownGroup) (S-1-5-18) <br>DACL: <br>• Revision: 0x02 <br>• Size: 0x0020 <br>• Ace Count: 0x001 <br>• Ace[00]------------------------- <br> AceType:0x00 <br> (ACCESS\_ALLOWED_ACE_TYPE)<br> AceSize:0x0018 <br> InheritFlags:0x00 <br> Access Mask:0x00020000 <br> AceSid: BUILTIN\Administrators (Alias) (S-1-5-32-544) <br><br> SACL: Not present |Grants RC access (READ_CONTROL, also known as STANDARD_RIGHTS_READ) only to members of the local (built-in) Administrators group. |
|
||||||
|Earlier non-domain controller |-|-|No access check is performed by default.|
|
|Earlier non-domain controller |-|-|No access check is performed by default.|
|
||||||
|
|
||||||
## Policy management
|
## Policy management
|
||||||
@ -163,4 +163,4 @@ If the policy is defined, admin tools, scripts and software that formerly enumer
|
|||||||
|
|
||||||
[SAMRi10 - Hardening SAM Remote Access in Windows 10/Server 2016](https://gallery.technet.microsoft.com/SAMRi10-Hardening-Remote-48d94b5b)
|
[SAMRi10 - Hardening SAM Remote Access in Windows 10/Server 2016](https://gallery.technet.microsoft.com/SAMRi10-Hardening-Remote-48d94b5b)
|
||||||
|
|
||||||
<br>
|
<br>
|
||||||
|
Reference in New Issue
Block a user