mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-16 10:53:43 +00:00
Endpoint manager rebrand
This commit is contained in:
@ -73,13 +73,13 @@ This node specifies the username for a new local user account. This setting can
|
||||
This node specifies the password for a new local user account. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
GET operation isn't supported. This setting will report as failed when deployed from the Endpoint Manager.
|
||||
GET operation isn't supported. This setting will report as failed when deployed from Intune.
|
||||
|
||||
<a href="" id="users-username-localusergroup"></a>**Users/_UserName_/LocalUserGroup**
|
||||
This optional node specifies the local user group that a local user account should be joined to. If the node isn't set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Configuration service provider reference](index.yml)
|
||||
|
@ -25,7 +25,7 @@ The table below shows the applicability of Windows:
|
||||
|
||||
Windows Defender Application Control (WDAC) policies can be managed from an MDM server, or locally by using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and consequently doesn't schedule a reboot.
|
||||
|
||||
Existing Windows Defender Application Control (WDAC) policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although, WDAC policy deployment via the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||
Existing Windows Defender Application Control (WDAC) policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although WDAC policy deployment using the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||
|
||||
The following example shows the ApplicationControl CSP in tree format.
|
||||
|
||||
@ -150,9 +150,9 @@ Scope is dynamic. Supported operation is Get.
|
||||
|
||||
Value type is char.
|
||||
|
||||
## Microsoft Endpoint Manager Intune Usage Guidance
|
||||
## Microsoft Intune Usage Guidance
|
||||
|
||||
For customers using Intune standalone or hybrid management with Microsoft Endpoint Configuration Manager to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
For customers using Intune standalone or hybrid management with Configuration Manager to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
|
||||
## Generic MDM Server Usage Guidance
|
||||
|
||||
@ -329,6 +329,6 @@ New-CimInstance -Namespace $namespace -ClassName $policyClassName -Property @{Pa
|
||||
Get-CimInstance -Namespace $namespace -ClassName $policyClassName
|
||||
```
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Configuration service provider reference](index.yml)
|
@ -59,7 +59,7 @@ manager: aaroncz
|
||||
<!--Description-->
|
||||
This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated.
|
||||
|
||||
When entering a list of TLS endpoints in Microsoft Endpoint Manager, you must follow this format, even in the UI:
|
||||
When entering a list of TLS endpoints in Microsoft Intune, you must follow this format, even in the UI:
|
||||
|
||||
`<![CDATA[https://nls.corp.contoso.comhttps://nls.corp.fabricam.com]]>`
|
||||
|
||||
@ -107,6 +107,6 @@ This policy setting provides the string that is to be used to name a network. Th
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Policy configuration service provider](policy-configuration-service-provider.md)
|
Reference in New Issue
Block a user