mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
update
This commit is contained in:
parent
e4d02b2871
commit
6f839514bf
@ -11,7 +11,7 @@ ms.collection:
|
|||||||
- education
|
- education
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reset devices with Autopilot Reset
|
# Reset devices with Autopilot Reset
|
||||||
|
|
||||||
IT admins or technical teachers can use Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen anytime and apply original settings and management enrollment (Microsoft Entra ID and device management) so the devices are ready to use. With Autopilot Reset, devices are returned to a fully configured or known IT-approved state.
|
IT admins or technical teachers can use Autopilot Reset to quickly remove personal files, apps, and settings, and reset Windows 10 devices from the lock screen anytime and apply original settings and management enrollment (Microsoft Entra ID and device management) so the devices are ready to use. With Autopilot Reset, devices are returned to a fully configured or known IT-approved state.
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ To enable Autopilot Reset, you must:
|
|||||||
|
|
||||||
## Enable Autopilot Reset
|
## Enable Autopilot Reset
|
||||||
|
|
||||||
To use Autopilot Reset, [Windows Recovery Environment (WinRE) must be enabled on the device](#winre).
|
To use Autopilot Reset, Windows Recovery Environment (WinRE) must be enabled on the device.
|
||||||
|
|
||||||
**DisableAutomaticReDeploymentCredentials** is a policy that enables or disables the visibility of the credentials for Autopilot Reset. It's a policy node in the [Policy CSP](/windows/client-management/mdm/policy-csp-credentialproviders), **CredentialProviders/DisableAutomaticReDeploymentCredentials**. By default, this policy is set to 1 (Disable). This setting ensures that Autopilot Reset isn't triggered by accident.
|
**DisableAutomaticReDeploymentCredentials** is a policy that enables or disables the visibility of the credentials for Autopilot Reset. It's a policy node in the [Policy CSP](/windows/client-management/mdm/policy-csp-credentialproviders), **CredentialProviders/DisableAutomaticReDeploymentCredentials**. By default, this policy is set to 1 (Disable). This setting ensures that Autopilot Reset isn't triggered by accident.
|
||||||
|
|
||||||
@ -32,7 +32,7 @@ You can set the policy using one of these methods:
|
|||||||
|
|
||||||
Check your MDM provider documentation on how to set this policy. If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set.
|
Check your MDM provider documentation on how to set this policy. If your MDM provider doesn't explicitly support this policy, you can manually set this policy if your MDM provider allows specific OMA-URIs to be manually set.
|
||||||
|
|
||||||
For example, in Intune, create a new configuration policy and add an OMA-URI.
|
For example, in Intune, create a new configuration policy and add an OMA-URI.
|
||||||
- OMA-URI: ./Vendor/MSFT/Policy/Config/CredentialProviders/DisableAutomaticReDeploymentCredentials
|
- OMA-URI: ./Vendor/MSFT/Policy/Config/CredentialProviders/DisableAutomaticReDeploymentCredentials
|
||||||
- Data type: Integer
|
- Data type: Integer
|
||||||
- Value: 0
|
- Value: 0
|
||||||
@ -56,11 +56,12 @@ You can set the policy using one of these methods:
|
|||||||
- When using [Set up School PCs](use-set-up-school-pcs-app.md), in the **Configure student PC settings** screen, select **Enable Windows 10 Autopilot Reset** among the list of settings for the student PC as shown in the following example:
|
- When using [Set up School PCs](use-set-up-school-pcs-app.md), in the **Configure student PC settings** screen, select **Enable Windows 10 Autopilot Reset** among the list of settings for the student PC as shown in the following example:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Trigger Autopilot Reset
|
|
||||||
Autopilot Reset is a two-step process: trigger it and then authenticate. Once you've done these two steps, you can let the process execute and once it's done, the device is again ready for use.
|
|
||||||
|
|
||||||
**To trigger Autopilot Reset**
|
## Trigger Autopilot Reset
|
||||||
|
|
||||||
|
Autopilot Reset is a two-step process: trigger it and then authenticate. Once you've done these two steps, you can let the process execute and once it's done, the device is again ready for use.
|
||||||
|
]
|
||||||
|
To trigger Autopilot Reset:
|
||||||
|
|
||||||
1. From the Windows device lock screen, enter the keystroke: <kbd>CTRL</kbd> + <kbd>WIN</kbd> + <kbd>R</kbd>.
|
1. From the Windows device lock screen, enter the keystroke: <kbd>CTRL</kbd> + <kbd>WIN</kbd> + <kbd>R</kbd>.
|
||||||
|
|
||||||
@ -69,16 +70,16 @@ Autopilot Reset is a two-step process: trigger it and then authenticate. Once yo
|
|||||||
This keystroke opens up a custom sign-in screen for Autopilot Reset. The screen serves two purposes:
|
This keystroke opens up a custom sign-in screen for Autopilot Reset. The screen serves two purposes:
|
||||||
|
|
||||||
1. Confirm/verify that the end user has the right to trigger Autopilot Reset
|
1. Confirm/verify that the end user has the right to trigger Autopilot Reset
|
||||||
2. Notify the user in case a provisioning package, created using Windows Configuration Designer or Set up School PCs, will be used as part of the process.
|
1. Notify the user in case a provisioning package, created using Windows Configuration Designer or Set up School PCs, will be used as part of the process.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. Sign in with the admin account credentials. If you created a provisioning package, plug in the USB drive and trigger Autopilot Reset.
|
1. Sign in with the admin account credentials. If you created a provisioning package, plug in the USB drive and trigger Autopilot Reset.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> To reestablish Wi-Fi connectivity after reset, make sure the **Connect automatically** box is checked for the device's wireless network connection.
|
> To reestablish Wi-Fi connectivity after reset, make sure the **Connect automatically** box is checked for the device's wireless network connection.
|
||||||
|
|
||||||
Once Autopilot Reset is triggered, the reset process starts.
|
Once Autopilot Reset is triggered, the reset process starts.
|
||||||
|
|
||||||
After reset, the device:
|
After reset, the device:
|
||||||
|
|
||||||
|
@ -28,7 +28,7 @@ For a complete description of Certutil including examples that show how to use i
|
|||||||
|
|
||||||
### List certificates available on the smart card
|
### List certificates available on the smart card
|
||||||
|
|
||||||
To list certificates that are available on the smart card, type `certutil -scinfo`.
|
To list certificates that are available on the smart card, type `certutil.exe -scinfo`.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Entering a PIN is not required for this operation. You can press ESC if you are prompted for a PIN.
|
> Entering a PIN is not required for this operation. You can press ESC if you are prompted for a PIN.
|
||||||
@ -37,9 +37,9 @@ To list certificates that are available on the smart card, type `certutil -scinf
|
|||||||
|
|
||||||
Each certificate is enclosed in a container. When you delete a certificate on the smart card, you're deleting the container for the certificate.
|
Each certificate is enclosed in a container. When you delete a certificate on the smart card, you're deleting the container for the certificate.
|
||||||
|
|
||||||
To find the container value, type `certutil -scinfo`.
|
To find the container value, type `certutil.exe -scinfo`.
|
||||||
|
|
||||||
To delete a container, type `certutil -delkey -csp "Microsoft Base Smart Card Crypto Provider" "<ContainerValue>"`.
|
To delete a container, type `certutil.exe -delkey -csp "Microsoft Base Smart Card Crypto Provider" "<ContainerValue>"`.
|
||||||
|
|
||||||
## Debugging and tracing using WPP
|
## Debugging and tracing using WPP
|
||||||
|
|
||||||
@ -50,37 +50,37 @@ WPP simplifies tracing the operation of the trace provider. It provides a mechan
|
|||||||
Using WPP, use one of the following commands to enable tracing:
|
Using WPP, use one of the following commands to enable tracing:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start <FriendlyName> -guid \<GUID> -f .\\<LogFileName*>.etl -flags <flags> -ft 1
|
tracelog.exe -kd -rt -start <FriendlyName> -guid \<GUID> -f .\<LogFileName*>.etl -flags <flags> -ft 1
|
||||||
logman start <FriendlyName> -ets -p {<GUID>} -<Flags> -ft 1 -rt -o .\\<LogFileName><em>.etl -mode 0x00080000</em>
|
logman start <FriendlyName> -ets -p {<GUID>} -<Flags> -ft 1 -rt -o .\<LogFileName><em>.etl -mode 0x00080000</em>
|
||||||
```
|
```
|
||||||
|
|
||||||
You can use the parameters in the following table.
|
You can use the parameters in the following table.
|
||||||
|
|
||||||
| Friendly name | GUID | Flags |
|
| Friendly name | GUID | Flags |
|
||||||
|-------------------|--------------------------------------|-----------|
|
|--|--|--|
|
||||||
| `scardsvr` | 13038e47-ffec-425d-bc69-5707708075fe | 0xffff |
|
| `scardsvr` | 13038e47-ffec-425d-bc69-5707708075fe | 0xffff |
|
||||||
| `winscard` | 3fce7c5f-fb3b-4bce-a9d8-55cc0ce1cf01 | 0xffff |
|
| `winscard` | 3fce7c5f-fb3b-4bce-a9d8-55cc0ce1cf01 | 0xffff |
|
||||||
| `basecsp` | 133a980d-035d-4e2d-b250-94577ad8fced | 0x7 |
|
| `basecsp` | 133a980d-035d-4e2d-b250-94577ad8fced | 0x7 |
|
||||||
| `scksp` | 133a980d-035d-4e2d-b250-94577ad8fced | 0x7 |
|
| `scksp` | 133a980d-035d-4e2d-b250-94577ad8fced | 0x7 |
|
||||||
| `msclmd` | fb36caf4-582b-4604-8841-9263574c4f2c | 0x7 |
|
| `msclmd` | fb36caf4-582b-4604-8841-9263574c4f2c | 0x7 |
|
||||||
| `credprov` | dba0e0e0-505a-4ab6-aa3f-22f6f743b480 | 0xffff |
|
| `credprov` | dba0e0e0-505a-4ab6-aa3f-22f6f743b480 | 0xffff |
|
||||||
| `certprop` | 30eae751-411f-414c-988b-a8bfa8913f49 | 0xffff |
|
| `certprop` | 30eae751-411f-414c-988b-a8bfa8913f49 | 0xffff |
|
||||||
| `scfilter` | eed7f3c9-62ba-400e-a001-658869df9a91 | 0xffff |
|
| `scfilter` | eed7f3c9-62ba-400e-a001-658869df9a91 | 0xffff |
|
||||||
| `wudfusbccid` | a3c09ba3-2f62-4be5-a50f-8278a646ac9d | 0xffff |
|
| `wudfusbccid` | a3c09ba3-2f62-4be5-a50f-8278a646ac9d | 0xffff |
|
||||||
|
|
||||||
### Examples
|
### Examples
|
||||||
|
|
||||||
To enable tracing for the SCardSvr service:
|
To enable tracing for the SCardSvr service:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start scardsvr -guid \#13038e47-ffec-425d-bc69-5707708075fe -f .\\scardsvr.etl -flags 0xffff -ft 1
|
tracelog.exe -kd -rt -start scardsvr -guid \#13038e47-ffec-425d-bc69-5707708075fe -f .\scardsvr.etl -flags 0xffff -ft 1
|
||||||
logman start scardsvr -ets -p {13038e47-ffec-425d-bc69-5707708075fe} 0xffff -ft 1 -rt -o .\\scardsvr.etl -mode 0x00080000
|
logman start scardsvr -ets -p {13038e47-ffec-425d-bc69-5707708075fe} 0xffff -ft 1 -rt -o .\scardsvr.etl -mode 0x00080000
|
||||||
```
|
```
|
||||||
|
|
||||||
To enable tracing for `scfilter.sys`:
|
To enable tracing for `scfilter.sys`:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start scfilter -guid \#eed7f3c9-62ba-400e-a001-658869df9a91 -f .\\scfilter.etl -flags 0xffff -ft 1
|
tracelog.exe -kd -rt -start scfilter -guid \#eed7f3c9-62ba-400e-a001-658869df9a91 -f .\scfilter.etl -flags 0xffff -ft 1
|
||||||
```
|
```
|
||||||
|
|
||||||
### Stop the trace
|
### Stop the trace
|
||||||
@ -115,7 +115,7 @@ To begin tracing, you can use `Tracelog`. Different components use different con
|
|||||||
To enable tracing for NTLM authentication, run the following command on the command line:
|
To enable tracing for NTLM authentication, run the following command on the command line:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start ntlm -guid \#5BBB6C18-AA45-49b1-A15F-085F7ED0AA90 -f .\\ntlm.etl -flags 0x15003 -ft 1
|
tracelog.exe -kd -rt -start ntlm -guid \#5BBB6C18-AA45-49b1-A15F-085F7ED0AA90 -f .\ntlm.etl -flags 0x15003 -ft 1
|
||||||
```
|
```
|
||||||
|
|
||||||
To stop tracing for NTLM authentication, run this command:
|
To stop tracing for NTLM authentication, run this command:
|
||||||
@ -129,7 +129,7 @@ tracelog -stop ntlm
|
|||||||
To enable tracing for Kerberos authentication, run this command:
|
To enable tracing for Kerberos authentication, run this command:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start kerb -guid \#6B510852-3583-4e2d-AFFE-A67F9F223438 -f .\\kerb.etl -flags 0x43 -ft 1
|
tracelog.exe -kd -rt -start kerb -guid \#6B510852-3583-4e2d-AFFE-A67F9F223438 -f .\kerb.etl -flags 0x43 -ft 1
|
||||||
```
|
```
|
||||||
|
|
||||||
To stop tracing for Kerberos authentication, run this command:
|
To stop tracing for Kerberos authentication, run this command:
|
||||||
@ -143,7 +143,7 @@ tracelog.exe -stop kerb
|
|||||||
To enable tracing for the KDC, run the following command on the command line:
|
To enable tracing for the KDC, run the following command on the command line:
|
||||||
|
|
||||||
```cmd
|
```cmd
|
||||||
tracelog.exe -kd -rt -start kdc -guid \#1BBA8B19-7F31-43c0-9643-6E911F79A06B -f .\\kdc.etl -flags 0x803 -ft 1
|
tracelog.exe -kd -rt -start kdc -guid \#1BBA8B19-7F31-43c0-9643-6E911F79A06B -f .\kdc.etl -flags 0x803 -ft 1
|
||||||
```
|
```
|
||||||
|
|
||||||
To stop tracing for the KDC, run the following command on the command line:
|
To stop tracing for the KDC, run the following command on the command line:
|
||||||
@ -152,30 +152,34 @@ To stop tracing for the KDC, run the following command on the command line:
|
|||||||
tracelog.exe -stop kdc
|
tracelog.exe -stop kdc
|
||||||
```
|
```
|
||||||
|
|
||||||
To stop tracing from a remote computer, run this command: logman.exe -s *<ComputerName>*.
|
To stop tracing from a remote computer, run this command:
|
||||||
|
|
||||||
|
```cmd
|
||||||
|
logman.exe -s <ComputerName>
|
||||||
|
```
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The default location for logman.exe is %systemroot%system32\\. Use the **-s** option to supply a computer name.
|
> The default location for logman.exe is %systemroot%system32\. Use the **-s** option to supply a computer name.
|
||||||
|
|
||||||
### Configure tracing with the registry
|
### Configure tracing with the registry
|
||||||
|
|
||||||
You can also configure tracing by editing the Kerberos registry values shown in the following table.
|
You can also configure tracing by editing the Kerberos registry values shown in the following table.
|
||||||
|
|
||||||
| Element | Registry Key Setting |
|
| Element | Registry Key Setting |
|
||||||
|-------------|----------------------------------------------------|
|
|--|--|
|
||||||
| NTLM | HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\MSV1\_0<br>Value name: NtLmInfoLevel<br>Value type: DWORD<br>Value data: c0015003 |
|
| NTLM | HKEY_LOCAL_MACHINESYSTEM\CurrentControlSet\Control\Lsa\MSV1_0<br>Value name: NtLmInfoLevel<br>Value type: DWORD<br>Value data: c0015003 |
|
||||||
| Kerberos | HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Kerberos<br>Value name: LogToFile<br>Value type: DWORD<br>Value data: 00000001<br><br>HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Kerberos\\Parameters<br>Value name: KerbDebugLevel<br>Value type: DWORD<br>Value data: c0000043<br><br>HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\Kerberos\\Parameters<br>Value name: LogToFile<br>Value type: DWORD<br>Value data: 00000001 |
|
| Kerberos | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos<br>Value name: LogToFile<br>Value type: DWORD<br>Value data: 00000001<br><br>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters<br>Value name: KerbDebugLevel<br>Value type: DWORD<br>Value data: c0000043<br><br>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters<br>Value name: LogToFile<br>Value type: DWORD<br>Value data: 00000001 |
|
||||||
| KDC | HKEY\_LOCAL\_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\Kdc<br>Value name: KdcDebugLevel<br>Value type: DWORD<br>Value data: c0000803 |
|
| KDC | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Kdc<br>Value name: KdcDebugLevel<br>Value type: DWORD<br>Value data: c0000803 |
|
||||||
|
|
||||||
If you used `Tracelog`, look for the following log file in your current directory: `kerb.etl/kdc.etl/ntlm.etl`.
|
If you used `Tracelog`, look for the following log file in your current directory: `kerb.etl/kdc.etl/ntlm.etl`.
|
||||||
|
|
||||||
If you used the registry key settings shown in the previous table, look for the trace log files in the following locations:
|
If you used the registry key settings shown in the previous table, look for the trace log files in the following locations:
|
||||||
|
|
||||||
- NTLM: %systemroot%\\tracing\\msv1\_0
|
- NTLM: `%systemroot%\tracing\msv1_0`
|
||||||
- Kerberos: %systemroot%\\tracing\\kerberos
|
- Kerberos: `%systemroot%\tracing\kerberos`
|
||||||
- KDC: %systemroot%\\tracing\\kdcsvc
|
- KDC: `%systemroot%\tracing\kdcsvc`
|
||||||
|
|
||||||
To decode event trace files, you can use `Tracefmt` (tracefmt.exe). `Tracefmt` is a command-line tool that formats and displays trace messages from an event trace log file (.etl) or a real-time trace session. `Tracefmt` can display the messages in the Command Prompt window or save them in a text file. It is located in the \\tools\\tracing subdirectory of the Windows Driver Kit (WDK). For more information, see [`Tracefmt`](/windows-hardware/drivers/devtest/tracefmt).
|
To decode event trace files, you can use `Tracefmt` (tracefmt.exe). `Tracefmt` is a command-line tool that formats and displays trace messages from an event trace log file (.etl) or a real-time trace session. `Tracefmt` can display the messages in the Command Prompt window or save them in a text file. It is located in the \tools\tracing subdirectory of the Windows Driver Kit (WDK). For more information, see [`Tracefmt`](/windows-hardware/drivers/devtest/tracefmt).
|
||||||
|
|
||||||
## Smart Card service
|
## Smart Card service
|
||||||
|
|
||||||
|
@ -64,7 +64,7 @@ You can use this policy setting to allow certificates without an extended key us
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> extended key usage certificate attribute is also known as extended key usage.
|
> extended key usage certificate attribute is also known as extended key usage.
|
||||||
>
|
>
|
||||||
> In versions of Windows before Windows Vista, smart card certificates that are used to sign in require an EKU extension with a smart card logon object identifier. This policy setting can be used to modify that restriction.
|
> In versions of Windows before Windows Vista, smart card certificates that are used to sign in require an EKU extension with a smart card logon object identifier. This policy setting can be used to modify that restriction.
|
||||||
|
|
||||||
When this policy setting is turned on, certificates with the following attributes can also be used to sign in with a smart card:
|
When this policy setting is turned on, certificates with the following attributes can also be used to sign in with a smart card:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user