mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-17 07:47:22 +00:00
Merge pull request #4466 from MicrosoftDocs/master
Publish 12/28/2020 10:30 AM PT
This commit is contained in:
commit
6fca90a0d8
@ -95,7 +95,7 @@ The server side configuration to enable Network Unlock also requires provisionin
|
|||||||
|
|
||||||
The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012.
|
The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012.
|
||||||
|
|
||||||
### <a href="" id="bkmk-installwdsrole"><a/>Install the WDS Server role
|
### <a href="" id="bkmk-installwdsrole"></a>Install the WDS Server role
|
||||||
|
|
||||||
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager.
|
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager.
|
||||||
|
|
||||||
|
@ -11,7 +11,7 @@ ms.localizationpriority: medium
|
|||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.date: 11/18/2020
|
ms.date: 12/28/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -113,7 +113,7 @@ You will also see a detection under **Quarantined threats** in the **Scan histor
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
|
> Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
|
||||||
|
|
||||||
The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-microsoft-defender-antivirus.md).
|
The Windows event log will also show [Windows Defender client event ID 1116](troubleshoot-microsoft-defender-antivirus.md).
|
||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
|
@ -10,7 +10,7 @@ ms.localizationpriority: medium
|
|||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.date: 11/18/2020
|
ms.date: 12/28/2020
|
||||||
ms.reviewer: jesquive
|
ms.reviewer: jesquive
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
@ -84,11 +84,10 @@ See the [Download and unpackage](#download-and-unpackage-the-latest-updates) sec
|
|||||||
Now you can get started on downloading and installing new updates. We’ve created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you’re familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts).
|
Now you can get started on downloading and installing new updates. We’ve created a sample PowerShell script for you below. This script is the easiest way to download new updates and get them ready for your VMs. You should then set the script to run at a certain time on the management machine by using a scheduled task (or, if you’re familiar with using PowerShell scripts in Azure, Intune, or SCCM, you could also use those scripts).
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
$vdmpathbase = 'c:\wdav-update\{00000000-0000-0000-0000-'
|
$vdmpathbase = "$env:systemdrive\wdav-update\{00000000-0000-0000-0000-"
|
||||||
$vdmpathtime = Get-Date -format "yMMddHHmmss"
|
$vdmpathtime = Get-Date -format "yMMddHHmmss"
|
||||||
$vdmpath = $vdmpathbase + $vdmpathtime + '}'
|
$vdmpath = $vdmpathbase + $vdmpathtime + '}'
|
||||||
$vdmpackage = $vdmpath + '\mpam-fe.exe'
|
$vdmpackage = $vdmpath + '\mpam-fe.exe'
|
||||||
$args = @("/x")
|
|
||||||
|
|
||||||
New-Item -ItemType Directory -Force -Path $vdmpath | Out-Null
|
New-Item -ItemType Directory -Force -Path $vdmpath | Out-Null
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.date: 03/01/2019
|
ms.date: 12/28/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
@ -91,3 +91,6 @@ To verify that Secure Launch is running, use System Information (MSInfo32). Clic
|
|||||||
|Modern/Connected Standby|Platforms must support Modern/Connected Standby.|
|
|Modern/Connected Standby|Platforms must support Modern/Connected Standby.|
|
||||||
|Platform firmware|Platform firmware must carry all code required to perform a launch.|
|
|Platform firmware|Platform firmware must carry all code required to perform a launch.|
|
||||||
|Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. |
|
|Platform firmware update|System firmware is recommended to be updated via UpdateCapsule in Windows Update. |
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> For more details around AMD processors, see [Microsoft Security Blog: Force firmware code to be measured and attested by Secure Launch on Windows 10](https://www.microsoft.com/security/blog/2020/09/01/force-firmware-code-to-be-measured-and-attested-by-secure-launch-on-windows-10/).
|
||||||
|
Loading…
x
Reference in New Issue
Block a user