mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge branch 'MDBranchMachineToDeviceParent' into MDBranchMachineToDeviceChild
This commit is contained in:
commit
71284eee84
@ -32,6 +32,7 @@
|
|||||||
### [Create provisioning packages for Surface Hub 2S](surface-hub-2s-deploy.md)
|
### [Create provisioning packages for Surface Hub 2S](surface-hub-2s-deploy.md)
|
||||||
### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md)
|
### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md)
|
||||||
### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md)
|
### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md)
|
||||||
|
### [Surface Hub Teams app](hub-teams-app.md)
|
||||||
|
|
||||||
## Manage
|
## Manage
|
||||||
### [Manage Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)
|
### [Manage Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md)
|
||||||
|
23
devices/surface-hub/hub-teams-app.md
Normal file
23
devices/surface-hub/hub-teams-app.md
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Teams app for Surface Hub
|
||||||
|
description: Provides a version history of updates for the Microsoft Teams app for Surface Hub
|
||||||
|
keywords: surface, hub,
|
||||||
|
ms.prod: surface-hub
|
||||||
|
ms.sitesec: library
|
||||||
|
author: greglin
|
||||||
|
ms.author: greglin
|
||||||
|
ms.topic: article
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Teams app for Surface Hub
|
||||||
|
|
||||||
|
The Microsoft Teams app for Surface Hub is periodically updated and available via the [Microsoft Store](https://www.microsoft.com/store/apps/windows). If you manage Surface Hub with Automatic Updates enabled (default setting), the app will update automatically.
|
||||||
|
|
||||||
|
|
||||||
|
## Version history
|
||||||
|
| Store app version | Updates | Published to Microsoft Store |
|
||||||
|
| --------------------- | --------------------------------------------------------------------------------------------------- | -------------------------------- |
|
||||||
|
| 0.2020.13201.0 | - 3x3 Gallery view on Surface Hub<br>- Ability to search for External users | June 10, 2020<br> **** |
|
||||||
|
| 0.2020.13201 | - Quality improvements and Bug fixes | June 1, 2020<br> **** |
|
||||||
|
| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub<br>- Added controls for Attendee/Presenter role changes | May 21, 2020 |
|
@ -16,6 +16,8 @@ ms.date: 04/02/2020
|
|||||||
|
|
||||||
# App-V 5.1 Supported Configurations
|
# App-V 5.1 Supported Configurations
|
||||||
|
|
||||||
|
>Applies to: Windows 10, version 1607; Window Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 (Extended Security Update)
|
||||||
|
|
||||||
This topic specifies the requirements to install and run Microsoft Application Virtualization (App-V) 5.1 in your environment.
|
This topic specifies the requirements to install and run Microsoft Application Virtualization (App-V) 5.1 in your environment.
|
||||||
|
|
||||||
## App-V Server system requirements
|
## App-V Server system requirements
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to create a package accelerator (Windows 10)
|
title: How to create a package accelerator (Windows 10)
|
||||||
description: How to create a package accelerator.
|
description: Learn how to create App-V Package Accelerators to automatically generate new virtual application packages.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Application Virtualization (App-V) (Windows 10)
|
title: Application Virtualization (App-V) (Windows 10)
|
||||||
description: Application Virtualization (App-V)
|
description: See various topics that can help you administer Application Virtualization (App-V) and its components.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Getting Started with App-V (Windows 10)
|
title: Getting Started with App-V (Windows 10)
|
||||||
description: Getting Started with App-V for Windows 10
|
description: Get started with Microsoft Application Virtualization (App-V) for Windows 10.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Install the Publishing Server on a Remote Computer (Windows 10)
|
title: Install the Publishing Server on a Remote Computer (Windows 10)
|
||||||
description: How to Install the App-V Publishing Server on a Remote Computer
|
description: Use the procedures in this article to install the Microsoft Application Virtualization (App-V) publishing server on a separate computer.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -38,7 +38,7 @@ Use the following procedure to install the publishing server on a separate compu
|
|||||||
3. Enter the server name and a description (if required), then select **Add**.
|
3. Enter the server name and a description (if required), then select **Add**.
|
||||||
9. To verify that the publishing server is running correctly, you should import a package to the management server, entitle that package to an AD group, then publish it. Using an internet browser, open the following URL: <strong>https://publishingserver:pubport</strong>. If the server is running correctly, information like the following example should appear.
|
9. To verify that the publishing server is running correctly, you should import a package to the management server, entitle that package to an AD group, then publish it. Using an internet browser, open the following URL: <strong>https://publishingserver:pubport</strong>. If the server is running correctly, information like the following example should appear.
|
||||||
|
|
||||||
```SQL
|
```xml
|
||||||
<Publishing Protocol="1.0">
|
<Publishing Protocol="1.0">
|
||||||
|
|
||||||
<Packages>
|
<Packages>
|
||||||
|
@ -14,7 +14,7 @@ ms.topic: article
|
|||||||
---
|
---
|
||||||
# App-V Supported Configurations
|
# App-V Supported Configurations
|
||||||
|
|
||||||
>Applies to: Windows 10, version 1607; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2
|
>Applies to: Windows 10, version 1607; Window Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 (Extended Security Update)
|
||||||
|
|
||||||
This topic specifies the requirements to install and run App-V in your Windows 10 environment. For information about prerequisite software such as the .NET Framework, see [App-V prerequisites](appv-prerequisites.md).
|
This topic specifies the requirements to install and run App-V in your Windows 10 environment. For information about prerequisite software such as the .NET Framework, see [App-V prerequisites](appv-prerequisites.md).
|
||||||
|
|
||||||
@ -34,7 +34,7 @@ The App-V server does not support the following scenarios:
|
|||||||
|
|
||||||
### Management server operating system requirements
|
### Management server operating system requirements
|
||||||
|
|
||||||
You can install the App-V Management server on a server running Windows Server 2008 R2 with SP1 or later.
|
You can install the App-V Management server on a server running Windows Server 2008 R2 with SP1 (Extended Security Update) or later.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Deploying a Management server role to a computer with Remote Desktop Services enabled is not supported.
|
>Deploying a Management server role to a computer with Remote Desktop Services enabled is not supported.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Certificate Renewal
|
title: Certificate Renewal
|
||||||
description: The enrolled client certificate expires after a period of use.
|
description: Find all the resources needed to provide continuous access to client certificates.
|
||||||
MS-HAID:
|
MS-HAID:
|
||||||
- 'p\_phdevicemgmt.certificate\_renewal'
|
- 'p\_phdevicemgmt.certificate\_renewal'
|
||||||
- 'p\_phDeviceMgmt.certificate\_renewal\_windows\_mdm'
|
- 'p\_phDeviceMgmt.certificate\_renewal\_windows\_mdm'
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: ClientCertificateInstall CSP
|
title: ClientCertificateInstall CSP
|
||||||
description: ClientCertificateInstall CSP
|
description: The ClientCertificateInstall configuration service provider (CSP) enables the enterprise to install client certificates.
|
||||||
ms.assetid: B624EB73-2972-47F2-9D7E-826D641BF8A7
|
ms.assetid: B624EB73-2972-47F2-9D7E-826D641BF8A7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Defender CSP
|
title: Defender CSP
|
||||||
description: Defender CSP
|
description: See how the Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise.
|
||||||
ms.assetid: 481AA74F-08B2-4A32-B95D-5A3FD05B335C
|
ms.assetid: 481AA74F-08B2-4A32-B95D-5A3FD05B335C
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Defender DDF file
|
title: Defender DDF file
|
||||||
description: Defender DDF file
|
description: See how the the OMA DM device description framework (DDF) for the **Defender** configuration service provider is used.
|
||||||
ms.assetid: 39B9E6CF-4857-4199-B3C3-EC740A439F65
|
ms.assetid: 39B9E6CF-4857-4199-B3C3-EC740A439F65
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseAppVManagement CSP
|
title: EnterpriseAppVManagement CSP
|
||||||
description: EnterpriseAppVManagement CSP
|
description: Examine the tree format for EnterpriseAppVManagement configuration service provider (CSP) to manage virtual applications in Windows 10 PCs.(Enterprise and Education editions).
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseAssignedAccess XSD
|
title: EnterpriseAssignedAccess XSD
|
||||||
description: EnterpriseAssignedAccess XSD
|
description: This XSD can be used to validate that the lockdown XML in the \<Data\> block of the AssignedAccessXML node.
|
||||||
ms.assetid: BB3B633E-E361-4B95-9D4A-CE6E08D67ADA
|
ms.assetid: BB3B633E-E361-4B95-9D4A-CE6E08D67ADA
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - AttachmentManager
|
title: Policy CSP - AttachmentManager
|
||||||
description: Policy CSP - AttachmentManager
|
description: Manage Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local).
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - Education
|
title: Policy CSP - Education
|
||||||
description: Policy CSP - Education
|
description: Control graphing functionality in the Windows Calculator app.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - MSSecurityGuide
|
title: Policy CSP - MSSecurityGuide
|
||||||
description: Policy CSP - MSSecurityGuide
|
description: See how this ADMX-backed policy requires a special SyncML format to enable or disable.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - System
|
title: Policy CSP - System
|
||||||
description: Policy CSP - System
|
description: Learn policy settings that determines whether users can access the Insider build controls in the advanced options for Windows Update.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Validate kiosk configuration (Windows 10)
|
title: Validate kiosk configuration (Windows 10)
|
||||||
description: This topic explains what to expect on a multi-app kiosk.
|
description: Learn what to expect on a multi-app kiosk in Windows 10 Pro, Enterprise, and Education.
|
||||||
ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC
|
ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Troubleshooting UE-V
|
title: Troubleshooting UE-V
|
||||||
description: Troubleshooting UE-V
|
description: Find resources for troubleshooting UE-V for Windows 10.
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.pagetype: mdop, virtualization
|
ms.pagetype: mdop, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Using UE-V with Application Virtualization applications
|
title: Using UE-V with Application Virtualization applications
|
||||||
description: Using UE-V with Application Virtualization applications
|
description: Learn how to use User Experience Virtualization (UE-V) with Microsoft Application Virtualization (App-V).
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.pagetype: mdop, virtualization
|
ms.pagetype: mdop, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deploy Windows 10 (Windows 10)
|
title: Deploy Windows 10 (Windows 10)
|
||||||
description: Deploying Windows 10 for IT professionals.
|
description: Learn Windows 10 upgrade options for planning, testing, and managing your production deployment.
|
||||||
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows Update - Additional resources
|
title: Windows Update - Additional resources
|
||||||
description: Additional resources for Windows Update
|
description: Use these resource to troubleshoot and reset Windows Update.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl:
|
ms.mktglfcycl:
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Determine What to Migrate (Windows 10)
|
title: Determine What to Migrate (Windows 10)
|
||||||
description: Determine What to Migrate
|
description: Determine migration settings for standard or customized for the User State Migration Tool (USMT) 10.0.
|
||||||
ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761
|
ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
@ -8,7 +8,8 @@ ms.author: greglin
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
audience: itpro
author: greg-lindsay
|
audience: itpro
|
||||||
|
author: greg-lindsay
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: VAMT known issues (Windows 10)
|
title: VAMT known issues (Windows 10)
|
||||||
description: Volume Activation Management Tool (VAMT) known issues
|
description: Find out the current known issues with the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1.
|
||||||
ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
title: Windows Autopilot requirements
|
title: Windows Autopilot requirements
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
description: Inform yourself about software, networking, licensing, and configuration requirements for Windows Autopilot deployment.
|
description: See the requirements you need to run Windows Autopilot in Windows 10, Azure Active Directory, and MDM services such as Microsoft Intune.
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
### YamlMime:YamlDocument
|
### YamlMime:YamlDocument
|
||||||
|
|
||||||
documentType: LandingData
|
documentType: LandingData
|
||||||
title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1
|
title: See a list of known issues that have been resolved for Windows 7 and Windows Server 2008 R2 SP1 over the last six months.
|
||||||
metadata:
|
metadata:
|
||||||
document_id:
|
document_id:
|
||||||
title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1
|
title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
### YamlMime:YamlDocument
|
### YamlMime:YamlDocument
|
||||||
|
|
||||||
documentType: LandingData
|
documentType: LandingData
|
||||||
title: Resolved issues in Windows Server 2012
|
title: See a list of known issues that have been resolved for Windows Server 2012 over the last six months.
|
||||||
metadata:
|
metadata:
|
||||||
document_id:
|
document_id:
|
||||||
title: Resolved issues in Windows Server 2012
|
title: Resolved issues in Windows Server 2012
|
||||||
|
@ -5,7 +5,7 @@ title: Windows 8.1 and Windows Server 2012 R2
|
|||||||
metadata:
|
metadata:
|
||||||
document_id:
|
document_id:
|
||||||
title: Windows 8.1 and Windows Server 2012 R2
|
title: Windows 8.1 and Windows Server 2012 R2
|
||||||
description: View announcements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2
|
description: View announcements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2.
|
||||||
keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories
|
keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
|
@ -5,7 +5,7 @@ title: Windows Server 2008 SP2
|
|||||||
metadata:
|
metadata:
|
||||||
document_id:
|
document_id:
|
||||||
title: Windows Server 2008 SP2
|
title: Windows Server 2008 SP2
|
||||||
description: View announcements and review known issues and fixes for Windows Server 2008 SP2
|
description: View announcements and review known issues and fixes for Windows Server 2008 SP2.
|
||||||
keywords: Windows, Windows 10, issues, fixes, announcements, Windows Server, advisories
|
keywords: Windows, Windows 10, issues, fixes, announcements, Windows Server, advisories
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
|
@ -68,7 +68,7 @@ After whitelisting the URLs listed above, you can test if you are connected to t
|
|||||||
|
|
||||||
Use the following argument with the Microsoft Defender Antivirus command-line utility (`mpcmdrun.exe`) to verify that your network can communicate with the Microsoft Defender Antivirus cloud service:
|
Use the following argument with the Microsoft Defender Antivirus command-line utility (`mpcmdrun.exe`) to verify that your network can communicate with the Microsoft Defender Antivirus cloud service:
|
||||||
|
|
||||||
```DOS
|
```console
|
||||||
"%ProgramFiles%\Windows Defender\MpCmdRun.exe" -ValidateMapsConnection
|
"%ProgramFiles%\Windows Defender\MpCmdRun.exe" -ValidateMapsConnection
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -87,9 +87,7 @@ Download the file by visiting the following link:
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>This file is not an actual piece of malware. It is a fake file that is designed to test if you are properly connected to the cloud.
|
>This file is not an actual piece of malware. It is a fake file that is designed to test if you are properly connected to the cloud.
|
||||||
|
|
||||||
If you are properly connected, you will see a warning Microsoft Defender Antivirus notification:
|
If you are properly connected, you will see a warning Microsoft Defender Antivirus notification.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
If you are using Microsoft Edge, you'll also see a notification message:
|
If you are using Microsoft Edge, you'll also see a notification message:
|
||||||
|
|
||||||
@ -107,9 +105,7 @@ You will also see a detection under **Quarantined threats** in the **Scan histor
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware:
|
3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
|
> Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md).
|
||||||
|
@ -34,12 +34,17 @@ You can use **Local Group Policy Editor** to enable and configure Microsoft Defe
|
|||||||
To enable and configure always-on protection:
|
To enable and configure always-on protection:
|
||||||
|
|
||||||
1. Open **Local Group Policy Editor**. To do this:
|
1. Open **Local Group Policy Editor**. To do this:
|
||||||
|
|
||||||
1. In your Windows 10 taskbar search box, type **gpedit**.
|
1. In your Windows 10 taskbar search box, type **gpedit**.
|
||||||
2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**.
|
|
||||||
|
1. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
|
2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**.
|
||||||

|
|
||||||
3. Configure the Microsoft Defender Antivirus antimalware service policy settings. To do this:
|
3. Configure the Microsoft Defender Antivirus antimalware service policy settings. To do this:
|
||||||
|
|
||||||
1. In the **Microsoft Defender Antivirus** details pane on right, double-click the policy setting as specified in the following table:
|
1. In the **Microsoft Defender Antivirus** details pane on right, double-click the policy setting as specified in the following table:
|
||||||
|
|
||||||
| Setting | Description | Default setting |
|
| Setting | Description | Default setting |
|
||||||
@ -47,13 +52,15 @@ To enable and configure always-on protection:
|
|||||||
| Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled
|
| Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled
|
||||||
| Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled |
|
| Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled |
|
||||||
|
|
||||||
2. Configure the setting as appropriate, and click **OK**.
|
1. Configure the setting as appropriate, and click **OK**.
|
||||||
3. Repeat the previous steps for each setting in the table.
|
|
||||||
|
1. Repeat the previous steps for each setting in the table.
|
||||||
|
|
||||||
4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this:
|
4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this:
|
||||||
|
|
||||||
1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, click **Real-time Protection**.
|
1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, click **Real-time Protection**.
|
||||||

|
|
||||||
2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table:
|
1. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table:
|
||||||
|
|
||||||
| Setting | Description | Default setting |
|
| Setting | Description | Default setting |
|
||||||
|-----------------------------|------------------------|-------------------------------|
|
|-----------------------------|------------------------|-------------------------------|
|
||||||
@ -70,42 +77,54 @@ To enable and configure always-on protection:
|
|||||||
| Configure local setting override for monitoring for incoming and outgoing file activity | Configure a local override for the configuration of monitoring for incoming and outgoing file activity. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. | Enabled |
|
| Configure local setting override for monitoring for incoming and outgoing file activity | Configure a local override for the configuration of monitoring for incoming and outgoing file activity. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. | Enabled |
|
||||||
| Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) |
|
| Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) |
|
||||||
|
|
||||||
3. Configure the setting as appropriate, and click **OK**.
|
1. Configure the setting as appropriate, and click **OK**.
|
||||||
4. Repeat the previous steps for each setting in the table.
|
|
||||||
|
1. Repeat the previous steps for each setting in the table.
|
||||||
|
|
||||||
5. Configure the Microsoft Defender Antivirus scanning policy setting. To do this:
|
5. Configure the Microsoft Defender Antivirus scanning policy setting. To do this:
|
||||||
|
|
||||||
1. From the **Microsoft Defender Antivirus** tree on left pane, click **Scan**.
|
1. From the **Microsoft Defender Antivirus** tree on left pane, click **Scan**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
2. In the **Scan** details pane on right, double-click the policy setting as specified in the following table:
|
1. In the **Scan** details pane on right, double-click the policy setting as specified in the following table:
|
||||||
|
|
||||||
| Setting | Description | Default setting |
|
| Setting | Description | Default setting |
|
||||||
|-----------------------------|------------------------|-------------------------------|
|
|-----------------------------|------------------------|-------------------------------|
|
||||||
| Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the Microsoft Defender Antivirus engine is asked to detect the activity. | Enabled |
|
| Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the Microsoft Defender Antivirus engine is asked to detect the activity. | Enabled |
|
||||||
|
|
||||||
3. Configure the setting as appropriate, and click **OK**.
|
1. Configure the setting as appropriate, and click **OK**.
|
||||||
|
|
||||||
6. Close **Local Group Policy Editor**.
|
6. Close **Local Group Policy Editor**.
|
||||||
|
|
||||||
|
|
||||||
## Disable real-time protection in Group Policy
|
## Disable real-time protection in Group Policy
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> Disabling real-time protection drastically reduces the protection on your endpoints and is not recommended.
|
> Disabling real-time protection drastically reduces the protection on your endpoints and is not recommended.
|
||||||
|
|
||||||
The main real-time protection capability is enabled by default, but you can disable it by using **Local Group Policy Editor**.
|
The main real-time protection capability is enabled by default, but you can disable it by using **Local Group Policy Editor**.
|
||||||
|
|
||||||
To disable real-time protection in Group policy:
|
To disable real-time protection in Group policy:
|
||||||
|
|
||||||
1. Open **Local Group Policy Editor**.
|
1. Open **Local Group Policy Editor**.
|
||||||
|
|
||||||
1. In your Windows 10 taskbar search box, type **gpedit**.
|
1. In your Windows 10 taskbar search box, type **gpedit**.
|
||||||
2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**.
|
|
||||||
|
1. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**.
|
||||||
|
|
||||||
2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Real-time Protection**.
|
2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Real-time Protection**.
|
||||||
|
|
||||||
3. In the **Real-time Protection** details pane on right, double-click **Turn off real-time protection**.
|
3. In the **Real-time Protection** details pane on right, double-click **Turn off real-time protection**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
4. In the **Turn off real-time protection** setting window, set the option to **Enabled**.
|
4. In the **Turn off real-time protection** setting window, set the option to **Enabled**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Click **OK**.
|
5. Click **OK**.
|
||||||
|
|
||||||
6. Close **Local Group Policy Editor**.
|
6. Close **Local Group Policy Editor**.
|
||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
@ -39,18 +39,12 @@ If Microsoft Defender Antivirus is enabled, the usual options will appear to con
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options:
|
If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options.
|
||||||
|
|
||||||

|
Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning. Note that the limited periodic option is a toggle to enable or disable periodic scanning.
|
||||||
|
|
||||||
Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
## Related articles
|
## Related articles
|
||||||
|
|
||||||
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
|
- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md)
|
||||||
|
@ -61,9 +61,7 @@ In Windows Server 2016, the **Add Roles and Features Wizard** looks like this:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
In Windows Server 2019, the **Add Roles and Feature Wizard** looks like this:
|
In Windows Server 2019, the **Add Roles and Feature Wizard** looks much the same.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Turn on the GUI using PowerShell
|
### Turn on the GUI using PowerShell
|
||||||
|
|
||||||
@ -110,7 +108,7 @@ Get-Service -Name mpssvc
|
|||||||
|
|
||||||
As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt:
|
As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt:
|
||||||
|
|
||||||
```DOS
|
```console
|
||||||
sc query Windefend
|
sc query Windefend
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -62,9 +62,7 @@ The prompt can occur via a notification, similar to the following:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
The user will also be notified within the Windows Defender client:
|
The user will also be notified within the Windows Defender client.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**.
|
In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**.
|
||||||
|
|
||||||
@ -108,7 +106,7 @@ Use the [**MSFT_MpWDOScan**](https://msdn.microsoft.com/library/dn455323(v=vs.85
|
|||||||
|
|
||||||
The following WMI script snippet will immediately run a Microsoft Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows.
|
The following WMI script snippet will immediately run a Microsoft Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows.
|
||||||
|
|
||||||
```WMI
|
```console
|
||||||
wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start
|
wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -122,10 +120,8 @@ See the following for more information:
|
|||||||
|
|
||||||
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Advanced scan** label:
|
2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Advanced scan** label:
|
||||||
|
|
||||||
|
|
||||||
3. Select **Microsoft Defender Offline scan** and click **Scan now**.
|
3. Select **Microsoft Defender Offline scan** and click **Scan now**.
|
||||||
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1607, the offline scan could be run from under **Windows Settings** > **Update & security** > **Windows Defender** or from the Windows Defender client.
|
> In Windows 10, version 1607, the offline scan could be run from under **Windows Settings** > **Update & security** > **Windows Defender** or from the Windows Defender client.
|
||||||
|
|
||||||
|
@ -112,10 +112,6 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-
|
|||||||
|
|
||||||
5. Assign the profile to one or more groups.
|
5. Assign the profile to one or more groups.
|
||||||
|
|
||||||
Here's what you see in the Windows Security app:
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
### Are you using Windows OS 1709, 1803, or 1809?
|
### Are you using Windows OS 1709, 1803, or 1809?
|
||||||
|
|
||||||
If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled.
|
If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled.
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Get started with Windows 10, version 1709
|
title: Get started with Windows 10, version 1709
|
||||||
description: All the information to get you started with Windows 10, version 1709.
|
description: Learn the dos and don'ts for getting started with Windows 10, version 1709.
|
||||||
keywords: ["get started", "windows 10", "fall creators update", "1709"]
|
keywords: ["get started", "windows 10", "fall creators update", "1709"]
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
Loading…
x
Reference in New Issue
Block a user