mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-25 11:47:23 +00:00
Merge branch 'master' into v-gmoor-tocs-conversion-to-yml
This commit is contained in:
commit
715a1d0e26
@ -84,9 +84,13 @@ The following steps demonstrate required settings using the Intune service:
|
|||||||
You may contact your domain administrators to verify if the group policy has been deployed successfully.
|
You may contact your domain administrators to verify if the group policy has been deployed successfully.
|
||||||
|
|
||||||
8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal).
|
8. Verify that the device is not enrolled with the old Intune client used on the Intune Silverlight Portal (this is the Intune portal used before the Azure portal).
|
||||||
|
|
||||||
9. Verify that Azure AD allows the logon user to enroll devices.
|
9. Verify that Azure AD allows the logon user to enroll devices.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
10. Verify that Microsoft Intune should allow enrollment of Windows devices.
|
10. Verify that Microsoft Intune should allow enrollment of Windows devices.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Configure the auto-enrollment Group Policy for a single PC
|
## Configure the auto-enrollment Group Policy for a single PC
|
||||||
@ -108,18 +112,21 @@ Requirements:
|
|||||||
|
|
||||||
3. In **Local Computer Policy**, click **Administrative Templates** > **Windows Components** > **MDM**.
|
3. In **Local Computer Policy**, click **Administrative Templates** > **Windows Components** > **MDM**.
|
||||||
|
|
||||||

|
> [!div class="mx-imgBorder"]
|
||||||
|
> 
|
||||||
|
|
||||||
4. Double-click **Enable automatic MDM enrollment using default Azure AD credentials** (previously called **Auto MDM Enrollment with AAD Token** in Windows 10, version 1709). For ADMX files in Windows 10, version 1903 and later, select **User Credential** as the Selected Credential Type to use.
|
4. Double-click **Enable automatic MDM enrollment using default Azure AD credentials** (previously called **Auto MDM Enrollment with AAD Token** in Windows 10, version 1709). For ADMX files in Windows 10, version 1903 and later, select **User Credential** as the Selected Credential Type to use.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> **Device Credential** Credential Type may work, however, it is not yet supported by Intune. We don't recommend using this option until it's supported.
|
> **Device Credential** Credential Type may work, however, it is not yet supported by Intune. We don't recommend using this option until it's supported.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
|
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later.
|
> In Windows 10, version 1903, the MDM.admx file was updated to include an option to select which credential is used to enroll the device. **Device Credential** is a new option that will only have an effect on clients that have installed Windows 10, version 1903 or later.
|
||||||
|
>
|
||||||
> The default behavior for older releases is to revert to **User Credential**.
|
> The default behavior for older releases is to revert to **User Credential**.
|
||||||
> **Device Credential** is not supported for enrollment type when you have a ConfigMgr Agent on your device.
|
> **Device Credential** is not supported for enrollment type when you have a ConfigMgr Agent on your device.
|
||||||
|
|
||||||
@ -158,7 +165,10 @@ Requirements:
|
|||||||
|
|
||||||
To see the result of the task, move the scroll bar to the right to see the **Last Run Result**. Note that **0x80180026** is a failure message (MENROLL\_E_DEVICE\_MANAGEMENT_BLOCKED). You can see the logs in the **History** tab.
|
To see the result of the task, move the scroll bar to the right to see the **Last Run Result**. Note that **0x80180026** is a failure message (MENROLL\_E_DEVICE\_MANAGEMENT_BLOCKED). You can see the logs in the **History** tab.
|
||||||
|
|
||||||
If the device enrollment is blocked, your IT admin may have enabled the **Disable MDM Enrollment** policy. Note that the GPEdit console does not reflect the status of policies set by your IT admin on your device. It is only used by the user to set policies.
|
If the device enrollment is blocked, your IT admin may have enabled the **Disable MDM Enrollment** policy.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The GPEdit console does not reflect the status of policies set by your IT admin on your device. It is only used by the user to set policies.
|
||||||
|
|
||||||
## Configure the auto-enrollment for a group of devices
|
## Configure the auto-enrollment for a group of devices
|
||||||
|
|
||||||
@ -203,11 +213,11 @@ Requirements:
|
|||||||
|
|
||||||
4. Rename the extracted Policy Definitions folder to **PolicyDefinitions**.
|
4. Rename the extracted Policy Definitions folder to **PolicyDefinitions**.
|
||||||
|
|
||||||
5. Copy PolicyDefinitions folder to **C:\Windows\SYSVOL\domain\Policies**.
|
5. Copy PolicyDefinitions folder to **\\contoso.com\SYSVOL\contoso.com\policies\PolicyDefinitions**.
|
||||||
|
|
||||||
If this folder does not exist, then be aware that you will be switching to a [central policy store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) for your entire domain.
|
If this folder does not exist, then be aware that you will be switching to a [central policy store](https://support.microsoft.com/help/3087759/how-to-create-and-manage-the-central-store-for-group-policy-administra) for your entire domain.
|
||||||
|
|
||||||
6. Restart the Domain Controller for the policy to be available.
|
6. Wait for the SYSVOL DFSR replication to be completed and then restart the Domain Controller for the policy to be available.
|
||||||
|
|
||||||
This procedure will work for any future version as well.
|
This procedure will work for any future version as well.
|
||||||
|
|
||||||
@ -231,16 +241,22 @@ To collect Event Viewer logs:
|
|||||||
> For guidance on how to collect event logs for Intune, see [Collect MDM Event Viewer Log YouTube video](https://www.youtube.com/watch?v=U_oCe2RmQEc).
|
> For guidance on how to collect event logs for Intune, see [Collect MDM Event Viewer Log YouTube video](https://www.youtube.com/watch?v=U_oCe2RmQEc).
|
||||||
|
|
||||||
3. Search for event ID 75, which represents a successful auto-enrollment. Here is an example screenshot that shows the auto-enrollment completed successfully:
|
3. Search for event ID 75, which represents a successful auto-enrollment. Here is an example screenshot that shows the auto-enrollment completed successfully:
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
If you cannot find event ID 75 in the logs, it indicates that the auto-enrollment failed. This can happen because of the following reasons:
|
If you cannot find event ID 75 in the logs, it indicates that the auto-enrollment failed. This can happen because of the following reasons:
|
||||||
|
|
||||||
- The enrollment failed with error. In this case, search for event ID 76, which represents failed auto-enrollment. Here is an example screenshot that shows that the auto-enrollment failed:
|
- The enrollment failed with error. In this case, search for event ID 76, which represents failed auto-enrollment. Here is an example screenshot that shows that the auto-enrollment failed:
|
||||||

|
|
||||||
To troubleshoot, check the error code that appears in the event. See [Troubleshooting Windows device enrollment problems in Microsoft Intune](https://support.microsoft.com/en-ph/help/4469913/troubleshooting-windows-device-enrollment-problems-in-microsoft-intune) for more information.
|

|
||||||
|
|
||||||
|
To troubleshoot, check the error code that appears in the event. See [Troubleshooting Windows device enrollment problems in Microsoft Intune](https://support.microsoft.com/en-ph/help/4469913/troubleshooting-windows-device-enrollment-problems-in-microsoft-intune) for more information.
|
||||||
|
|
||||||
- The auto-enrollment did not trigger at all. In this case, you will not find either event ID 75 or event ID 76. To know the reason, you must understand the internal mechanisms happening on the device as described in the following section.
|
- The auto-enrollment did not trigger at all. In this case, you will not find either event ID 75 or event ID 76. To know the reason, you must understand the internal mechanisms happening on the device as described in the following section.
|
||||||
|
|
||||||
The auto-enrollment process is triggered by a task (**Microsoft > Windows > EnterpriseMgmt**) within the task-scheduler. This task appears if the *Enable automatic MDM enrollment using default Azure AD credentials* group policy (**Computer Configuration > Policies > Administrative Templates > Windows Components > MDM**) is successfully deployed to the target machine as shown in the following screenshot:
|
The auto-enrollment process is triggered by a task (**Microsoft > Windows > EnterpriseMgmt**) within the task-scheduler. This task appears if the *Enable automatic MDM enrollment using default Azure AD credentials* group policy (**Computer Configuration > Policies > Administrative Templates > Windows Components > MDM**) is successfully deployed to the target machine as shown in the following screenshot:
|
||||||

|
|
||||||
|

|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> This task isn't visible to standard users - run Scheduled Tasks with administrative credentials to find the task.
|
> This task isn't visible to standard users - run Scheduled Tasks with administrative credentials to find the task.
|
||||||
@ -252,6 +268,7 @@ To collect Event Viewer logs:
|
|||||||

|

|
||||||
|
|
||||||
When the task is completed, a new event ID 102 is logged.
|
When the task is completed, a new event ID 102 is logged.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
Note that the task scheduler log displays event ID 102 (task completed) regardless of the auto-enrollment success or failure. This means that the task scheduler log is only useful to confirm if the auto-enrollment task is triggered or not. It does not indicate the success or failure of auto-enrollment.
|
Note that the task scheduler log displays event ID 102 (task completed) regardless of the auto-enrollment success or failure. This means that the task scheduler log is only useful to confirm if the auto-enrollment task is triggered or not. It does not indicate the success or failure of auto-enrollment.
|
||||||
@ -262,6 +279,7 @@ To collect Event Viewer logs:
|
|||||||

|

|
||||||
|
|
||||||
By default, these entries are removed when the device is un-enrolled, but occasionally the registry key remains even after un-enrollment. In this case, `gpupdate /force` fails to initiate the auto-enrollment task and error code 2149056522 is displayed in the **Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational** event log file under event ID 7016.
|
By default, these entries are removed when the device is un-enrolled, but occasionally the registry key remains even after un-enrollment. In this case, `gpupdate /force` fails to initiate the auto-enrollment task and error code 2149056522 is displayed in the **Applications and Services Logs > Microsoft > Windows > Task Scheduler > Operational** event log file under event ID 7016.
|
||||||
|
|
||||||
A resolution to this issue is to remove the registry key manually. If you do not know which registry key to remove, go for the key which displays most entries as the screenshot above. All other keys will display fewer entries as shown in the following screenshot:
|
A resolution to this issue is to remove the registry key manually. If you do not know which registry key to remove, go for the key which displays most entries as the screenshot above. All other keys will display fewer entries as shown in the following screenshot:
|
||||||
|
|
||||||

|

|
||||||
|
@ -57,12 +57,12 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
|
|
||||||
<a href="" id="policy-config-areaname"></a>**Policy/Config/**<strong>*AreaName*</strong>
|
<a href="" id="policy-config-areaname"></a>**Policy/Config/_AreaName_**
|
||||||
<p style="margin-left: 20px">The area group that can be configured by a single technology for a single provider. Once added, you cannot change the value.
|
<p style="margin-left: 20px">The area group that can be configured by a single technology for a single provider. Once added, you cannot change the value.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
||||||
|
|
||||||
<a href="" id="policy-config-areaname-policyname"></a>**Policy/Config/**<strong>*AreaName/PolicyName*</strong>
|
<a href="" id="policy-config-areaname-policyname"></a>**Policy/Config/_AreaName/PolicyName_**
|
||||||
<p style="margin-left: 20px">Specifies the name/value pair used in the policy.
|
<p style="margin-left: 20px">Specifies the name/value pair used in the policy.
|
||||||
|
|
||||||
<p style="margin-left: 20px">The following list shows some tips to help you when configuring policies:
|
<p style="margin-left: 20px">The following list shows some tips to help you when configuring policies:
|
||||||
@ -81,12 +81,12 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
|
|
||||||
<a href="" id="policy-result-areaname"></a>**Policy/Result/**<strong>*AreaName*</strong>
|
<a href="" id="policy-result-areaname"></a>**Policy/Result/_AreaName_**
|
||||||
<p style="margin-left: 20px">The area group that can be configured by a single technology independent of the providers.
|
<p style="margin-left: 20px">The area group that can be configured by a single technology independent of the providers.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
|
|
||||||
<a href="" id="policy-result-areaname-policyname"></a>**Policy/Result/**<strong>*AreaName/PolicyName*</strong>
|
<a href="" id="policy-result-areaname-policyname"></a>**Policy/Result/_AreaName/PolicyName_**
|
||||||
<p style="margin-left: 20px">Specifies the name/value pair used in the policy.
|
<p style="margin-left: 20px">Specifies the name/value pair used in the policy.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operation is Get.
|
<p style="margin-left: 20px">Supported operation is Get.
|
||||||
@ -102,31 +102,31 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The OPAX settings that are managed by the Microsoft Office Customization Tool are not supported by MDM. For more information about this tool, see [Office Customization Tool](/previous-versions/office/office-2013-resource-kit/cc179097(v=office.15)).
|
> The OPAX settings that are managed by the Microsoft Office Customization Tool are not supported by MDM. For more information about this tool, see [Office Customization Tool](/previous-versions/office/office-2013-resource-kit/cc179097(v=office.15)).
|
||||||
|
|
||||||
<p style="margin-left: 20px">ADMX files that have been installed by using <strong>ConfigOperations/ADMXInstall</strong> can later be deleted by using the URI delete operation. Deleting an ADMX file will delete the ADMX file from disk, remove the metadata from the ADMXdefault registry hive, and delete all the policies that were set from the file. The MDM server can also delete all ADMX policies that are tied to a particular app by calling delete on the URI, <code>./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}</code>.
|
<p style="margin-left: 20px">ADMX files that have been installed by using **ConfigOperations/ADMXInstall** can later be deleted by using the URI delete operation. Deleting an ADMX file will delete the ADMX file from disk, remove the metadata from the ADMXdefault registry hive, and delete all the policies that were set from the file. The MDM server can also delete all ADMX policies that are tied to a particular app by calling delete on the URI, <code>./Vendor/MSFT/Policy/ConfigOperations/ADMXInstall/{AppName}</code>.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
||||||
|
|
||||||
<a href="" id="policy-configoperations-admxinstall-appname"></a>**Policy/ConfigOperations/ADMXInstall/**<strong>*AppName*</strong>
|
<a href="" id="policy-configoperations-admxinstall-appname"></a>**Policy/ConfigOperations/ADMXInstall/_AppName_**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the name of the Win32 or Desktop Bridge app associated with the ADMX file.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the name of the Win32 or Desktop Bridge app associated with the ADMX file.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
||||||
|
|
||||||
<a href="" id="policy-configoperations-admxinstall-appname-policy"></a>**Policy/ConfigOperations/ADMXInstall/**<strong>*AppName*/Policy</strong>
|
<a href="" id="policy-configoperations-admxinstall-appname-policy"></a>**Policy/ConfigOperations/ADMXInstall/_AppName_/Policy**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies that a Win32 or Desktop Bridge app policy is to be imported.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies that a Win32 or Desktop Bridge app policy is to be imported.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
||||||
|
|
||||||
<a href="" id="policy-configoperations-admxinstall-appname-policy-uniqueid"></a>**Policy/ConfigOperations/ADMXInstall/**<strong>*AppName*/Policy/*UniqueID*</strong>
|
<a href="" id="policy-configoperations-admxinstall-appname-policy-uniqueid"></a>**Policy/ConfigOperations/ADMXInstall/_AppName_/Policy/_UniqueID_**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the unique ID of the app ADMX file that contains the policy to import.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the unique ID of the app ADMX file that contains the policy to import.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add and Get. Does not support Delete.
|
<p style="margin-left: 20px">Supported operations are Add and Get. Does not support Delete.
|
||||||
|
|
||||||
<a href="" id="policy-configoperations-admxinstall-appname-preference"></a>**Policy/ConfigOperations/ADMXInstall/**<strong>*AppName*/Preference</strong>
|
<a href="" id="policy-configoperations-admxinstall-appname-preference"></a>**Policy/ConfigOperations/ADMXInstall/_AppName_/Preference**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies that a Win32 or Desktop Bridge app preference is to be imported.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies that a Win32 or Desktop Bridge app preference is to be imported.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
<p style="margin-left: 20px">Supported operations are Add, Get, and Delete.
|
||||||
|
|
||||||
<a href="" id="policy-configoperations-admxinstall-appname-preference-uniqueid"></a>**Policy/ConfigOperations/ADMXInstall/**<strong>*AppName*/Preference/*UniqueID*</strong>
|
<a href="" id="policy-configoperations-admxinstall-appname-preference-uniqueid"></a>**Policy/ConfigOperations/ADMXInstall/_AppName_/Preference/_UniqueID_**
|
||||||
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the unique ID of the app ADMX file that contains the preference to import.
|
<p style="margin-left: 20px">Added in Windows 10, version 1703. Specifies the unique ID of the app ADMX file that contains the preference to import.
|
||||||
|
|
||||||
<p style="margin-left: 20px">Supported operations are Add and Get. Does not support Delete.
|
<p style="margin-left: 20px">Supported operations are Add and Get. Does not support Delete.
|
||||||
|
@ -37,6 +37,9 @@ manager: dansimp
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#experience-allowmanualmdmunenrollment">Experience/AllowManualMDMUnenrollment</a>
|
<a href="#experience-allowmanualmdmunenrollment">Experience/AllowManualMDMUnenrollment</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#experience-allownewsandinterestsonthetaskbar">Experience/AllowNewsAndInterestsOnTheTaskbar</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#experience-allowsaveasofofficefiles">Experience/AllowSaveAsOfOfficeFiles</a>
|
<a href="#experience-allowsaveasofofficefiles">Experience/AllowSaveAsOfOfficeFiles</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -436,6 +439,65 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="experience-allownewsandinterestsonthetaskbar"></a>**Experience/AllowNewsAndInterestsOnTheTaskbar**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Windows Edition</th>
|
||||||
|
<th>Supported?</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Home</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Pro</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Business</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Enterprise</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Education</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Machine
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
Specifies whether to allow "News and interests" on the Taskbar.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The values for this policy are 1 and 0. This policy defaults to 1.
|
||||||
|
|
||||||
|
- 1 - Default - News and interests feature will be allowed on the taskbar. The settings UI will be present in Taskbar context menu, and users will be able to turn off or switch mode.
|
||||||
|
|
||||||
|
- 0 - News and interests feature will be turned off completely, and the settings UI in Taskbar context menu will be removed.
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="experience-allowsaveasofofficefiles"></a>**Experience/AllowSaveAsOfOfficeFiles**
|
<a href="" id="experience-allowsaveasofofficefiles"></a>**Experience/AllowSaveAsOfOfficeFiles**
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user