mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-22 05:43:41 +00:00
Merge branch 'master' of https://github.com/microsoftdocs/windows-itpro-docs into from-public
This commit is contained in:
@ -296,7 +296,7 @@ The deep link used for connecting your device to work will always use the follow
|
||||
|
||||
| Parameter | Description | Supported Value for Windows 10|
|
||||
|-----------|--------------------------------------------------------------|----------------------------------------------|
|
||||
| mode | Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607| “mdm”, "awa", "aadj" |
|
||||
| mode | Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607| MDM (Mobile Device Management), AWA (Adding Work Account), and AADJ (Azure Active Directory Joined). |
|
||||
|username | Specifies the email address or UPN of the user who should be enrolled into MDM. Added in Windows 10, version 1703. | string |
|
||||
| servername | Specifies the MDM server URL that will be used to enroll the device. Added in Windows 10, version 1703. | string|
|
||||
| accesstoken | Custom parameter for MDM servers to use as they see fit. Typically, this can be used as a token to validate the enrollment request. Added in Windows 10, version 1703. | string |
|
||||
|
@ -195,6 +195,11 @@ Upgrade Readiness only collects app inventory on devices that are not yet upgrad
|
||||
Double-check that IE site discovery opt-in has been configured in the deployment script. (See the [Upgrade Readiness deployment script](../upgrade/upgrade-readiness-deployment-script.md) topic for information about obtaining and running the script, and for a description of the error codes that can be displayed. See ["Understanding connectivity scenarios and the deployment script"](https://blogs.technet.microsoft.com/upgradeanalytics/2017/03/10/understanding-connectivity-scenarios-and-the-deployment-script/) on the Windows Analytics blog for a summary of setting the ClientProxy for the script, which will enable the script properly check for diagnostic data endpoint connectivity.)
|
||||
|
||||
Also, on Windows 10 devices remember that IE site discovery requires data diagnostics set to the Enhanced level.
|
||||
|
||||
There are two additional configurations to check:
|
||||
1. Make sure Flip Ahead with Page Prediction is enabled. It can be configured at Internet Options -> Advanced -> Browsing -> Enable flip ahead with page prediction.
|
||||
2. Make sure IE is not running in InPrivate mode.
|
||||
|
||||
Finally, Upgrade Readiness only collects IE site discovery data on devices that are not yet upgraded to the target operating system version specified in the Upgrade Readiness Overview blade. This is because Upgrade Readiness targets upgrade planning (for devices not yet upgraded).
|
||||
|
||||
>[!NOTE]
|
||||
|
@ -50,6 +50,24 @@ As a result, if the currently used PCR bank is switched all keys that have been
|
||||
|
||||
Before switching PCR banks you should suspend or disable BitLocker – or have your recovery key ready. For steps on how to switch PCR banks on your PC, you should contact your OEM or UEFI vendor.
|
||||
|
||||
## How can I identify which PCR bank is being used?
|
||||
|
||||
A TPM can be configured to have multiple PCR banks active. When BIOS is performing measurements it will do so into all active PCR banks, depending on its capability to make these measurements. BIOS may chose to deactivate PCR banks that it does not support or "cap" PCR banks that it does not support by extending a separator. The following registry value identifies which PCR banks are active.
|
||||
|
||||
- Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\IntegrityServices<br>
|
||||
- DWORD: TPMActivePCRBanks<br>
|
||||
- Defines which PCR banks are currently active. This is a bitmap defined in the TCG Algorithm Registry.<br>
|
||||
|
||||
Windows checks which PCR banks are active and supported by the BIOS. Windows also checks if the measured boot log supports measurements for all active PCR banks. Windows will prefer the use of the SHA-256 bank for measurements and will fall back to SHA1 PCR bank if one of the pre-conditions is not met.
|
||||
|
||||
You can identify which PCR bank is currently used by Windows by looking at the registry.
|
||||
|
||||
- Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\IntegrityServices<br>
|
||||
- DWORD: TPMDigestAlgID<br>
|
||||
- Algorithm ID of the PCR bank that Windows is currently using. (For the full list of supported algorithms, see the TCG Algorithm Registry.)<br>
|
||||
|
||||
Windows only uses one PCR bank to continue boot measurements. All other active PCR banks will be extended with a separator to indicate that they are not used by Windows and measurements that appear to be from Windows should not be trusted.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics)
|
||||
|
@ -72,11 +72,11 @@ If you've tested the feature with the demo site and with audit mode, and network
|
||||
When you report a problem with network protection, you are asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
|
||||
|
||||
1. Open an elevated command prompt and change to the Windows Defender directory:
|
||||
```console
|
||||
```
|
||||
cd c:\program files\windows defender
|
||||
```
|
||||
2. Run this command to generate the diagnostic logs:
|
||||
```console
|
||||
```
|
||||
mpcmdrun -getfiles
|
||||
```
|
||||
3. By default, they are saved to C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab. Attach the file to the submission form.
|
||||
|
Reference in New Issue
Block a user