diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md
index b8eb37197c..3a48ac399e 100644
--- a/windows/client-management/mdm/assignedaccess-csp.md
+++ b/windows/client-management/mdm/assignedaccess-csp.md
@@ -14,8 +14,6 @@ ms.date: 09/18/2018
# AssignedAccess CSP
-**Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.**
-
The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration.
For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](https://go.microsoft.com/fwlink/p/?LinkID=722211)
diff --git a/windows/client-management/mdm/bitlocker-ddf-file.md b/windows/client-management/mdm/bitlocker-ddf-file.md
index 19421997ba..edf7ea7a4b 100644
--- a/windows/client-management/mdm/bitlocker-ddf-file.md
+++ b/windows/client-management/mdm/bitlocker-ddf-file.md
@@ -14,9 +14,6 @@ manager: dansimp
# BitLocker DDF file
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
This topic shows the OMA DM device description framework (DDF) for the **BitLocker** configuration service provider.
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md
index f93af2f2a2..59751b300b 100644
--- a/windows/client-management/mdm/configuration-service-provider-reference.md
+++ b/windows/client-management/mdm/configuration-service-provider-reference.md
@@ -9,14 +9,11 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 05/11/2020
+ms.date: 06/03/2020
---
# Configuration service provider reference
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot.
For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/desktop/dn905224). For CSP DDF files, see [CSP DDF files download](#csp-ddf-files-download).
@@ -2699,6 +2696,7 @@ Additional lists:
## CSP DDF files download
You can download the DDF files for various CSPs from the links below:
+- [Download all the DDF files for Windows 10, version 2004](https://download.microsoft.com/download/4/0/f/40f9ec45-3bea-442c-8afd-21edc1e057d8/Windows10_2004_DDF_download.zip)
- [Download all the DDF files for Windows 10, version 1903](https://download.microsoft.com/download/6/F/0/6F019079-6EB0-41B5-88E8-D1CE77DBA27B/Windows10_1903_DDF_download.zip)
- [Download all the DDF files for Windows 10, version 1809](https://download.microsoft.com/download/6/A/7/6A735141-5CFA-4C1B-94F4-B292407AF662/Windows10_1809_DDF_download.zip)
- [Download all the DDF files for Windows 10, version 1803](https://download.microsoft.com/download/6/2/7/6276FE19-E3FD-4254-9C16-3C31CAA2DE50/Windows10_1803_DDF_download.zip)
diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md
index a9993b1e63..8c398e4992 100644
--- a/windows/client-management/mdm/defender-csp.md
+++ b/windows/client-management/mdm/defender-csp.md
@@ -15,9 +15,6 @@ ms.date: 10/21/2019
# Defender CSP
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise.
The following image shows the Windows Defender configuration service provider in tree format.
diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md
index e5c1dcd59e..6ca8fc6f49 100644
--- a/windows/client-management/mdm/defender-ddf.md
+++ b/windows/client-management/mdm/defender-ddf.md
@@ -15,7 +15,6 @@ ms.date: 10/21/2019
# Defender DDF file
-
This topic shows the OMA DM device description framework (DDF) for the **Defender** configuration service provider. DDF files are used only with OMA DM provisioning XML.
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
diff --git a/windows/client-management/mdm/devdetail-ddf-file.md b/windows/client-management/mdm/devdetail-ddf-file.md
index 47df0219d5..0ab07220b6 100644
--- a/windows/client-management/mdm/devdetail-ddf-file.md
+++ b/windows/client-management/mdm/devdetail-ddf-file.md
@@ -9,14 +9,11 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 07/11/2018
+ms.date: 06/03/2020
---
# DevDetail DDF file
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
This topic shows the OMA DM device description framework (DDF) for the **DevDetail** configuration service provider. DDF files are used only with OMA DM provisioning XML.
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
@@ -724,4 +721,5 @@ The XML below is the current version for this CSP.
+
```
diff --git a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md
index 25b59bccc1..6bfc9c4ef7 100644
--- a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md
+++ b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md
@@ -24,8 +24,8 @@ ms.date: 06/26/2017
# DMProcessConfigXMLFiltered function
-> **Important**
-The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. Please see [Connectivity configuration](https://msdn.microsoft.com/library/windows/hardware/dn757424) for more information about the new process for provisioning connectivity configuration. However, this function is still supported for other OEM uses.
+[!Important]
+> The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. Please see [Connectivity configuration](https://msdn.microsoft.com/library/windows/hardware/dn757424) for more information about the new process for provisioning connectivity configuration. However, this function is still supported for other OEM uses.
Configures phone settings by using OMA Client Provisioning XML. Use of this function is strictly limited to the following scenarios.
diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md
index c9d550f250..aa2cdb680b 100644
--- a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md
+++ b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md
@@ -14,9 +14,6 @@ ms.date: 10/01/2019
# EnterpriseModernAppManagement DDF
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
This topic shows the OMA DM device description framework (DDF) for the **EnterpriseModernAppManagement** configuration service provider. DDF files are used only with OMA DM provisioning XML.
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
diff --git a/windows/client-management/mdm/office-ddf.md b/windows/client-management/mdm/office-ddf.md
index 7f8b60345e..88e2b4dee5 100644
--- a/windows/client-management/mdm/office-ddf.md
+++ b/windows/client-management/mdm/office-ddf.md
@@ -14,9 +14,6 @@ ms.date: 08/15/2018
# Office DDF
-> [!WARNING]
-> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
-
This topic shows the OMA DM device description framework (DDF) for the **Office** configuration service provider. DDF files are used only with OMA DM provisioning XML.
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md
index 047fef66ae..0a8b288709 100644
--- a/windows/client-management/mdm/policy-configuration-service-provider.md
+++ b/windows/client-management/mdm/policy-configuration-service-provider.md
@@ -15,9 +15,6 @@ ms.date: 07/18/2019
# Policy CSP
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
The Policy configuration service provider enables the enterprise to configure policies on Windows 10. Use this configuration service provider to configure any company policies.
The Policy configuration service provider has the following sub-categories:
diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md
index d14be473a2..de8b3c5a94 100644
--- a/windows/client-management/mdm/policy-csp-activexcontrols.md
+++ b/windows/client-management/mdm/policy-csp-activexcontrols.md
@@ -109,6 +109,8 @@ Footnotes:
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903.
+- 7 - Added in Windows 10, version 1909.
+- 8 - Added in Windows 10, version 2004.
diff --git a/windows/client-management/mdm/policy-csp-audit.md b/windows/client-management/mdm/policy-csp-audit.md
index 96103d4ca7..378f92cb1b 100644
--- a/windows/client-management/mdm/policy-csp-audit.md
+++ b/windows/client-management/mdm/policy-csp-audit.md
@@ -12,10 +12,6 @@ ms.date: 09/27/2019
# Policy CSP - Audit
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
-
diff --git a/windows/client-management/mdm/policy-csp-bits.md b/windows/client-management/mdm/policy-csp-bits.md
index d7f56e3f4c..d4c64c584f 100644
--- a/windows/client-management/mdm/policy-csp-bits.md
+++ b/windows/client-management/mdm/policy-csp-bits.md
@@ -14,10 +14,6 @@ manager: dansimp
# Policy CSP - BITS
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
-
The following bandwidth policies are used together to define the bandwidth-throttling schedule and transfer rate.
- BITS/BandwidthThrottlingEndTime
diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md
index 4b686d7c13..3f68b4b8cb 100644
--- a/windows/client-management/mdm/policy-csp-browser.md
+++ b/windows/client-management/mdm/policy-csp-browser.md
@@ -4303,5 +4303,7 @@ Footnotes:
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903.
+- 7 - Added in Windows 10, version 1909.
+- 8 - Added in Windows 10, version 2004.
diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md
index 003b1ca8d3..d9cc3f9647 100644
--- a/windows/client-management/mdm/policy-csp-credentialproviders.md
+++ b/windows/client-management/mdm/policy-csp-credentialproviders.md
@@ -249,6 +249,8 @@ Footnotes:
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
- 6 - Added in Windows 10, version 1903.
+- 7 - Added in Windows 10, version 1909.
+- 8 - Added in Windows 10, version 2004.
diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md
index f34ee27dd5..00ab26dd22 100644
--- a/windows/client-management/mdm/policy-csp-deviceguard.md
+++ b/windows/client-management/mdm/policy-csp-deviceguard.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - DeviceGuard
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md
index 4ced8ce8ab..f1c54d540a 100644
--- a/windows/client-management/mdm/policy-csp-deviceinstallation.md
+++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md
@@ -14,9 +14,6 @@ ms.localizationpriority: medium
# Policy CSP - DeviceInstallation
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md
index 08eaddf872..d553a30d50 100644
--- a/windows/client-management/mdm/policy-csp-dmaguard.md
+++ b/windows/client-management/mdm/policy-csp-dmaguard.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - DmaGuard
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md
index 3f4beef3e9..e316fbdb3f 100644
--- a/windows/client-management/mdm/policy-csp-education.md
+++ b/windows/client-management/mdm/policy-csp-education.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - Education
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md
index 200fde9087..f61798a6d7 100644
--- a/windows/client-management/mdm/policy-csp-kerberos.md
+++ b/windows/client-management/mdm/policy-csp-kerberos.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - Kerberos
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md
index 4935d3f947..1707ca7bfc 100644
--- a/windows/client-management/mdm/policy-csp-restrictedgroups.md
+++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md
@@ -14,8 +14,6 @@ manager: dansimp
# Policy CSP - RestrictedGroups
-> [!WARNING]
-> Some information in this article relates to prereleased products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md
index 0a4dcd146d..46499d7701 100644
--- a/windows/client-management/mdm/policy-csp-security.md
+++ b/windows/client-management/mdm/policy-csp-security.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - Security
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md
index c5e74893fc..17a91ff2d8 100644
--- a/windows/client-management/mdm/policy-csp-start.md
+++ b/windows/client-management/mdm/policy-csp-start.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - Start
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-taskmanager.md b/windows/client-management/mdm/policy-csp-taskmanager.md
index 8a69418c47..7d502e9af7 100644
--- a/windows/client-management/mdm/policy-csp-taskmanager.md
+++ b/windows/client-management/mdm/policy-csp-taskmanager.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - TaskManager
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md
index a116d3b084..79e47c91f8 100644
--- a/windows/client-management/mdm/policy-csp-textinput.md
+++ b/windows/client-management/mdm/policy-csp-textinput.md
@@ -16,10 +16,6 @@ manager: dansimp
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
-
diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md
index 9949285fca..3942b48f24 100644
--- a/windows/client-management/mdm/policy-csp-update.md
+++ b/windows/client-management/mdm/policy-csp-update.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - Update
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
> [!NOTE]
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
index 4db39b31f2..86ea14fd52 100644
--- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
+++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md
@@ -14,9 +14,6 @@ manager: dansimp
# Policy CSP - WindowsDefenderSecurityCenter
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md
index 8a9c1a34dc..7a522ee312 100644
--- a/windows/client-management/mdm/policy-ddf-file.md
+++ b/windows/client-management/mdm/policy-ddf-file.md
@@ -10,7 +10,7 @@ ms.prod: w10
ms.technology: windows
author: manikadhiman
ms.localizationpriority: medium
-ms.date: 05/21/2019
+ms.date: 06/03/2020
---
# Policy DDF file
@@ -20,6 +20,7 @@ This topic shows the OMA DM device description framework (DDF) for the **Policy*
You can view various Policy DDF files by clicking the following links:
+- [View the Policy DDF file for Windows 10, version 2004](https://download.microsoft.com/download/4/0/f/40f9ec45-3bea-442c-8afd-21edc1e057d8/PolicyDDF_all_2004.xml)
- [View the Policy DDF file for Windows 10, version 1903](https://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml)
- [View the Policy DDF file for Windows 10, version 1809](https://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/Policy_DDF_all_1809.xml)
- [View the Policy DDF file for Windows 10, version 1803](https://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all.xml)
@@ -31,7 +32,7 @@ You can view various Policy DDF files by clicking the following links:
You can download DDF files for various CSPs from [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).
-The XML below is the DDF for Windows 10, version 1903.
+The XML below is the DDF for Windows 10, version 2004.
```xml
@@ -57,7 +58,7 @@ The XML below is the DDF for Windows 10, version 1903.
- com.microsoft/9.0/MDM/Policy
+ com.microsoft/10.0/MDM/Policy
@@ -1646,7 +1647,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically.
-When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension.
+When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension.
When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel.
@@ -1657,11 +1658,11 @@ If disabled or not configured, extensions defined as part of this policy get ign
Default setting: Disabled or not configured
Related policies: Allow Developer Tools
Related Documents:
-- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn)
-- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business)
-- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy)
-- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
-- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows)
+- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn)
+- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business)
+- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy)
+- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
+- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows)
@@ -2119,6 +2120,30 @@ Related policy:
+
+ AllowGraphingCalculator
+
+
+
+
+
+
+
+ This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. If you enable or don't configure this policy setting, users will be able to access graphing functionality.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
DefaultPrinterName
@@ -11023,7 +11048,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically.
-When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension.
+When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension.
When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel.
@@ -11034,11 +11059,11 @@ If disabled or not configured, extensions defined as part of this policy get ign
Default setting: Disabled or not configured
Related policies: Allow Developer Tools
Related Documents:
-- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn)
-- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business)
-- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy)
-- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
-- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows)
+- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn)
+- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business)
+- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy)
+- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
+- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows)
@@ -11541,6 +11566,33 @@ Related policy:
+
+ AllowGraphingCalculator
+
+
+
+
+ 1
+ This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. If you enable or don't configure this policy setting, users will be able to access graphing functionality.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ Programs.admx
+ Programs~AT~WindowsComponents~Calculator
+ AllowGraphingCalculator
+ LowestValueMostSecure
+
+
DefaultPrinterName
@@ -19509,7 +19561,7 @@ Related policy:
- com.microsoft/9.0/MDM/Policy
+ com.microsoft/10.0/MDM/Policy
@@ -19578,6 +19630,99 @@ Related policy:
+
+ Properties
+
+
+
+
+
+
+ Properties of Win32 App ADMX Ingestion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ *
+
+
+
+
+
+
+ Setting Type of Win32 App. Policy Or Preference
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ *
+
+
+
+
+
+
+ Unique ID of ADMX file
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ Version
+
+
+
+
+
+
+
+ Version of ADMX file
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
*
@@ -19607,6 +19752,7 @@ Related policy:
+
Unique ID of ADMX file
@@ -20165,6 +20311,30 @@ Related policy:
+
+ BlockNonAdminUserInstall
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
DisableStoreOriginatedApps
@@ -21098,6 +21268,1785 @@ Related policy:
+
+ Audit
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AccountLogon_AuditCredentialValidation
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by validation tests on user account logon credentials.
+
+Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogon_AuditKerberosAuthenticationService
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogon_AuditKerberosServiceTicketOperations
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogon_AuditOtherAccountLogonEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
+
+Currently, there are no events in this subcategory.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditAccountLockout
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out.
+
+If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+Logon events are essential for understanding user activity and to detect potential attacks.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditGroupMembership
+
+
+
+
+
+
+
+ This policy allows you to audit the group memberhsip information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group memberhsip information cannot fit in a single security audit event.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditIPsecExtendedMode
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditIPsecMainMode
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditIPsecQuickMode
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.If
+ you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditLogoff
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to.
+
+If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions.
+If you do not configure this policy setting, no audit event is generated when a logon session is closed.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditLogon
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by user account logon attempts on the computer.
+Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included:
+ Successful logon attempts.
+ Failed logon attempts.
+ Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command.
+ Security identifiers (SIDs) were filtered and not allowed to log on.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditNetworkPolicyServer
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.
+If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts.
+If you do not configure this policy settings, IAS and NAP user access requests are not audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditOtherLogonLogoffEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit other logon/logoff-related events that are not covered in the “Logon/Logoff” policy setting such as the following:
+ Terminal Services session disconnections.
+ New Terminal Services sessions.
+ Locking and unlocking a workstation.
+ Invoking a screen saver.
+ Dismissal of a screen saver.
+ Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration.
+ Access to a wireless network granted to a user or computer account.
+ Access to a wired 802.1x network granted to a user or computer account.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditSpecialLogon
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by special logons such as the following :
+ The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
+ A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121697).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountLogonLogoff_AuditUserDeviceClaims
+
+
+
+
+
+
+
+ This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditApplicationGroupManagement
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to application groups such as the following:
+ Application group is created, changed, or deleted.
+ Member is added or removed from an application group.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an application group changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditComputerAccountManagement
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a computer account changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditDistributionGroupManagement
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to distribution groups such as the following:
+ Distribution group is created, changed, or deleted.
+ Member is added or removed from a distribution group.
+ Distribution group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a distribution group changes.
+
+Note: Events in this subcategory are logged only on domain controllers.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditOtherAccountManagementEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following:
+ The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration.
+ The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack.
+ Changes to the Default Domain Group Policy under the following Group Policy paths:
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditSecurityGroupManagement
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to security groups such as the following:
+ Security group is created, changed, or deleted.
+ Member is added or removed from a security group.
+ Group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a security group changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ AccountManagement_AuditUserAccountManagement
+
+
+
+
+
+
+
+ This policy setting allows you to audit changes to user accounts. Events include the following:
+ A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked.
+ A user account’s password is set or changed.
+ A security identifier (SID) is added to the SID History of a user account.
+ The Directory Services Restore Mode password is configured.
+ Permissions on administrative user accounts are changed.
+ Credential Manager credentials are backed up or restored.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you do not configure this policy setting, no audit event is generated when a user account changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditDPAPIActivity
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720.
+
+If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditPNPActivity
+
+
+
+
+
+
+
+ This policy setting allows you to audit when plug and play detects an external device.
+
+If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category.
+If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditProcessCreation
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited.
+
+If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process is created.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditProcessTermination
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when a process ends.
+
+If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process ends.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditRPCEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit inbound remote procedure call (RPC) connections.
+
+If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DetailedTracking_AuditTokenRightAdjusted
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by adjusting the privileges of a token.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DSAccess_AuditDetailedDirectoryServiceReplication
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by detailed Active Directory Domain Services (AD DS) replication between domain controllers.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DSAccess_AuditDirectoryServiceAccess
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when an Active Directory Domain Services (AD DS) object is accessed.
+
+Only AD DS objects with a matching system access control list (SACL) are logged.
+
+Events in this subcategory are similar to the Directory Service Access events available in previous versions of Windows.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DSAccess_AuditDirectoryServiceChanges
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted.
+
+When possible, events logged in this subcategory indicate the old and new values of the object’s properties.
+
+Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged.
+
+Note: Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded.
+If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ DSAccess_AuditDirectoryServiceReplication
+
+
+
+
+
+
+
+ This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers.
+
+If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication.
+If you do not configure this policy setting, no audit event is generated during AD DS replication.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditApplicationGenerated
+
+
+
+
+
+
+
+ This policy setting allows you to audit applications that generate events using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function.
+Events in this subcategory include:
+ Creation of an application client context.
+ Deletion of an application client context.
+ Initialization of an application client context.
+ Other application operations using the Windows Auditing APIs.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditCentralAccessPolicyStaging
+
+
+
+
+
+
+
+ This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object.
+
+If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows:
+1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access.
+2) Failure audits when configured records access attempts when:
+ a) The current central access policy does not grant access but the proposed policy grants access.
+ b) A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy.
+
+Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditCertificationServices
+
+
+
+
+
+
+
+ This policy setting allows you to audit Active Directory Certificate Services (AD CS) operations.
+AD CS operations include the following:
+ AD CS startup/shutdown/backup/restore.
+ Changes to the certificate revocation list (CRL).
+ New certificate requests.
+ Issuing of a certificate.
+ Revocation of a certificate.
+ Changes to the Certificate Manager settings for AD CS.
+ Changes in the configuration of AD CS.
+ Changes to a Certificate Services template.
+ Importing of a certificate.
+ Publishing of a certification authority certificate is to Active Directory Domain Services.
+ Changes to the security permissions for AD CS.
+ Archival of a key.
+ Importing of a key.
+ Retrieval of a key.
+ Starting of Online Certificate Status Protocol (OCSP) Responder Service.
+ Stopping of Online Certificate Status Protocol (OCSP) Responder Service.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditDetailedFileShare
+
+
+
+
+
+
+
+ This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditFileShare
+
+
+
+
+
+
+
+ This policy setting allows you to audit attempts to access a shared folder.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared folders on the system is audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditFileSystem
+
+
+
+
+
+
+
+ This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see https://go.microsoft.com/fwlink/?LinkId=122083.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
+
+Note: You can set a SACL on a file system object using the Security tab in that object's Properties dialog box.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditFilteringPlatformConnection
+
+
+
+
+
+
+
+ This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP). The following events are included:
+ The Windows Firewall Service blocks an application from accepting incoming connections on the network.
+ The WFP allows a connection.
+ The WFP blocks a connection.
+ The WFP permits a bind to a local port.
+ The WFP blocks a bind to a local port.
+ The WFP allows a connection.
+ The WFP blocks a connection.
+ The WFP permits an application or service to listen on a port for incoming connections.
+ The WFP blocks an application or service to listen on a port for incoming connections.
+
+If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked.
+If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditFilteringPlatformPacketDrop
+
+
+
+
+
+
+
+ This policy setting allows you to audit packets that are dropped by Windows Filtering Platform (WFP).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditHandleManipulation
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events.
+
+If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a handle is manipulated.
+
+Note: Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditKernelObject
+
+
+
+
+
+
+
+ This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores.
+Only kernel objects with a matching system access control list (SACL) generate security audit events.
+
+Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditOtherObjectAccessEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by the management of task scheduler jobs or COM+ objects.
+For scheduler jobs, the following are audited:
+ Job created.
+ Job deleted.
+ Job enabled.
+ Job disabled.
+ Job updated.
+For COM+ objects, the following are audited:
+ Catalog object added.
+ Catalog object updated.
+ Catalog object deleted.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditRegistry
+
+
+
+
+
+
+
+ This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL.
+
+Note: You can set a SACL on a registry object using the Permissions dialog box.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditRemovableStorage
+
+
+
+
+
+
+
+ This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ObjectAccess_AuditSAM
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects.
+SAM objects include the following:
+ SAM_ALIAS -- A local group.
+ SAM_GROUP -- A group that is not a local group.
+ SAM_USER – A user account.
+ SAM_DOMAIN – A domain.
+ SAM_SERVER – A computer account.
+If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
+Note: Only the System Access Control List (SACL) for SAM_SERVER can be modified.
+Volume: High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121698).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditAuthenticationPolicyChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to the authentication policy such as the following:
+ Creation of forest and domain trusts.
+ Modification of forest and domain trusts.
+ Removal of forest and domain trusts.
+ Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy.
+ Granting of any of the following user rights to a user or group:
+ Access This Computer From the Network.
+ Allow Logon Locally.
+ Allow Logon Through Terminal Services.
+ Logon as a Batch Job.
+ Logon a Service.
+ Namespace collision. For example, when a new trust has the same name as an existing namespace name.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authentication policy is changed.
+
+Note: The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditAuthorizationPolicyChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to the authorization policy such as the following:
+ Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+ Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+ Changes in the Encrypted File System (EFS) policy.
+ Changes to the Resource attributes of an object.
+ Changes to the Central Access Policy (CAP) applied to an object.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authorization policy changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditFilteringPlatformPolicyChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP) such as the following:
+ IPsec services status.
+ Changes to IPsec policy settings.
+ Changes to Windows Firewall policy settings.
+ Changes to WFP providers and engine.
+
+If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditMPSSVCRuleLevelPolicyChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall. Events include the following:
+ Reporting of active policies when Windows Firewall service starts.
+ Changes to Windows Firewall rules.
+ Changes to Windows Firewall exception list.
+ Changes to Windows Firewall settings.
+ Rules ignored or not applied by Windows Firewall Service.
+ Changes to Windows Firewall Group Policy settings.
+
+If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditOtherPolicyChangeEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following:
+ Trusted Platform Module (TPM) configuration changes.
+ Kernel-mode cryptographic self tests.
+ Cryptographic provider operations.
+ Cryptographic context operations or modifications.
+ Applied Central Access Policies (CAPs) changes.
+ Boot Configuration Data (BCD) modifications.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PolicyChange_AuditPolicyChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit changes in the security audit policy settings such as the following:
+ Settings permissions and audit settings on the Audit Policy object.
+ Changes to the system audit policy.
+ Registration of security event sources.
+ De-registration of security event sources.
+ Changes to the per-user audit settings.
+ Changes to the value of CrashOnAuditFail.
+ Changes to the system access control list on a file system or registry object.
+ Changes to the Special Groups list.
+
+Note: System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PrivilegeUse_AuditNonSensitivePrivilegeUse
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights).
+The following privileges are non-sensitive:
+ Access Credential Manager as a trusted caller.
+ Access this computer from the network.
+ Add workstations to domain.
+ Adjust memory quotas for a process.
+ Allow log on locally.
+ Allow log on through Terminal Services.
+ Bypass traverse checking.
+ Change the system time.
+ Create a pagefile.
+ Create global objects.
+
+ Create permanent shared objects.
+ Create symbolic links.
+ Deny access this computer from the network.
+ Deny log on as a batch job.
+ Deny log on as a service.
+ Deny log on locally.
+ Deny log on through Terminal Services.
+ Force shutdown from a remote system.
+ Increase a process working set.
+ Increase scheduling priority.
+ Lock pages in memory.
+ Log on as a batch job.
+ Log on as a service.
+ Modify an object label.
+ Perform volume maintenance tasks.
+ Profile single process.
+ Profile system performance.
+ Remove computer from docking station.
+ Shut down the system.
+ Synchronize directory service data.
+
+If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls.
+If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PrivilegeUse_AuditOtherPrivilegeUseEvents
+
+
+
+
+
+
+
+ Not used.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ PrivilegeUse_AuditSensitivePrivilegeUse
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following:
+ A privileged service is called.
+ One of the following privileges are called:
+ Act as part of the operating system.
+ Back up files and directories.
+ Create a token object.
+ Debug programs.
+ Enable computer and user accounts to be trusted for delegation.
+ Generate security audits.
+ Impersonate a client after authentication.
+ Load and unload device drivers.
+ Manage auditing and security log.
+ Modify firmware environment values.
+ Replace a process-level token.
+ Restore files and directories.
+ Take ownership of files or other objects.
+
+If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ System_AuditIPsecDriver
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by the IPsec filter driver such as the following:
+ Startup and shutdown of the IPsec services.
+ Network packets dropped due to integrity check failure.
+ Network packets dropped due to replay check failure.
+ Network packets dropped due to being in plaintext.
+ Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated.
+ Inability to process IPsec filters.
+
+If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ System_AuditOtherSystemEvents
+
+
+
+
+
+
+
+ This policy setting allows you to audit any of the following events:
+ Startup and shutdown of the Windows Firewall service and driver.
+ Security policy processing by the Windows Firewall Service.
+ Cryptography key file and migration operations.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ System_AuditSecurityStateChange
+
+
+
+
+
+
+
+ This policy setting allows you to audit events generated by changes in the security state of the computer such as the following events:
+ Startup and shutdown of the computer.
+ Change of system time.
+ Recovering the system from CrashOnAuditFail, which is logged after a system restarts when the security event log is full and the CrashOnAuditFail registry entry is configured.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ System_AuditSecuritySystemExtension
+
+
+
+
+
+
+
+ This policy setting allows you to audit events related to security system extensions or services such as the following:
+ A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM.
+ A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account.
+If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ System_AuditSystemIntegrity
+
+
+
+
+
+
+
+ This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following:
+ Events that could not be written to the event log because of a problem with the auditing system.
+ A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space.
+ The detection of a Remote Procedure Call (RPC) that compromises system integrity.
+ The detection of a hash value of an executable file that is not valid as determined by Code Integrity.
+ Cryptographic operations that compromise system integrity.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
Authentication
@@ -21759,6 +23708,30 @@ Related policy:
+
+ SetMinimumEncryptionKeySize
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
Browser
@@ -23021,7 +24994,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically.
-When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension.
+When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension.
When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel.
@@ -23032,11 +25005,11 @@ If disabled or not configured, extensions defined as part of this policy get ign
Default setting: Disabled or not configured
Related policies: Allow Developer Tools
Related Documents:
-- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn)
-- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business)
-- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy)
-- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
-- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows)
+- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn)
+- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business)
+- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy)
+- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
+- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows)
@@ -25494,6 +27467,30 @@ Related policy:
+
+ DOCacheHostSource
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
DODelayBackgroundDownloadFromHttp
@@ -25662,6 +27659,30 @@ Related policy:
+
+ DOMaxBackgroundDownloadBandwidth
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
DOMaxCacheAge
@@ -25711,31 +27732,7 @@ Related policy:
- DOMaxDownloadBandwidth
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
-
- DOMaxUploadBandwidth
+ DOMaxForegroundDownloadBandwidth
@@ -25950,30 +27947,6 @@ Related policy:
-
- DOPercentageMaxDownloadBandwidth
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
DOPercentageMaxForegroundBandwidth
@@ -26328,6 +28301,30 @@ Related policy:
+
+ AllowInstallationOfMatchingDeviceInstanceIDs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
AllowInstallationOfMatchingDeviceSetupClasses
@@ -26424,6 +28421,30 @@ Related policy:
+
+ PreventInstallationOfMatchingDeviceInstanceIDs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
PreventInstallationOfMatchingDeviceSetupClasses
@@ -27888,6 +29909,124 @@ If you do not configure this policy setting, users will be able to choose whethe
+
+ FactoryComposer
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ BackgroundImagePath
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ OEMVersion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ UserToSignIn
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ UWPLaunchOnBoot
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
FileExplorer
@@ -28767,30 +30906,6 @@ If you do not configure this policy setting, users will be able to choose whethe
-
- DisableActiveXVersionListAutoDownload
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
-
DisableAdobeFlash
@@ -37961,6 +40076,102 @@ If the user has configured a slide show to run on the lock screen when the machi
+
+ LetAppsAccessBackgroundSpatialPerception
+
+
+
+
+
+
+
+ This policy setting specifies whether Windows apps can access the movement of the user's head, hands, motion controllers, and other tracked objects, while the apps are running in the background.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps
+
+
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the user movements privacy setting for the listed apps. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
LetAppsAccessCalendar
@@ -44048,6 +46259,90 @@ If you disable or do not configure this policy setting, File History can be acti
+
+ ConfigureJapaneseIMEVersion
+
+
+
+
+
+
+
+ This policy allows the IT admin to configure the Microsoft Japanese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Japanese IME is on by default. Allow to control Microsoft Japanese IME version to use.
+1 - The previous version of Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use.
+2 - The new Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ConfigureSimplifiedChineseIMEVersion
+
+
+
+
+
+
+
+ This policy allows the IT admin to configure the Microsoft Simplified Chinese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Simplified Chinese IME is on by default. Allow to control Microsoft Simplified Chinese IME version to use.
+1 - The previous version of Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use.
+2 - The new Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
+
+ ConfigureTraditionalChineseIMEVersion
+
+
+
+
+
+
+
+ This policy allows the IT admin to configure the Microsoft Traditional Chinese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Traditional Chinese IME is on by default. Allow to control Microsoft Traditional Chinese IME version to use.
+1 - The previous version of Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use.
+2 - The new Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
EnableTouchKeyboardAutoInvokeInDesktopMode
@@ -45857,6 +48152,30 @@ If you disable or do not configure this policy setting, the wake setting as spec
+
+ TargetReleaseVersion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+
UpdateNotificationLevel
@@ -48510,6 +50829,33 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi
LastWrite
+
+ BlockNonAdminUserInstall
+
+
+
+
+ 0
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ AppxPackageManager.admx
+ AppxPackageManager~AT~WindowsComponents~AppxDeployment
+ BlockNonAdminUserInstall
+ LowestValueMostSecure
+
+
DisableStoreOriginatedApps
@@ -49577,6 +51923,1960 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi
+
+ Audit
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ AccountLogon_AuditCredentialValidation
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by validation tests on user account logon credentials.
+
+Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon
+ Audit Credential Validation
+ LastWrite
+
+
+
+ AccountLogon_AuditKerberosAuthenticationService
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon
+ Audit Kerberos Authentication Service
+ LastWrite
+
+
+
+ AccountLogon_AuditKerberosServiceTicketOperations
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts.
+
+If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon
+ Audit Kerberos Service Ticket Operations
+ LastWrite
+
+
+
+ AccountLogon_AuditOtherAccountLogonEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets.
+
+Currently, there are no events in this subcategory.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon
+ Audit Other Account Logon Events
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditAccountLockout
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out.
+
+If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+Logon events are essential for understanding user activity and to detect potential attacks.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Account Lockout
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditGroupMembership
+
+
+
+
+ 0
+ This policy allows you to audit the group memberhsip information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group memberhsip information cannot fit in a single security audit event.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Group Membership
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditIPsecExtendedMode
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit IPsec Extended Mode
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditIPsecMainMode
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit IPsec Main Mode
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditIPsecQuickMode
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations.
+
+If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.If
+ you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit IPsec Quick Mode
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditLogoff
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to.
+
+If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions.
+If you do not configure this policy setting, no audit event is generated when a logon session is closed.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Logoff
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditLogon
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by user account logon attempts on the computer.
+Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included:
+ Successful logon attempts.
+ Failed logon attempts.
+ Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command.
+ Security identifiers (SIDs) were filtered and not allowed to log on.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Logon
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditNetworkPolicyServer
+
+
+
+
+ 3
+ This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock.
+If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts.
+If you do not configure this policy settings, IAS and NAP user access requests are not audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Network Policy Server
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditOtherLogonLogoffEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit other logon/logoff-related events that are not covered in the “Logon/Logoff” policy setting such as the following:
+ Terminal Services session disconnections.
+ New Terminal Services sessions.
+ Locking and unlocking a workstation.
+ Invoking a screen saver.
+ Dismissal of a screen saver.
+ Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration.
+ Access to a wireless network granted to a user or computer account.
+ Access to a wired 802.1x network granted to a user or computer account.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Other Logon Logoff Events
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditSpecialLogon
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by special logons such as the following :
+ The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level.
+ A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121697).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit Special Logon
+ LastWrite
+
+
+
+ AccountLogonLogoff_AuditUserDeviceClaims
+
+
+
+
+ 0
+ This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource.
+
+User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on.
+
+When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff
+ Audit User Device Claims
+ LastWrite
+
+
+
+ AccountManagement_AuditApplicationGroupManagement
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to application groups such as the following:
+ Application group is created, changed, or deleted.
+ Member is added or removed from an application group.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an application group changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit Application Group Management
+ LastWrite
+
+
+
+ AccountManagement_AuditComputerAccountManagement
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a computer account changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit Computer Account Management
+ LastWrite
+
+
+
+ AccountManagement_AuditDistributionGroupManagement
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to distribution groups such as the following:
+ Distribution group is created, changed, or deleted.
+ Member is added or removed from a distribution group.
+ Distribution group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a distribution group changes.
+
+Note: Events in this subcategory are logged only on domain controllers.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit Distributio Group Management
+ LastWrite
+
+
+
+ AccountManagement_AuditOtherAccountManagementEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following:
+ The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration.
+ The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack.
+ Changes to the Default Domain Group Policy under the following Group Policy paths:
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy
+Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit Other Account Management Events
+ LastWrite
+
+
+
+ AccountManagement_AuditSecurityGroupManagement
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by changes to security groups such as the following:
+ Security group is created, changed, or deleted.
+ Member is added or removed from a security group.
+ Group type is changed.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a security group changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit Security Group Management
+ LastWrite
+
+
+
+ AccountManagement_AuditUserAccountManagement
+
+
+
+
+ 1
+ This policy setting allows you to audit changes to user accounts. Events include the following:
+ A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked.
+ A user account’s password is set or changed.
+ A security identifier (SID) is added to the SID History of a user account.
+ The Directory Services Restore Mode password is configured.
+ Permissions on administrative user accounts are changed.
+ Credential Manager credentials are backed up or restored.
+
+If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you do not configure this policy setting, no audit event is generated when a user account changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management
+ Audit User Account Management
+ LastWrite
+
+
+
+ DetailedTracking_AuditDPAPIActivity
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720.
+
+If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit DPAPI Activity
+ LastWrite
+
+
+
+ DetailedTracking_AuditPNPActivity
+
+
+
+
+ 0
+ This policy setting allows you to audit when plug and play detects an external device.
+
+If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category.
+If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit PNP Activity
+ LastWrite
+
+
+
+ DetailedTracking_AuditProcessCreation
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited.
+
+If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process is created.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit Process Creation
+ LastWrite
+
+
+
+ DetailedTracking_AuditProcessTermination
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when a process ends.
+
+If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a process ends.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit Process Termination
+ LastWrite
+
+
+
+ DetailedTracking_AuditRPCEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit inbound remote procedure call (RPC) connections.
+
+If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit RPC Events
+ LastWrite
+
+
+
+ DetailedTracking_AuditTokenRightAdjusted
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by adjusting the privileges of a token.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking
+ Audit Token Right Adjusted
+ LastWrite
+
+
+
+ DSAccess_AuditDetailedDirectoryServiceReplication
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by detailed Active Directory Domain Services (AD DS) replication between domain controllers.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access
+ Audit Detailed Directory Service Replication
+ LastWrite
+
+
+
+ DSAccess_AuditDirectoryServiceAccess
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when an Active Directory Domain Services (AD DS) object is accessed.
+
+Only AD DS objects with a matching system access control list (SACL) are logged.
+
+Events in this subcategory are similar to the Directory Service Access events available in previous versions of Windows.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access
+ Audit Directory Service Access
+ LastWrite
+
+
+
+ DSAccess_AuditDirectoryServiceChanges
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted.
+
+When possible, events logged in this subcategory indicate the old and new values of the object’s properties.
+
+Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged.
+
+Note: Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema.
+
+If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded.
+If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access
+ Audit Directory Service Changes
+ LastWrite
+
+
+
+ DSAccess_AuditDirectoryServiceReplication
+
+
+
+
+ 0
+ This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers.
+
+If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication.
+If you do not configure this policy setting, no audit event is generated during AD DS replication.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access
+ Audit Directory Service Replication
+ LastWrite
+
+
+
+ ObjectAccess_AuditApplicationGenerated
+
+
+
+
+ 0
+ This policy setting allows you to audit applications that generate events using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function.
+Events in this subcategory include:
+ Creation of an application client context.
+ Deletion of an application client context.
+ Initialization of an application client context.
+ Other application operations using the Windows Auditing APIs.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Application Generated
+ LastWrite
+
+
+
+ ObjectAccess_AuditCentralAccessPolicyStaging
+
+
+
+
+ 0
+ This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object.
+
+If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows:
+1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access.
+2) Failure audits when configured records access attempts when:
+ a) The current central access policy does not grant access but the proposed policy grants access.
+ b) A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy.
+
+Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Central Access Policy Staging
+ LastWrite
+
+
+
+ ObjectAccess_AuditCertificationServices
+
+
+
+
+ 0
+ This policy setting allows you to audit Active Directory Certificate Services (AD CS) operations.
+AD CS operations include the following:
+ AD CS startup/shutdown/backup/restore.
+ Changes to the certificate revocation list (CRL).
+ New certificate requests.
+ Issuing of a certificate.
+ Revocation of a certificate.
+ Changes to the Certificate Manager settings for AD CS.
+ Changes in the configuration of AD CS.
+ Changes to a Certificate Services template.
+ Importing of a certificate.
+ Publishing of a certification authority certificate is to Active Directory Domain Services.
+ Changes to the security permissions for AD CS.
+ Archival of a key.
+ Importing of a key.
+ Retrieval of a key.
+ Starting of Online Certificate Status Protocol (OCSP) Responder Service.
+ Stopping of Online Certificate Status Protocol (OCSP) Responder Service.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Certification Services
+ LastWrite
+
+
+
+ ObjectAccess_AuditDetailedFileShare
+
+
+
+
+ 0
+ This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Detailed File Share
+ LastWrite
+
+
+
+ ObjectAccess_AuditFileShare
+
+
+
+
+ 0
+ This policy setting allows you to audit attempts to access a shared folder.
+
+If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures.
+
+Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared folders on the system is audited.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit File Share
+ LastWrite
+
+
+
+ ObjectAccess_AuditFileSystem
+
+
+
+
+ 0
+ This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see https://go.microsoft.com/fwlink/?LinkId=122083.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL.
+
+Note: You can set a SACL on a file system object using the Security tab in that object's Properties dialog box.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit File System
+ LastWrite
+
+
+
+ ObjectAccess_AuditFilteringPlatformConnection
+
+
+
+
+ 0
+ This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP). The following events are included:
+ The Windows Firewall Service blocks an application from accepting incoming connections on the network.
+ The WFP allows a connection.
+ The WFP blocks a connection.
+ The WFP permits a bind to a local port.
+ The WFP blocks a bind to a local port.
+ The WFP allows a connection.
+ The WFP blocks a connection.
+ The WFP permits an application or service to listen on a port for incoming connections.
+ The WFP blocks an application or service to listen on a port for incoming connections.
+
+If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked.
+If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Filtering Platform Connection
+ LastWrite
+
+
+
+ ObjectAccess_AuditFilteringPlatformPacketDrop
+
+
+
+
+ 0
+ This policy setting allows you to audit packets that are dropped by Windows Filtering Platform (WFP).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Filtering Platform Packet Drop
+ LastWrite
+
+
+
+ ObjectAccess_AuditHandleManipulation
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events.
+
+If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a handle is manipulated.
+
+Note: Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Handle Manipulation
+ LastWrite
+
+
+
+ ObjectAccess_AuditKernelObject
+
+
+
+
+ 0
+ This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores.
+Only kernel objects with a matching system access control list (SACL) generate security audit events.
+
+Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Kernel Object
+ LastWrite
+
+
+
+ ObjectAccess_AuditOtherObjectAccessEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by the management of task scheduler jobs or COM+ objects.
+For scheduler jobs, the following are audited:
+ Job created.
+ Job deleted.
+ Job enabled.
+ Job disabled.
+ Job updated.
+For COM+ objects, the following are audited:
+ Catalog object added.
+ Catalog object updated.
+ Catalog object deleted.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Other Object Access Events
+ LastWrite
+
+
+
+ ObjectAccess_AuditRegistry
+
+
+
+
+ 0
+ This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL.
+
+Note: You can set a SACL on a registry object using the Permissions dialog box.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Registry
+ LastWrite
+
+
+
+ ObjectAccess_AuditRemovableStorage
+
+
+
+
+ 0
+ This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested.
+
+If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+
+If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit Removable Storage
+ LastWrite
+
+
+
+ ObjectAccess_AuditSAM
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects.
+SAM objects include the following:
+ SAM_ALIAS -- A local group.
+ SAM_GROUP -- A group that is not a local group.
+ SAM_USER – A user account.
+ SAM_DOMAIN – A domain.
+ SAM_SERVER – A computer account.
+If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
+Note: Only the System Access Control List (SACL) for SAM_SERVER can be modified.
+Volume: High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121698).
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access
+ Audit SAM
+ LastWrite
+
+
+
+ PolicyChange_AuditAuthenticationPolicyChange
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by changes to the authentication policy such as the following:
+ Creation of forest and domain trusts.
+ Modification of forest and domain trusts.
+ Removal of forest and domain trusts.
+ Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy.
+ Granting of any of the following user rights to a user or group:
+ Access This Computer From the Network.
+ Allow Logon Locally.
+ Allow Logon Through Terminal Services.
+ Logon as a Batch Job.
+ Logon a Service.
+ Namespace collision. For example, when a new trust has the same name as an existing namespace name.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authentication policy is changed.
+
+Note: The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit Authentication Policy Change
+ LastWrite
+
+
+
+ PolicyChange_AuditAuthorizationPolicyChange
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to the authorization policy such as the following:
+ Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+ Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory.
+ Changes in the Encrypted File System (EFS) policy.
+ Changes to the Resource attributes of an object.
+ Changes to the Central Access Policy (CAP) applied to an object.
+
+If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when the authorization policy changes.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit Authorization Policy Change
+ LastWrite
+
+
+
+ PolicyChange_AuditFilteringPlatformPolicyChange
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP) such as the following:
+ IPsec services status.
+ Changes to IPsec policy settings.
+ Changes to Windows Firewall policy settings.
+ Changes to WFP providers and engine.
+
+If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit Filtering Platform Policy Change
+ LastWrite
+
+
+
+ PolicyChange_AuditMPSSVCRuleLevelPolicyChange
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall. Events include the following:
+ Reporting of active policies when Windows Firewall service starts.
+ Changes to Windows Firewall rules.
+ Changes to Windows Firewall exception list.
+ Changes to Windows Firewall settings.
+ Rules ignored or not applied by Windows Firewall Service.
+ Changes to Windows Firewall Group Policy settings.
+
+If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit MPSSVC Rule Level Policy Change
+ LastWrite
+
+
+
+ PolicyChange_AuditOtherPolicyChangeEvents
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following:
+ Trusted Platform Module (TPM) configuration changes.
+ Kernel-mode cryptographic self tests.
+ Cryptographic provider operations.
+ Cryptographic context operations or modifications.
+ Applied Central Access Policies (CAPs) changes.
+ Boot Configuration Data (BCD) modifications.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit Other Policy Change Events
+ LastWrite
+
+
+
+ PolicyChange_AuditPolicyChange
+
+
+
+
+ 1
+ This policy setting allows you to audit changes in the security audit policy settings such as the following:
+ Settings permissions and audit settings on the Audit Policy object.
+ Changes to the system audit policy.
+ Registration of security event sources.
+ De-registration of security event sources.
+ Changes to the per-user audit settings.
+ Changes to the value of CrashOnAuditFail.
+ Changes to the system access control list on a file system or registry object.
+ Changes to the Special Groups list.
+
+Note: System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change
+ Audit Policy Change
+ LastWrite
+
+
+
+ PrivilegeUse_AuditNonSensitivePrivilegeUse
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights).
+The following privileges are non-sensitive:
+ Access Credential Manager as a trusted caller.
+ Access this computer from the network.
+ Add workstations to domain.
+ Adjust memory quotas for a process.
+ Allow log on locally.
+ Allow log on through Terminal Services.
+ Bypass traverse checking.
+ Change the system time.
+ Create a pagefile.
+ Create global objects.
+
+ Create permanent shared objects.
+ Create symbolic links.
+ Deny access this computer from the network.
+ Deny log on as a batch job.
+ Deny log on as a service.
+ Deny log on locally.
+ Deny log on through Terminal Services.
+ Force shutdown from a remote system.
+ Increase a process working set.
+ Increase scheduling priority.
+ Lock pages in memory.
+ Log on as a batch job.
+ Log on as a service.
+ Modify an object label.
+ Perform volume maintenance tasks.
+ Profile single process.
+ Profile system performance.
+ Remove computer from docking station.
+ Shut down the system.
+ Synchronize directory service data.
+
+If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls.
+If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use
+ Audit Non Sensitive Privilege Use
+ LastWrite
+
+
+
+ PrivilegeUse_AuditOtherPrivilegeUseEvents
+
+
+
+
+ 0
+ Not used.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use
+ Audit Other Privilege Use Events
+ LastWrite
+
+
+
+ PrivilegeUse_AuditSensitivePrivilegeUse
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following:
+ A privileged service is called.
+ One of the following privileges are called:
+ Act as part of the operating system.
+ Back up files and directories.
+ Create a token object.
+ Debug programs.
+ Enable computer and user accounts to be trusted for delegation.
+ Generate security audits.
+ Impersonate a client after authentication.
+ Load and unload device drivers.
+ Manage auditing and security log.
+ Modify firmware environment values.
+ Replace a process-level token.
+ Restore files and directories.
+ Take ownership of files or other objects.
+
+If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests.
+If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made.
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use
+ Audit Sensitive Privilege Use
+ LastWrite
+
+
+
+ System_AuditIPsecDriver
+
+
+
+
+ 0
+ This policy setting allows you to audit events generated by the IPsec filter driver such as the following:
+ Startup and shutdown of the IPsec services.
+ Network packets dropped due to integrity check failure.
+ Network packets dropped due to replay check failure.
+ Network packets dropped due to being in plaintext.
+ Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated.
+ Inability to process IPsec filters.
+
+If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System
+ Audit IPsec Driver
+ LastWrite
+
+
+
+ System_AuditOtherSystemEvents
+
+
+
+
+ 3
+ This policy setting allows you to audit any of the following events:
+ Startup and shutdown of the Windows Firewall service and driver.
+ Security policy processing by the Windows Firewall Service.
+ Cryptography key file and migration operations.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System
+ Audit Other System Events
+ LastWrite
+
+
+
+ System_AuditSecurityStateChange
+
+
+
+
+ 1
+ This policy setting allows you to audit events generated by changes in the security state of the computer such as the following events:
+ Startup and shutdown of the computer.
+ Change of system time.
+ Recovering the system from CrashOnAuditFail, which is logged after a system restarts when the security event log is full and the CrashOnAuditFail registry entry is configured.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System
+ Audit Security State Change
+ LastWrite
+
+
+
+ System_AuditSecuritySystemExtension
+
+
+
+
+ 0
+ This policy setting allows you to audit events related to security system extensions or services such as the following:
+ A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM.
+ A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account.
+If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts.
+If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System
+ Audit Security System Extension
+ LastWrite
+
+
+
+ System_AuditSystemIntegrity
+
+
+
+
+ 3
+ This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following:
+ Events that could not be written to the event log because of a problem with the auditing system.
+ A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space.
+ The detection of a Remote Procedure Call (RPC) that compromises system integrity.
+ The detection of a hash value of an executable file that is not valid as determined by Code Integrity.
+ Cryptographic operations that compromise system integrity.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ phone
+ Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System
+ Audit System Integrity
+ LastWrite
+
+
+
Authentication
@@ -50264,6 +54564,30 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi
LastWrite
+
+ SetMinimumEncryptionKeySize
+
+
+
+
+ 0
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ LastWrite
+
+
Browser
@@ -51675,7 +55999,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on
You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically.
-When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension.
+When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension.
When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel.
@@ -51686,11 +56010,11 @@ If disabled or not configured, extensions defined as part of this policy get ign
Default setting: Disabled or not configured
Related policies: Allow Developer Tools
Related Documents:
-- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn)
-- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business)
-- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy)
-- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
-- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows)
+- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn)
+- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business)
+- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy)
+- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
+- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows)
@@ -54424,6 +58748,34 @@ Related policy:
LastWrite
+
+ DOCacheHostSource
+
+
+
+
+ 0
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ DeliveryOptimization.admx
+ CacheHostSource
+ DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat
+ CacheHostSource
+ LastWrite
+
+
DODelayBackgroundDownloadFromHttp
@@ -54619,6 +58971,34 @@ Related policy:
LastWrite
+
+ DOMaxBackgroundDownloadBandwidth
+
+
+
+
+ 0
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ DeliveryOptimization.admx
+ MaxBackgroundDownloadBandwidth
+ DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat
+ MaxBackgroundDownloadBandwidth
+ LastWrite
+
+
DOMaxCacheAge
@@ -54676,7 +59056,7 @@ Related policy:
- DOMaxDownloadBandwidth
+ DOMaxForegroundDownloadBandwidth
@@ -54697,37 +59077,9 @@ Related policy:
DeliveryOptimization.admx
- MaxDownloadBandwidth
+ MaxForegroundDownloadBandwidth
DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat
- MaxDownloadBandwidth
- LastWrite
-
-
-
- DOMaxUploadBandwidth
-
-
-
-
- 0
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
- DeliveryOptimization.admx
- MaxUploadBandwidth
- DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat
- MaxUploadBandwidth
+ MaxForegroundDownloadBandwidth
LastWrite
@@ -54954,35 +59306,6 @@ Related policy:
LastWrite
-
- DOPercentageMaxDownloadBandwidth
-
-
-
-
- 0
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
-
- phone
- DeliveryOptimization.admx
- PercentageMaxDownloadBandwidth
- DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat
- PercentageMaxDownloadBandwidth
- LastWrite
-
-
DOPercentageMaxForegroundBandwidth
@@ -55429,6 +59752,33 @@ Related policy:
LastWrite
+
+ AllowInstallationOfMatchingDeviceInstanceIDs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ deviceinstallation.admx
+ DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category
+ DeviceInstall_Instance_IDs_Allow
+ LastWrite
+
+
AllowInstallationOfMatchingDeviceSetupClasses
@@ -55537,6 +59887,33 @@ Related policy:
LastWrite
+
+ PreventInstallationOfMatchingDeviceInstanceIDs
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ phone
+ deviceinstallation.admx
+ DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category
+ DeviceInstall_Instance_IDs_Deny
+ LastWrite
+
+
PreventInstallationOfMatchingDeviceSetupClasses
@@ -57087,6 +61464,118 @@ If you do not configure this policy setting, users will be able to choose whethe
+
+ FactoryComposer
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ BackgroundImagePath
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ OEMVersion
+
+
+
+
+ unset; partners can set via settings customization!
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ UserToSignIn
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
+ UWPLaunchOnBoot
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+
+
+
FileExplorer
@@ -58055,33 +62544,6 @@ If you do not configure this policy setting, users will be able to choose whethe
LastWrite
-
- DisableActiveXVersionListAutoDownload
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- text/plain
-
- phone
- inetres.admx
- inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement
- VersionListAutomaticDownloadDisable
- LastWrite
-
-
DisableAdobeFlash
@@ -68232,6 +72694,102 @@ If the user has configured a slide show to run on the lock screen when the machi
;
+
+ LetAppsAccessBackgroundSpatialPerception
+
+
+
+
+ 0
+ This policy setting specifies whether Windows apps can access the movement of the user's head, hands, motion controllers, and other tracked objects, while the apps are running in the background.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ HighestValueMostSecure
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
+
+ LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps
+
+
+
+
+
+ List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the user movements privacy setting for the listed apps. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ LastWrite
+ ;
+
+
LetAppsAccessCalendar
@@ -74951,6 +79509,99 @@ If you disable or do not configure this policy setting, File History can be acti
LowestValueMostSecure
+
+ ConfigureJapaneseIMEVersion
+
+
+
+
+ 0
+ This policy allows the IT admin to configure the Microsoft Japanese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Japanese IME is on by default. Allow to control Microsoft Japanese IME version to use.
+1 - The previous version of Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use.
+2 - The new Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ EAIME.admx
+ EAIME~AT~WindowsComponents~L_IME
+ L_ConfigureJapaneseImeVersion
+ LowestValueMostSecure
+
+
+
+ ConfigureSimplifiedChineseIMEVersion
+
+
+
+
+ 0
+ This policy allows the IT admin to configure the Microsoft Simplified Chinese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Simplified Chinese IME is on by default. Allow to control Microsoft Simplified Chinese IME version to use.
+1 - The previous version of Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use.
+2 - The new Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ EAIME.admx
+ EAIME~AT~WindowsComponents~L_IME
+ L_ConfigureSimplifiedChineseImeVersion
+ LowestValueMostSecure
+
+
+
+ ConfigureTraditionalChineseIMEVersion
+
+
+
+
+ 0
+ This policy allows the IT admin to configure the Microsoft Traditional Chinese IME version in the desktop.
+The following list shows the supported values:
+0 (default) – The new Microsoft Traditional Chinese IME is on by default. Allow to control Microsoft Traditional Chinese IME version to use.
+1 - The previous version of Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use.
+2 - The new Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use.
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+
+ EAIME.admx
+ EAIME~AT~WindowsComponents~L_IME
+ L_ConfigureTraditionalChineseImeVersion
+ LowestValueMostSecure
+
+
EnableTouchKeyboardAutoInvokeInDesktopMode
@@ -76956,6 +81607,33 @@ If you disable or do not configure this policy setting, the wake setting as spec
LastWrite
+
+ TargetReleaseVersion
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ text/plain
+
+ WindowsUpdate.admx
+ TargetReleaseVersionId
+ WindowsUpdate~AT~WindowsComponents~WindowsUpdateCat~DeferUpdateCat
+ TargetReleaseVersion
+ LastWrite
+
+
UpdateNotificationLevel
diff --git a/windows/client-management/mdm/supl-ddf-file.md b/windows/client-management/mdm/supl-ddf-file.md
index e2b10b625a..2c1db8dd46 100644
--- a/windows/client-management/mdm/supl-ddf-file.md
+++ b/windows/client-management/mdm/supl-ddf-file.md
@@ -9,14 +9,11 @@ ms.topic: article
ms.prod: w10
ms.technology: windows
author: manikadhiman
-ms.date: 07/20/2018
+ms.date: 06/03/2020
---
# SUPL DDF file
-> [!WARNING]
-> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
-
This topic shows the OMA DM device description framework (DDF) for the **SUPL** configuration service provider (CSP).
Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download).