mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 15:27:22 +00:00
Merge pull request #4964 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
757ee9bd3a
@ -5,9 +5,8 @@ ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: manikadhiman
|
||||
author: dansimp
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 09/27/2019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
@ -77,7 +76,7 @@ manager: dansimp
|
||||
Added in Windows 10, version 1803. This policy allows the IT admin to control which policy will be used whenever both the MDM policy and its equivalent Group Policy (GP) are set on the device.
|
||||
|
||||
> [!NOTE]
|
||||
> MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers.
|
||||
> MDMWinsOverGP only applies to policies in Policy CSP. MDM policies win over Group Policies where applicable; not all Group Policies are available via MDM or CSP. It does not apply to other MDM settings with equivalent GP settings that are defined in other CSPs.
|
||||
|
||||
This policy is used to ensure that MDM policy wins over GP when policy is configured on MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
|
||||
|
||||
@ -130,4 +129,3 @@ Footnotes:
|
||||
- 8 - Available in Windows 10, version 2004.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -677,7 +677,7 @@ The following list shows the supported values:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Specifies the maximum amount of time (in seconds) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app.
|
||||
Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app.
|
||||
|
||||
* On Mobile, the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy.
|
||||
* On HoloLens, this timeout is controlled by the device's system sleep timeout, regardless of the value set by this policy.
|
||||
|
@ -196,14 +196,14 @@ ADMX Info:
|
||||
<!--/ADMXMapped-->
|
||||
|
||||
<a href="" id="savefilestohost"></a>**Settings/SaveFilesToHost**
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files them from container to the host operating system.
|
||||
Added in Windows 10, version 1803. This policy setting allows you to determine whether users can elect to download files from Edge in the container and persist files them from container to the host operating system. This also enables users to elect files on the host operating system and upload it through Edge in the container.
|
||||
|
||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
||||
|
||||
This policy setting is supported on Microsoft Edge on Windows 10 Enterprise or Windows 10 Education with Microsoft Defender Application Guard in Enterprise mode.
|
||||
|
||||
The following list shows the supported values:
|
||||
- 0 (default) - The user cannot download files from Edge in the container to the host file system. When the policy is not configured, it is the same as disabled (0).
|
||||
- 0 (default) - The user cannot download files from Edge in the container to the host file system, or upload files from host file system to Edge in the container. When the policy is not configured, it is the same as disabled (0).
|
||||
- 1 - Turns on the functionality to allow users to download files from Edge in the container to the host file system.
|
||||
|
||||
<!--ADMXMapped-->
|
||||
|
@ -35,7 +35,9 @@ Any one of the following factors might cause the stop error:
|
||||
|
||||
* In unusual cases, the failure of the TrustedInstaller service to commit newly installed updates is because of component-based store corruptions
|
||||
|
||||
* Corrupted files in the **Boot** partition (for example, corruption in the volume that's labeled **SYSTEM** when you run the `diskpart` > `list vol` command)
|
||||
* Corrupted files in the **Boot** partition (for example, corruption in the volume that's labeled **SYSTEM** when you run the `diskpart` > `list vol` command)
|
||||
|
||||
* If there is a blank GPT entry before the entry of the **Boot** partition
|
||||
|
||||
## Troubleshoot this error
|
||||
|
||||
|
@ -91,7 +91,7 @@ The following figure illustrates how deploying Windows 10 has evolved with each
|
||||
> The following requirements do not apply to general Windows 10 activation on Azure. Azure activation requires a connection to Azure KMS only, and supports workgroup, Hybrid, and Azure AD-joined VMs. In most scenarios, activation of Azure VMs happens automatically. For more information, see [Understanding Azure KMS endpoints for Windows product activation of Azure Virtual Machines](https://docs.microsoft.com/azure/virtual-machines/troubleshooting/troubleshoot-activation-problems#understanding-azure-kms-endpoints-for-windows-product-activation-of-azure-virtual-machines).
|
||||
|
||||
> [!NOTE]
|
||||
> Currently, Subscription Activation is only available on commercial tenants and is not currently available on US GCC or GCC High tenants.
|
||||
> Currently, Subscription Activation is only available on commercial tenants and is currently not available on US GCC, GCC High, or DoD tenants.
|
||||
|
||||
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following:
|
||||
|
||||
@ -215,7 +215,7 @@ If you’re running Windows 7, it can be more work. A wipe-and-load approach w
|
||||
The following policies apply to acquisition and renewal of licenses on devices:
|
||||
- Devices that have been upgraded will attempt to renew licenses about every 30 days, and must be connected to the Internet to successfully acquire or renew a license.
|
||||
- If a device is disconnected from the Internet until its current subscription expires, the operating system will revert to Windows 10 Pro or Windows 10 Pro Education. As soon as the device is connected to the Internet again, the license will automatically renew.
|
||||
- Up to five devices can be upgraded for each user license.
|
||||
- Up to five devices can be upgraded for each user license. If the user license is used for a sixth device, the operating system on the computer to which a user has not logged in the longest will revert to Windows 10 Pro or Windows 10 Pro Education.
|
||||
- If a device meets the requirements and a licensed user signs in on that device, it will be upgraded.
|
||||
|
||||
Licenses can be reallocated from one user to another user, allowing you to optimize your licensing investment against changing needs.
|
||||
|
@ -47,7 +47,7 @@ These are the things you'll need to complete this lab:
|
||||
<table><tr><td>Windows 10 installation media</td><td>Windows 10 Professional or Enterprise (ISO file) for a supported version of Windows 10, semi-annual channel. If you do not already have an ISO to use, a link is provided to download an <a href="https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise" data-raw-source="[evaluation version of Windows 10 Enterprise](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise)">evaluation version of Windows 10 Enterprise</a>.</td></tr>
|
||||
<tr><td>Internet access</td><td>If you are behind a firewall, see the detailed <a href="windows-autopilot-requirements.md#networking-requirements" data-raw-source="[networking requirements](windows-autopilot-requirements.md#networking-requirements)">networking requirements</a>. Otherwise, just ensure that you have a connection to the Internet.</td></tr>
|
||||
<tr><td>Hyper-V or a physical device running Windows 10</td><td>The guide assumes that you will use a Hyper-V VM, and provides instructions to install and configure Hyper-V if needed. To use a physical device, skip the steps to install and configure Hyper-V.</td></tr>
|
||||
<tr><td>A Premium Intune account</td><td>This guide will describe how to obtain a free 30-day trial premium account that can be used to complete the lab.</td></tr></table>
|
||||
<tr><td>An account with Azure AD Premium license</td><td>This guide will describe how to obtain a free 30-day trial Azure AD Premium subscription that can be used to complete the lab.</td></tr></table>
|
||||
|
||||
## Procedures
|
||||
|
||||
|
@ -1853,7 +1853,7 @@ The Enterprise Key Admins group was introduced in Windows Server 2016.
|
||||
| Default container | CN=Users, DC=<domain>, DC= |
|
||||
| Default members | None |
|
||||
| Default member of | None |
|
||||
| Protected by ADMINSDHOLDER? | No |
|
||||
| Protected by ADMINSDHOLDER? | Yes |
|
||||
| Safe to move out of default container? | Yes |
|
||||
| Safe to delegate management of this group to non-Service admins? | No |
|
||||
| Default User Rights | None |
|
||||
@ -2331,7 +2331,7 @@ The Key Admins group applies to versions of the Windows Server operating system
|
||||
| Default container | CN=Users, DC=<domain>, DC= |
|
||||
| Default members | None |
|
||||
| Default member of | None |
|
||||
| Protected by ADMINSDHOLDER? | No |
|
||||
| Protected by ADMINSDHOLDER? | Yes |
|
||||
| Safe to move out of default container? | Yes |
|
||||
| Safe to delegate management of this group to non-Service admins? | No |
|
||||
| Default User Rights | None |
|
||||
|
@ -263,11 +263,10 @@ To disable Windows Defender Credential Guard, you can use the following set of p
|
||||
>bcdedit /set vsmlaunchtype off
|
||||
>```
|
||||
|
||||
> [!NOTE]
|
||||
> Credential Guard and Device Guard are not currently supported when using Azure IaaS VMs. These options will be made available with future Gen 2 VMs.
|
||||
For more info on virtualization-based security and HVCI, see [Enable virtualization-based protection of code integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity).
|
||||
|
||||
For more info on virtualization-based security and HVCI, see [Enable virtualization-based protection of code integrity](/windows/security/threat-protection/device-guard/enable-virtualization-based-protection-of-code-integrity
|
||||
).
|
||||
> [!NOTE]
|
||||
> Credential Guard and Device Guard are not supported when using Azure Gen 1 VMs. These options are available with Gen 2 VMs only.
|
||||
|
||||
<span id="turn-off-with-hardware-readiness-tool"/>
|
||||
|
||||
@ -292,5 +291,3 @@ From the host, you can disable Windows Defender Credential Guard for a virtual m
|
||||
Set-VMSecurity -VMName <VMName> -VirtualizationBasedSecurityOptOut $true
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
@ -60,8 +60,12 @@ The following video provides an overview of Windows Sandbox.
|
||||
|
||||
If the **Windows Sandbox** option is unavailable, your computer doesn't meet the requirements to run Windows Sandbox. If you think this is incorrect, review the prerequisite list as well as steps 1 and 2.
|
||||
|
||||
> [!NOTE]
|
||||
> To enable Sandbox using PowerShell, open PowerShell as Administrator and run **Enable-WindowsOptionalFeature -FeatureName "Containers-DisposableClientVM" -All -Online**.
|
||||
|
||||
4. Locate and select **Windows Sandbox** on the Start menu to run it for the first time.
|
||||
|
||||
|
||||
## Usage
|
||||
1. Copy an executable file (and any other files needed to run the application) from the host and paste them into the **Windows Sandbox** window.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user