mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 12:23:37 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into vs-intunechanges
This commit is contained in:
@ -66,12 +66,13 @@ A student PC that's set up using the Set up School PCs provisioning package is t
|
|||||||
|
|
||||||
To do this:
|
To do this:
|
||||||
- Go to **Settings > Update & security > Recovery**. In the **Reset this PC** section of the **Recovery** page, click **Get started**.
|
- Go to **Settings > Update & security > Recovery**. In the **Reset this PC** section of the **Recovery** page, click **Get started**.
|
||||||
- Or, hit **Shift + L + click Restart in the Power menu** to load the Windows boot user experience. From there, follow these steps:
|
- Or, hit **Shift** + click **Restart** in the **Power** menu to load the Windows boot user experience. From there, follow these steps:
|
||||||
1. Click **Troubleshoot** and then choose **Reset this PC**.
|
1. Click **Troubleshoot** and then choose **Reset this PC**.
|
||||||
2. Select **Remove everything**.
|
2. Select **Remove everything**.
|
||||||
3. Select **No - remove provisioning packages**.
|
3. Select **No - remove provisioning packages**.
|
||||||
4. Select **Only the drive where Windows is installed** (this may not always show up).
|
4. Select **Only the drive where Windows is installed** (this may not always show up).
|
||||||
5. Click **Just remove my files**.
|
5. Click **Just remove my files**.
|
||||||
|
6. Click **Reset**.
|
||||||
|
|
||||||
* **Use more than one USB key**
|
* **Use more than one USB key**
|
||||||
|
|
||||||
|
@ -28,11 +28,7 @@ You’ll need this software to run WIP in your enterprise:
|
|||||||
|
|
||||||
|Operating system | Management solution |
|
|Operating system | Management solution |
|
||||||
|-----------------|---------------------|
|
|-----------------|---------------------|
|
||||||
<<<<<<< HEAD
|
|
||||||
|Windows 10, version 1703 | Microsoft Intune<br>-OR-<br>System Center Configuration Manager<br>-OR-<br>Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. If your 3rd party MDM does not have UI support for the policies, refer to the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/mt697634.aspx) documentation.|
|
|
||||||
=======
|
|
||||||
|Windows 10, version 1607 or later | Microsoft Intune<br><br>-OR-<br><br>System Center Configuration Manager<br><br>-OR-<br><br>Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. If your 3rd party MDM does not have UI support for the policies, refer to the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/mt697634.aspx) documentation.|
|
|Windows 10, version 1607 or later | Microsoft Intune<br><br>-OR-<br><br>System Center Configuration Manager<br><br>-OR-<br><br>Your current company-wide 3rd party mobile device management (MDM) solution. For info about 3rd party MDM solutions, see the documentation that came with your product. If your 3rd party MDM does not have UI support for the policies, refer to the [EnterpriseDataProtection CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/mt697634.aspx) documentation.|
|
||||||
>>>>>>> refs/remotes/origin/master
|
|
||||||
|
|
||||||
## What is enterprise data control?
|
## What is enterprise data control?
|
||||||
Effective collaboration means that you need to share data with others in your enterprise. This sharing can be from one extreme where everyone has access to everything without any security, all the way to the other extreme where people can’t share anything and it’s all highly secured. Most enterprises fall somewhere in between the two extremes, where success is balanced between providing the necessary access with the potential for improper data disclosure.
|
Effective collaboration means that you need to share data with others in your enterprise. This sharing can be from one extreme where everyone has access to everything without any security, all the way to the other extreme where people can’t share anything and it’s all highly secured. Most enterprises fall somewhere in between the two extremes, where success is balanced between providing the necessary access with the potential for improper data disclosure.
|
||||||
|
Reference in New Issue
Block a user