Merge pull request #10184 from paolomatarazzo/pm-20240906-freshness

Freshness review
This commit is contained in:
Stacyrch140 2024-09-06 14:07:15 -04:00 committed by GitHub
commit 83df044442
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
26 changed files with 61 additions and 63 deletions

View File

@ -1,7 +1,7 @@
--- ---
title: Configure Take a Test in kiosk mode title: Configure Take a Test in kiosk mode
description: Learn how to configure Windows to execute the Take a Test app in kiosk mode, using Intune and provisioning packages. description: Learn how to configure Windows to execute the Take a Test app in kiosk mode, using Intune and provisioning packages.
ms.date: 11/08/2023 ms.date: 09/06/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -26,7 +26,7 @@ The other options allow you to configure Take a Test in kiosk mode using a local
Follow the instructions below to configure your devices, selecting the option that best suits your needs. Follow the instructions below to configure your devices, selecting the option that best suits your needs.
# [:::image type="icon" source="images/icons/intune.svg"::: **Intune**](#tab/intune) # [:::image type="icon" source="images/icons/intune.svg"::: **Intune/CSP**](#tab/intune)
You can use Intune for Education or a custom profile in Microsoft Intune: You can use Intune for Education or a custom profile in Microsoft Intune:

View File

@ -1,7 +1,7 @@
--- ---
title: Take a Test app technical reference title: Take a Test app technical reference
description: List of policies and settings applied by the Take a Test app. description: List of policies and settings applied by the Take a Test app.
ms.date: 11/02/2023 ms.date: 09/06/2024
ms.topic: reference ms.topic: reference
--- ---
@ -15,7 +15,7 @@ Assessment vendors can use Take a Test as a platform to lock down the operating
## PC lock-down for assessment ## PC lock-down for assessment
When the assessment page initiates lock-down, the student's desktop is locked and the app executes above the Windows lock screen. This provides a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test applies local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied. When the assessment page initiates lock-down, the student's desktop is locked and the app executes above the Windows lock screen. This provides a sandbox that ensures the student can only interact with the Take a Test app. After transitioning to the lock screen, Take a Test applies local MDM policies to further lock down the device. The whole process of going above the lock screen and applying policies is what defines lock-down. The lock-down process is atomic, which means that if any part of the lock-down operation fails, the app won't be above lock and won't have any of the policies applied.
When running above the lock screen: When running above the lock screen:
@ -64,7 +64,7 @@ When Take a Test is running, the following functionality is available to student
- Assistive technology that might be running - Assistive technology that might be running
- Lock screen (not available if student is using a dedicated test account) - Lock screen (not available if student is using a dedicated test account)
> [!NOTE] > [!NOTE]
> The app will exit if the student signs in to an account from the lock screen. > The app will exit if the student signs in to an account from the lock screen.
> Progress made in the test may be lost or invalidated. > Progress made in the test may be lost or invalidated.
- The student can exit the test by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd> - The student can exit the test by pressing <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>Delete</kbd>

View File

@ -127,5 +127,4 @@ Depending on your configuration, you can have a user to automatically sign in to
<!--links--> <!--links-->
[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 [MEM-1]: /mem/intune/configuration/custom-settings-windows-10
[MEM-2]: /mem/intune/fundamentals/licenses#device-only-licenses
[WIN-3]: /windows/client-management/mdm/assignedaccess-csp [WIN-3]: /windows/client-management/mdm/assignedaccess-csp

View File

@ -1,7 +1,7 @@
--- ---
title: Configure a shared or guest Windows device title: Configure a shared or guest Windows device
description: Description of how to configured Shared PC mode, which is a Windows feature that optimizes devices for shared use scenarios. description: Description of how to configured Shared PC mode, which is a Windows feature that optimizes devices for shared use scenarios.
ms.date: 11/08/2023 ms.date: 09/06/2024
ms.topic: how-to ms.topic: how-to
--- ---
@ -25,9 +25,7 @@ Shared PC can be configured using the following methods:
Follow the instructions below to configure your devices, selecting the option that best suits your needs. Follow the instructions below to configure your devices, selecting the option that best suits your needs.
#### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune**](#tab/intune) #### [:::image type="icon" source="../images/icons/intune.svg"::: **Intune/CSP**](#tab/intune)
To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Shared PC`**: To configure devices using Microsoft Intune, [create a **Settings catalog** policy][MEM-2], and use the settings listed under the category **`Shared PC`**:

View File

@ -1,9 +1,9 @@
--- ---
ms.date: 11/07/2023 ms.date: 09/06/2024
title: Access Control overview title: Access Control overview
description: Learn about access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. description: Learn about access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer.
ms.topic: overview ms.topic: overview
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>

View File

@ -1,9 +1,9 @@
--- ---
ms.date: 11/07/2023 ms.date: 09/06/2024
title: Local Accounts title: Local Accounts
description: Learn how to secure and manage access to the resources on a standalone or member server for services or users. description: Learn how to secure and manage access to the resources on a standalone or member server for services or users.
ms.topic: concept-article ms.topic: concept-article
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/windows-server-release-info target=_blank>Windows Server 2022</a>
@ -37,7 +37,7 @@ The default Administrator account can't be deleted or locked out, but it can be
Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group. Windows setup disables the built-in Administrator account and creates another local account that is a member of the Administrators group.
Members of the Administrators groups can run apps with elevated permissions without using the *Run as Administrator* option. Fast User Switching is more secure than using `runas` or different-user elevation. Members of the Administrators groups can run apps with elevated permissions without using the *Run as Administrator* option. Fast User Switching is more secure than using `runas` or different-user elevation.
#### Account group membership #### Account group membership
@ -219,7 +219,7 @@ The following table shows the Group Policy and registry settings that are used t
||Registry value data|0| ||Registry value data|0|
> [!NOTE] > [!NOTE]
> You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates. > You can also enforce the default for LocalAccountTokenFilterPolicy by using the custom ADMX in Security Templates.
#### To enforce local account restrictions for remote access #### To enforce local account restrictions for remote access

View File

@ -4,7 +4,7 @@ description: Learn about passkeys and how to use them on Windows devices.
ms.collection: ms.collection:
- tier1 - tier1
ms.topic: overview ms.topic: overview
ms.date: 11/07/2023 ms.date: 09/06/2024
appliesto: appliesto:
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 11</a>
- ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a> - ✅ <a href=https://learn.microsoft.com/windows/release-health/supported-versions-windows-client target=_blank>Windows 10</a>

View File

@ -2,7 +2,7 @@
title: Deploy Virtual Smart Cards title: Deploy Virtual Smart Cards
description: Learn about what to consider when deploying a virtual smart card authentication solution description: Learn about what to consider when deploying a virtual smart card authentication solution
ms.topic: concept-article ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Deploy Virtual Smart Cards # Deploy Virtual Smart Cards

View File

@ -2,7 +2,7 @@
title: Evaluate Virtual Smart Card Security title: Evaluate Virtual Smart Card Security
description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards. description: Learn about the security characteristics and considerations when deploying TPM virtual smart cards.
ms.topic: concept-article ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Evaluate Virtual Smart Card Security # Evaluate Virtual Smart Card Security

View File

@ -1,8 +1,8 @@
--- ---
title: Get Started with Virtual Smart Cards - Walkthrough Guide title: Get Started with Virtual Smart Cards - Walkthrough Guide
description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards. description: This topic for the IT professional describes how to set up a basic test environment for using TPM virtual smart cards.
ms.topic: get-started ms.topic: get-started
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Get Started with Virtual Smart Cards: Walkthrough Guide # Get Started with Virtual Smart Cards: Walkthrough Guide
@ -79,10 +79,11 @@ In this step, you create the virtual smart card on the client computer by using
`tpmvscmgr.exe create /name TestVSC /pin default /adminkey random /generate` `tpmvscmgr.exe create /name TestVSC /pin default /adminkey random /generate`
This creates a virtual smart card with the name **TestVSC**, omit the unlock key, and generate the file system on the card. The PIN is set to the default, 12345678. To be prompted for a PIN, instead of **/pin default** you can type **/pin prompt**.\ This creates a virtual smart card with the name **TestVSC**, omit the unlock key, and generate the file system on the card. The PIN is set to the default, 12345678.
For more information about the Tpmvscmgr command-line tool, see [Use Virtual Smart Cards](virtual-smart-card-use-virtual-smart-cards.md) and [Tpmvscmgr](virtual-smart-card-tpmvscmgr.md).
1. Wait several seconds for the process to finish. Upon completion, Tpmvscmgr.exe provides you with the device instance ID for the TPM Virtual Smart Card. Store this ID for later reference because you need it to manage or remove the virtual smart card. 1. Wait several seconds for the process to finish. Upon completion, Tpmvscmgr.exe provides you with the device instance ID for the TPM Virtual Smart Card. Store this ID for later reference because you need it to manage or remove the virtual smart card. To be prompted for a PIN, instead of **/pin default** you can type **/pin prompt**.
For more information about the Tpmvscmgr command-line tool, see [Use Virtual Smart Cards](virtual-smart-card-use-virtual-smart-cards.md) and [Tpmvscmgr](virtual-smart-card-tpmvscmgr.md).
## Step 3: Enroll for the certificate on the TPM Virtual Smart Card ## Step 3: Enroll for the certificate on the TPM Virtual Smart Card

View File

@ -2,7 +2,7 @@
title: Virtual Smart Card Overview title: Virtual Smart Card Overview
description: Learn about virtual smart card technology for Windows. description: Learn about virtual smart card technology for Windows.
ms.topic: overview ms.topic: overview
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Virtual Smart Card Overview # Virtual Smart Card Overview

View File

@ -2,7 +2,7 @@
title: Tpmvscmgr title: Tpmvscmgr
description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer. description: Learn about the Tpmvscmgr command-line tool, through which an administrator can create and delete TPM virtual smart cards on a computer.
ms.topic: reference ms.topic: reference
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Tpmvscmgr # Tpmvscmgr

View File

@ -2,7 +2,7 @@
title: Understanding and Evaluating Virtual Smart Cards title: Understanding and Evaluating Virtual Smart Cards
description: Learn how smart card technology can fit into your authentication design. description: Learn how smart card technology can fit into your authentication design.
ms.topic: overview ms.topic: overview
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Understand and Evaluate Virtual Smart Cards # Understand and Evaluate Virtual Smart Cards

View File

@ -2,7 +2,7 @@
title: Use Virtual Smart Cards title: Use Virtual Smart Cards
description: Learn about the requirements for virtual smart cards, how to use and manage them. description: Learn about the requirements for virtual smart cards, how to use and manage them.
ms.topic: concept-article ms.topic: concept-article
ms.date: 11/06/2023 ms.date: 09/06/2024
--- ---
# Use Virtual Smart Cards # Use Virtual Smart Cards

View File

@ -1,8 +1,8 @@
--- ---
title: Configure Windows Firewall logging title: Configure Windows Firewall logging
description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy. description: Learn how to configure Windows Firewall to log dropped packets or successful connections with CSP and group policy.
ms.topic: how-to ms.topic: how-to
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Configure Windows Firewall logging # Configure Windows Firewall logging
@ -137,7 +137,7 @@ If not, add *FullControl* permissions for `mpssvc` to the folder, subfolders and
```PowerShell ```PowerShell
$LogPath = Join-Path -path $env:windir -ChildPath "System32\LogFiles\Firewall" $LogPath = Join-Path -path $env:windir -ChildPath "System32\LogFiles\Firewall"
$NewAcl = Get-Acl -Path $LogPath $NewAcl = Get-Acl -Path $LogPath
$identity = "NT SERVICE\mpssvc" $identity = "NT SERVICE\mpssvc"
$fileSystemRights = "FullControl" $fileSystemRights = "FullControl"

View File

@ -2,7 +2,7 @@
title: Manage Windows Firewall with the command line title: Manage Windows Firewall with the command line
description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh. description: Learn how to manage Windows Firewall from the command line. This guide provides examples how to manage Windows Firewall with PowerShell and Netsh.
ms.topic: how-to ms.topic: how-to
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Manage Windows Firewall with the command line # Manage Windows Firewall with the command line

View File

@ -2,7 +2,7 @@
title: Configure firewall rules with group policy title: Configure firewall rules with group policy
description: Learn how to configure firewall rules using group policy with the Windows Firewall with Advanced Security console. description: Learn how to configure firewall rules using group policy with the Windows Firewall with Advanced Security console.
ms.topic: how-to ms.topic: how-to
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Configure rules with group policy # Configure rules with group policy

View File

@ -2,7 +2,7 @@
title: Windows Firewall dynamic keywords title: Windows Firewall dynamic keywords
description: Learn about Windows Firewall dynamic keywords and how to configure it using Windows PowerShell. description: Learn about Windows Firewall dynamic keywords and how to configure it using Windows PowerShell.
ms.topic: how-to ms.topic: how-to
ms.date: 01/16/2024 ms.date: 09/06/2024
--- ---
# Windows Firewall dynamic keywords # Windows Firewall dynamic keywords

View File

@ -2,7 +2,7 @@
title: Filter origin audit log title: Filter origin audit log
description: Learn about Windows Firewall and filter origin audit log to troubleshoot packet drops. description: Learn about Windows Firewall and filter origin audit log to troubleshoot packet drops.
ms.topic: troubleshooting ms.topic: troubleshooting
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Filter origin audit log # Filter origin audit log

View File

@ -1,8 +1,8 @@
--- ---
title: Hyper-V firewall title: Hyper-V firewall
description: Learn how to configure Hyper-V firewall rules and settings using PowerShell or Configuration Service Provider (CSP). description: Learn how to configure Hyper-V firewall rules and settings using PowerShell or Configuration Service Provider (CSP).
ms.topic: how-to ms.topic: how-to
ms.date: 11/21/2023 ms.date: 09/06/2024
appliesto: appliesto:
- ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a> - ✅ <a href="https://learn.microsoft.com/windows/release-health/supported-versions-windows-client" target="_blank">Windows 11</a>
--- ---
@ -21,18 +21,18 @@ This section describes the steps to manage Hyper-V firewall using PowerShell.
### Obtain the WSL GUID ### Obtain the WSL GUID
Hyper-V firewall rules are enabled per *VMCreatorId*. To obtain the VMCreatorId, use the cmdlet: Hyper-V firewall rules are enabled per *VMCreatorId*. To obtain the VMCreatorId, use the cmdlet:
```powershell ```powershell
Get-NetFirewallHyperVVMCreator Get-NetFirewallHyperVVMCreator
``` ```
The output contains a VmCreator object type, which has unique identifier `VMCreatorId` and `friendly name` properties. For example, the following output shows the properties of WSL: The output contains a VmCreator object type, which has unique identifier `VMCreatorId` and `friendly name` properties. For example, the following output shows the properties of WSL:
```powershell ```powershell
PS C:\> Get-NetFirewallHyperVVMCreator PS C:\> Get-NetFirewallHyperVVMCreator
VMCreatorId : {40E0AC32-46A5-438A-A0B2-2B479E8F2E90} VMCreatorId : {40E0AC32-46A5-438A-A0B2-2B479E8F2E90}
FriendlyName : WSL FriendlyName : WSL
``` ```
> [!NOTE] > [!NOTE]
@ -63,7 +63,7 @@ The output contains the following values:
To configure Hyper-V firewall, use the [Set-NetFirewallHyperVVMSetting][PS-2] command. For example, the following command sets the default inbound connection to *Allow*: To configure Hyper-V firewall, use the [Set-NetFirewallHyperVVMSetting][PS-2] command. For example, the following command sets the default inbound connection to *Allow*:
```powershell ```powershell
Set-NetFirewallHyperVVMSetting -Name '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -DefaultInboundAction Allow Set-NetFirewallHyperVVMSetting -Name '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -DefaultInboundAction Allow
``` ```
### Firewall Rules ### Firewall Rules
@ -76,10 +76,10 @@ Get-NetFirewallHyperVRule -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}'
To configure specific rules, use the [Set-NetFirewallHyperVRule][PS-4] cmdlet. To configure specific rules, use the [Set-NetFirewallHyperVRule][PS-4] cmdlet.
For example, to create an inbound rule to allow TCP traffic to WSL on port 80, use the following command: For example, to create an inbound rule to allow TCP traffic to WSL on port 80, use the following command:
```powershell ```powershell
New-NetFirewallHyperVRule -Name MyWebServer -DisplayName "My Web Server" -Direction Inbound -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -Protocol TCP -LocalPorts 80 New-NetFirewallHyperVRule -Name MyWebServer -DisplayName "My Web Server" -Direction Inbound -VMCreatorId '{40E0AC32-46A5-438A-A0B2-2B479E8F2E90}' -Protocol TCP -LocalPorts 80
``` ```
### Target Hyper-V firewall rules and settings to specific profiles ### Target Hyper-V firewall rules and settings to specific profiles
@ -95,7 +95,7 @@ The policy options are similar to the ones already described, but are applied to
To view the settings per profile, use the following command: To view the settings per profile, use the following command:
```powershell ```powershell
Get-NetFirewallHyperVProfile -PolicyStore ActiveStore Get-NetFirewallHyperVProfile -PolicyStore ActiveStore
``` ```
> [!NOTE] > [!NOTE]

View File

@ -1,8 +1,8 @@
--- ---
title: Windows Firewall overview title: Windows Firewall overview
description: Learn overview information about the Windows Firewall security feature. description: Learn overview information about the Windows Firewall security feature.
ms.topic: overview ms.topic: overview
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Windows Firewall overview # Windows Firewall overview

View File

@ -2,7 +2,7 @@
title: Quarantine behavior title: Quarantine behavior
description: Learn about Windows Firewall and the quarantine feature behavior. description: Learn about Windows Firewall and the quarantine feature behavior.
ms.topic: concept-article ms.topic: concept-article
ms.date: 11/21/2023 ms.date: 09/06/2024
--- ---
# Quarantine behavior # Quarantine behavior
@ -77,7 +77,7 @@ Inside the wfpdiag.xml, search for `netEvents` that have `FWPM_NET_EVENT_TYPE_CL
The characters in the application ID name are separated by periods: The characters in the application ID name are separated by periods:
```XML ```XML
<asString> \\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e... </asString> <asString> \\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e... </asString>
``` ```
The `netEvent` contains more information about the dropped packet, including information about its capabilities, the filter that dropped the packet, and much more. The `netEvent` contains more information about the dropped packet, including information about its capabilities, the filter that dropped the packet, and much more.

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Firewall rules title: Windows Firewall rules
description: Learn about Windows Firewall rules and design recommendations. description: Learn about Windows Firewall rules and design recommendations.
ms.date: 11/21/2023 ms.date: 09/06/2024
ms.topic: concept-article ms.topic: concept-article
--- ---

View File

@ -1,7 +1,7 @@
--- ---
title: Windows Firewall tools title: Windows Firewall tools
description: Learn about the available tools to configure Windows Firewall and firewall rules. description: Learn about the available tools to configure Windows Firewall and firewall rules.
ms.date: 11/20/2023 ms.date: 09/06/2024
ms.topic: best-practice ms.topic: best-practice
--- ---

View File

@ -2,7 +2,7 @@
title: Troubleshooting UWP App Connectivity Issues in Windows Firewall title: Troubleshooting UWP App Connectivity Issues in Windows Firewall
description: Troubleshooting UWP App Connectivity Issues in Windows Firewall description: Troubleshooting UWP App Connectivity Issues in Windows Firewall
ms.topic: troubleshooting ms.topic: troubleshooting
ms.date: 11/07/2023 ms.date: 09/06/2024
--- ---
# Troubleshooting UWP App Connectivity Issues # Troubleshooting UWP App Connectivity Issues
@ -83,7 +83,7 @@ package SID, or application ID name. The characters in the application ID name
will be separated by periods: will be separated by periods:
```XML ```XML
(ex) (ex)
<asString> <asString>
\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e... \\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.w.i.n.d.o.w.s.\\.s.y.s.t.e.m.3.2.\\.s.v.c.h.o.s.t...e.x.e...
@ -118,18 +118,18 @@ remote address, capabilities, etc.
<item>FWPM_NET_EVENT_FLAG_LOCAL_PORT_SET</item> <item>FWPM_NET_EVENT_FLAG_LOCAL_PORT_SET</item>
<item>FWPM_NET_EVENT_FLAG_REMOTE_PORT_SET</item> <item>FWPM_NET_EVENT_FLAG_REMOTE_PORT_SET</item>
<item>FWPM_NET_EVENT_FLAG_APP_ID_SET</item> <item>FWPM_NET_EVENT_FLAG_APP_ID_SET</item>
<item>FWPM_NET_EVENT_FLAG_USER_ID_SET</item> <item>FWPM_NET_EVENT_FLAG_USER_ID_SET</item>
<item>FWPM_NET_EVENT_FLAG_IP_VERSION_SET</item> <item>FWPM_NET_EVENT_FLAG_IP_VERSION_SET</item>
<item>FWPM_NET_EVENT_FLAG_PACKAGE_ID_SET</item> <item>FWPM_NET_EVENT_FLAG_PACKAGE_ID_SET</item>
</flags> </flags>
<ipVersion>FWP_IP_VERSION_V6</ipVersion> <ipVersion>FWP_IP_VERSION_V6</ipVersion>
<ipProtocol>6</ipProtocol> <ipProtocol>6</ipProtocol>
<localAddrV6.byteArray16>2001:4898:30:3:256c:e5ba:12f3:beb1</localAddrV6.byteArray16> <localAddrV6.byteArray16>2001:4898:30:3:256c:e5ba:12f3:beb1</localAddrV6.byteArray16>
<remoteAddrV6.byteArray16>2620:1ec:c11::200</remoteAddrV6.byteArray16> <remoteAddrV6.byteArray16>2620:1ec:c11::200</remoteAddrV6.byteArray16>
<localPort>52127</localPort> <localPort>52127</localPort>
<remotePort>443</remotePort> <remotePort>443</remotePort>
<scopeId>0</scopeId> <scopeId>0</scopeId>
<appId> <appId>
<data>5c006400650076006900630065005c0068006100720064006400690073006b0076006f006c0075006d00650031005c00700072006f006700720061006d002000660069006c00650073005c00770069006e0064006f007700730061007000700073005c00610066003600390032006200660066002d0036003700370039002d0034003200340066002d0038003700300065002d006600360065003500390063003500300032003300340039005f0031002e0031002e00310030002e0030005f007800360034005f005f00350063003000330037006a0061007200350038003300390072005c0075007700700073006f0063006b006500740063006c00690065006e0074002e006500780065000000</data> <data>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</data>
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m. <asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.0...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString> .f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.0...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
@ -152,7 +152,7 @@ remote address, capabilities, etc.
<internalFields> <internalFields>
<internalFlags/> <internalFlags/>
<remoteAddrBitmap>0000000000000000</remoteAddrBitmap> <remoteAddrBitmap>0000000000000000</remoteAddrBitmap>
<capabilities numItems="3"> <capabilities numItems="3">
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item> <item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item> <item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item> <item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
@ -195,7 +195,7 @@ allowed by Filter #125918, from the InternetClient Default Rule.
<asString>.+......</asString> <asString>.+......</asString>
</providerData> </providerData>
<layerKey>FWPM_LAYER_ALE_AUTH_CONNECT_V6</layerKey> <layerKey>FWPM_LAYER_ALE_AUTH_CONNECT_V6</layerKey>
<subLayerKey>FWPM_SUBLAYER_MPSSVC_WSH</subLayerKey <subLayerKey>FWPM_SUBLAYER_MPSSVC_WSH</subLayerKey
<weight> <weight>
<type>FWP_EMPTY</type> <type>FWP_EMPTY</type>
</weight> </weight>
@ -284,7 +284,7 @@ The important part of this condition is **S-1-15-3-1**, which is the capability
From the **netEvent** capabilities section, capabilities from netEvent, Wfpdiag-Case-1.xml. From the **netEvent** capabilities section, capabilities from netEvent, Wfpdiag-Case-1.xml.
```xml ```xml
<capabilities numItems="3"> <capabilities numItems="3">
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item> <item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT</item>
<item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item> <item>FWP_CAPABILITIES_FLAG_INTERNET_CLIENT_SERVER</item>
<item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item> <item>FWP_CAPABILITIES_FLAG_PRIVATE_NETWORK</item>
@ -575,7 +575,7 @@ In this example, the UWP app is unable to reach the Intranet target address, 10.
<localPort>52998</localPort> <localPort>52998</localPort>
<remotePort>53</remotePort> <remotePort>53</remotePort>
<scopeId>0</scopeId> <scopeId>0</scopeId>
<appId> <appId>
<data>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</data> <data>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</data>
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m. <asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.1...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString> .f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.1...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>
@ -653,7 +653,7 @@ In this example, the UWP app is unable to reach the Intranet target address, 10.
<localPort>52956</localPort> <localPort>52956</localPort>
<remotePort>53</remotePort> <remotePort>53</remotePort>
<scopeId>0</scopeId> <scopeId>0</scopeId>
<appId> <appId>
<data>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</data> <data>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</data>
<asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m. <asString>\\.d.e.v.i.c.e.\\.h.a.r.d.d.i.s.k.v.o.l.u.m.e.1.\\.p.r.o.g.r.a.m.
.f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.3...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString> .f.i.l.e.s.\\.w.i.n.d.o.w.s.a.p.p.s.\\.a.f.6.9.2.b.f.f.-.6.7.7.9.-.4.2.4.f.-.8.7.0.e.-.f.6.e.5.9.c.5.0.2.3.4.9._.1...1...1.3...0._.x.6.4._._.5.c.0.3.7.j.a.r.5.8.3.9.r.\\.u.w.p.s.o.c.k.e.t.c.l.i.e.n.t...e.x.e...</asString>

View File

@ -5,7 +5,7 @@ ms.topic: concept-article
manager: aaroncz manager: aaroncz
ms.author: paoloma ms.author: paoloma
author: paolomatarazzo author: paolomatarazzo
ms.date: 11/07/2023 ms.date: 09/06/2024
--- ---
# Zero Trust and Windows device health # Zero Trust and Windows device health