mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 14:57:23 +00:00
Merge pull request #2095 from MicrosoftDocs/master
Publish 2/20/2020 3:32 PM PST
This commit is contained in:
commit
858d09374b
@ -46,6 +46,7 @@ This FAQ addresses the following questions and issues:
|
||||
- [HoloLens Management Questions](#hololens-management-questions)
|
||||
- [How do I delete all spaces?](#how-do-i-delete-all-spaces)
|
||||
- [I cannot find or use the keyboard to type in the HoloLens 2 Emulator](#i-cannot-find-or-use-the-keyboard-to-type-in-the-hololens-2-emulator)
|
||||
- [I can't log in to a HoloLens because it was previously set up for someone else](#i-cant-log-in-to-a-hololens-because-it-was-previously-set-up-for-someone-else)
|
||||
|
||||
## My holograms don't look right or are moving around
|
||||
|
||||
@ -205,6 +206,15 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe
|
||||
|
||||
[Back to list](#list)
|
||||
|
||||
|
||||
## I can't log in to a HoloLens because it was previously set up for someone else
|
||||
|
||||
If your device was previously set up for someone else, either a client or former employee and you don't have their password to unlock the device there are two solutions.
|
||||
- If your device is MDM managed by Intune then you can remotely [Wipe](https://docs.microsoft.com/intune/remote-actions/devices-wipe) the device and it'll reflash itself. Make sure to leave **Retain enrollment state and user account** unchecked.
|
||||
- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://docs.microsoft.com/hololens/hololens-recovery) the device.
|
||||
|
||||
[Back to list](#list)
|
||||
|
||||
## HoloLens Management Questions
|
||||
|
||||
1. **Can I use SCCM to manage the HoloLens?**
|
||||
@ -231,3 +241,4 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe
|
||||
*Coming soon*
|
||||
|
||||
[Back to list](#list)
|
||||
|
||||
|
@ -92,6 +92,7 @@ You can now can access these commands with your voice:
|
||||
- "Volume up"
|
||||
- "Volume down"
|
||||
- "What is my IP address?"
|
||||
|
||||
If you're running your system with a different language, please try the appropriate commands in that language.
|
||||
|
||||
### FFU download and flash directions
|
||||
|
@ -23,6 +23,13 @@ appliesto:
|
||||
> [!Note]
|
||||
> HoloLens Emulator Release Notes can be found [here](https://docs.microsoft.com/windows/mixed-reality/hololens-emulator-archive).
|
||||
|
||||
### February Update - build 18362.1053
|
||||
|
||||
- Temporarily disabled the HolographicSpace.UserPresence API for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled.
|
||||
- Fixed a random HUP crash cased by hand tracking, in which user will notice an UI freeze then back to shell after several seconds.
|
||||
- We made an improvement in hand tracking so that while poking using index finger, the upper part of that finger will be less likely to curl unexpectedly.
|
||||
- Improved reliability of head tracking, spatial mapping, and other runtimes.
|
||||
|
||||
### January Update - build 18362.1043
|
||||
|
||||
- Stability improvements for exclusive apps when working with the HoloLens 2 emulator.
|
||||
|
BIN
devices/surface/images/dataeraser-arch.png
Normal file
BIN
devices/surface/images/dataeraser-arch.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 169 KiB |
@ -14,7 +14,7 @@ author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.audience: itpro
|
||||
ms.date: 02/06/2020
|
||||
ms.date: 02/20/2020
|
||||
---
|
||||
|
||||
# Microsoft Surface Data Eraser
|
||||
@ -85,31 +85,33 @@ After the creation tool is installed, follow these steps to create a Microsoft S
|
||||
|
||||
2. Click **Build** to begin the Microsoft Surface Data Eraser USB creation process.
|
||||
|
||||
>[!NOTE]
|
||||
>For Surface Pro X devices, select **ARM64**. for other Surface devices, select **x64**.
|
||||
|
||||
3. Click **Start** to acknowledge that you have a USB stick of at least 4 GB connected, as shown in Figure 1.
|
||||
|
||||

|
||||
|
||||
*Figure 1. Start the Microsoft Surface Data Eraser tool*
|
||||
4. Choose **x64** for most Surface devices or **ARM64** for Surface Pro X from the **Architecture Selection** page, as shown in Figure 2. Select **Continue**.
|
||||
|
||||
4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 2, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost.
|
||||
<br>
|
||||
*Figure 2. Select device architecture*
|
||||
|
||||
|
||||
4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 3, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost.
|
||||
|
||||
>[!NOTE]
|
||||
>If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB.
|
||||
|
||||

|
||||
|
||||
*Figure 2. USB thumb drive selection*
|
||||
*Figure 3. USB thumb drive selection*
|
||||
|
||||
5. After the creation process is finished, the USB drive has been formatted and all binaries are copied to the USB drive. Click **Success**.
|
||||
|
||||
6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 3.
|
||||
6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 4.
|
||||
|
||||

|
||||
|
||||
*Figure 3. Complete the Microsoft Surface Data Eraser USB creation process*
|
||||
*Figure 4. Complete the Microsoft Surface Data Eraser USB creation process*
|
||||
|
||||
7. Click **X** to close Microsoft Surface Data Eraser.
|
||||
|
||||
@ -133,11 +135,11 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo
|
||||
>[!NOTE]
|
||||
>If your device does not boot to USB using these steps, you may need to turn on the **Enable Alternate Boot Sequence** option in Surface UEFI. You can read more about Surface UEFI boot configuration in [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings).
|
||||
|
||||
3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 4.
|
||||
3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 5.
|
||||
|
||||

|
||||
|
||||
*Figure 4. Booting the Microsoft Surface Data Eraser USB stick*
|
||||
*Figure 5. Booting the Microsoft Surface Data Eraser USB stick*
|
||||
|
||||
4. Read the software license terms, and then close the Notepad file.
|
||||
|
||||
@ -150,7 +152,7 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo
|
||||
|
||||

|
||||
|
||||
*Figure 5. Partition to be erased is displayed in Microsoft Surface Data Eraser*
|
||||
*Figure 6. Partition to be erased is displayed in Microsoft Surface Data Eraser*
|
||||
|
||||
7. If you pressed **Y** in step 6, due to the destructive nature of the data erasure process, an additional dialog box is displayed to confirm your choice.
|
||||
|
||||
|
@ -33,12 +33,14 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc
|
||||
|
||||
|If your organization uses... |Add these entries to your Enterprise Cloud Resources network setting<br>(Replace "contoso" with your domain name(s)|
|
||||
|-----------------------------|---------------------------------------------------------------------|
|
||||
|Office 365 for Business |<ul><li>contoso.sharepoint.com</li><li>contoso-my.sharepoint.com</li><li>contoso-files.sharepoint.com</li><li>tasks.office.com</li><li>protection.office.com</li><li>meet.lync.com</li><li>teams.microsoft.com</li></ul> |
|
||||
|Sharepoint Online |<ul><li>contoso.sharepoint.com</li><li>contoso-my.sharepoint.com</li><li>contoso-files.sharepoint.com</li></ul> |
|
||||
|Yammer |<ul><li>www.yammer.com</li><li>yammer.com</li><li>persona.yammer.com</li></ul> |
|
||||
|Outlook Web Access (OWA) |<ul><li>outlook.office.com</li><li>outlook.office365.com</li><li>attachments.office.net</li></ul> |
|
||||
|Microsoft Dynamics |contoso.crm.dynamics.com |
|
||||
|Visual Studio Online |contoso.visualstudio.com |
|
||||
|Power BI |contoso.powerbi.com |
|
||||
|Microsoft Teams |teams.microsoft.com |
|
||||
|Other Office 365 services |<ul><li>tasks.office.com</li><li>protection.office.com</li><li>meet.lync.com</li><li>project.microsoft.com</li></ul> |
|
||||
|
||||
You can add other work-only apps to the Cloud Resource list, or you can create a packaged app rule for the .exe file to protect every file the app creates or modifies. Depending on how the app is accessed, you might want to add both.
|
||||
|
||||
|
@ -134,15 +134,15 @@ GUID: D4F940AB-401B-4EFC-AADC-AD5F3C50688A
|
||||
|
||||
### Block Office applications from creating executable content
|
||||
|
||||
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating executable content.
|
||||
This rule prevents Office apps, including Word, Excel, and PowerPoint, from creating potentially malicious executable content, by blocking malicious code from being written to disk.
|
||||
|
||||
This rule targets a typical behavior where malware uses Office as a vector to break out of Office and save malicious components to disk, where they persist and survive a computer reboot. This rule prevents malicious code from being written to disk.
|
||||
Malware that abuse Office as a vector may attempt to break out of Office and save malicious components to disk. These malicious components would survive a computer reboot and persist on the system. Therefore, this rule defends against a common persistence technique.
|
||||
|
||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, Configuration Manager CB 1710
|
||||
This rule was introduced in: Windows 10 1709, Windows Server 1809, Windows Server 2019, SCCM CB 1710
|
||||
|
||||
Intune name: Office apps/macros creating executable content
|
||||
|
||||
Configuration Manager name: Block Office applications from creating executable content
|
||||
SCCM name: Block Office applications from creating executable content
|
||||
|
||||
GUID: 3B576869-A4EC-4529-8536-B80A7769E899
|
||||
|
||||
|
@ -63,6 +63,7 @@ Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://w
|
||||
- Each event hub message in Azure Event Hubs contains list of records.
|
||||
- Each record contains the event name, the time Microsoft Defender ATP received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "**properties**".
|
||||
- For more information about the schema of Microsoft Defender ATP events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
||||
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the machine. Here every event will be decorated with this column as well. See [Machine Groups](machine-groups.md) for more information.
|
||||
|
||||
## Data types mapping:
|
||||
|
||||
|
@ -64,6 +64,7 @@ Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://w
|
||||
- Each blob contains multiple rows.
|
||||
- Each row contains the event name, the time Microsoft Defender ATP received the event, the tenant it belongs (you will only get events from your tenant), and the event in JSON format in a property called "properties".
|
||||
- For more information about the schema of Microsoft Defender ATP events, see [Advanced Hunting overview](advanced-hunting-overview.md).
|
||||
- In Advanced Hunting, the **DeviceInfo** table has a column named **MachineGroup** which contains the group of the machine. Here every event will be decorated with this column as well. See [Machine Groups](machine-groups.md) for more information.
|
||||
|
||||
## Data types mapping:
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user