mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge branch 'master' into sccm-windows-sec
This commit is contained in:
commit
8b7f10c242
@ -154,7 +154,7 @@ Packages created with the Microsoft Surface UEFI Configurator tool are signed wi
|
|||||||
* **Key Length** – 2048
|
* **Key Length** – 2048
|
||||||
* **Hash Algorithm** – SHA-256
|
* **Hash Algorithm** – SHA-256
|
||||||
* **Type** – SSL Server Authentication
|
* **Type** – SSL Server Authentication
|
||||||
* **Key Usage** – Key Encipherment
|
* **Key Usage** – Digital signature, Key Encipherment
|
||||||
* **Provider** – Microsoft Enhanced RSA and AES Cryptographic Provider
|
* **Provider** – Microsoft Enhanced RSA and AES Cryptographic Provider
|
||||||
* **Expiration Date** – 15 Months from certificate creation
|
* **Expiration Date** – 15 Months from certificate creation
|
||||||
* **Key Export Policy** – Exportable
|
* **Key Export Policy** – Exportable
|
||||||
|
@ -41,11 +41,16 @@ Support for broad deployments of Surface devices using Windows Autopilot, includ
|
|||||||
|
|
||||||
### Surface device support
|
### Surface device support
|
||||||
Surface devices with support for out-of-box deployment with Windows Autopilot, enrolled during the purchase process with a Surface partner, include the following devices, where the devices ship from the factory with Windows 10 Version 1709:
|
Surface devices with support for out-of-box deployment with Windows Autopilot, enrolled during the purchase process with a Surface partner, include the following devices, where the devices ship from the factory with Windows 10 Version 1709:
|
||||||
* Surface Pro (Model 1796)
|
|
||||||
|
* Surface Pro (5th gen)
|
||||||
|
* Surface Laptop(1st gen)
|
||||||
|
* Surface Studio (1st gen)
|
||||||
|
* Surface Pro 6
|
||||||
* Surface Book 2
|
* Surface Book 2
|
||||||
* Surface Laptop
|
* Surface Laptop 2
|
||||||
* Surface Studio
|
* Surface Studio 2
|
||||||
* Surface Go
|
* Surface Go
|
||||||
|
* Surface Go with LTE Advanced
|
||||||
|
|
||||||
## Surface partners enabled for Windows Autopilot
|
## Surface partners enabled for Windows Autopilot
|
||||||
Enrolling Surface devices in Windows Autopilot at the time of purchase is a capability provided by select Surface partners that are enabled with the capability to identify individual Surface devices during the purchase process and perform enrollment on an organization’s behalf. Devices enrolled by a Surface partner at time of purchase can be shipped directly to users and configured entirely through the zero-touch process of Windows Autopilot, Azure Active Directory, and Mobile Device Management.
|
Enrolling Surface devices in Windows Autopilot at the time of purchase is a capability provided by select Surface partners that are enabled with the capability to identify individual Surface devices during the purchase process and perform enrollment on an organization’s behalf. Devices enrolled by a Surface partner at time of purchase can be shipped directly to users and configured entirely through the zero-touch process of Windows Autopilot, Azure Active Directory, and Mobile Device Management.
|
||||||
|
@ -32,7 +32,7 @@ Hello, IT administrators! In this walkthrough, we'll show you how you can quickl
|
|||||||
- **Microsoft Teams** to bring conversations, content, and apps together in one place and create collaborate classrooms, connect in professional learning communities, and communicate with school staff
|
- **Microsoft Teams** to bring conversations, content, and apps together in one place and create collaborate classrooms, connect in professional learning communities, and communicate with school staff
|
||||||
- **Learning Tools** are moving beyond the OneNote desktop app and is now available in Office Lens, OneNote Online, Word Online, and Word desktop
|
- **Learning Tools** are moving beyond the OneNote desktop app and is now available in Office Lens, OneNote Online, Word Online, and Word desktop
|
||||||
- **Whiteboard** to create interactive lessons on the big screen, share and collaborate real-time by connecting to Class Notebook and Classroom
|
- **Whiteboard** to create interactive lessons on the big screen, share and collaborate real-time by connecting to Class Notebook and Classroom
|
||||||
- **Windows 10, version 1703 (Creators Update)** which brings 3D for everyone and other new and updated Windows features
|
- **Windows 10, version 1703 or later** which brings 3D for everyone and other new and updated Windows features
|
||||||
- **Minecraft: Education Edition** which provides an open and immersive environment to promote creativity, collaboration, and problem-solving
|
- **Minecraft: Education Edition** which provides an open and immersive environment to promote creativity, collaboration, and problem-solving
|
||||||
|
|
||||||
With Microsoft Education, schools can:
|
With Microsoft Education, schools can:
|
||||||
@ -60,11 +60,11 @@ Click the link to watch the video or follow the step-by-step guidance for each.
|
|||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
Complete these tasks before you start the walkthrough:
|
Complete these tasks before you start the walkthrough:
|
||||||
- Make sure all the devices that you want to configure, such as student PCs, have the latest Windows 10, version 1703 image installed.
|
- Make sure all the devices that you want to configure, such as student PCs, have Windows 10 (version 1703 or later) image installed.
|
||||||
|
|
||||||
We recommend Windows 10, version 1703 to take advantage of all the new features and functionality that Windows supports. This version of Windows is also compatible with the latest version of the Set up School PCs app and the versions must match in order for Set up School PCs to provision the devices.
|
We recommend Windows 10, version 1703 or later, to take advantage of all the new features and functionality that Windows supports. This version of Windows is also compatible with the latest version of the Set up School PCs app and the versions must match in order for Set up School PCs to provision the devices.
|
||||||
|
|
||||||
If you don't have Windows 10, version 1703 installed on your devices, we recommend upgrading. This process takes a while so start this task before proceeding with this walkthrough.
|
If you don't have Windows 10, version 1703 or later, installed on your devices, we recommend upgrading. This process takes a while so start this task before proceeding with this walkthrough.
|
||||||
|
|
||||||
- Have an education-verified tenant to qualify for an Office 365 for Education subscription. You also need to be education-verified to use School Data Sync and Intune for Education.
|
- Have an education-verified tenant to qualify for an Office 365 for Education subscription. You also need to be education-verified to use School Data Sync and Intune for Education.
|
||||||
|
|
||||||
|
@ -311,7 +311,9 @@ If you already registered SPNs on the machine account rather than in an applicat
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
## Required Request Filtering Settings
|
||||||
|
|
||||||
|
'Allow unlisted file name extensions' is required for the application to operate as expected. This can be found by navigating to the 'Microsoft BitLocker Administration and Monitoring' -> Request Filtering -> Edit Feature Settings.
|
||||||
|
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -296,7 +296,7 @@ The deep link used for connecting your device to work will always use the follow
|
|||||||
|
|
||||||
| Parameter | Description | Supported Value for Windows 10|
|
| Parameter | Description | Supported Value for Windows 10|
|
||||||
|-----------|--------------------------------------------------------------|----------------------------------------------|
|
|-----------|--------------------------------------------------------------|----------------------------------------------|
|
||||||
| mode | Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607| “mdm”, "awa", "aadj" |
|
| mode | Describes which mode will be executed in the enrollment app. Added in Windows 10, version 1607| MDM (Mobile Device Management), AWA (Adding Work Account), and AADJ (Azure Active Directory Joined). |
|
||||||
|username | Specifies the email address or UPN of the user who should be enrolled into MDM. Added in Windows 10, version 1703. | string |
|
|username | Specifies the email address or UPN of the user who should be enrolled into MDM. Added in Windows 10, version 1703. | string |
|
||||||
| servername | Specifies the MDM server URL that will be used to enroll the device. Added in Windows 10, version 1703. | string|
|
| servername | Specifies the MDM server URL that will be used to enroll the device. Added in Windows 10, version 1703. | string|
|
||||||
| accesstoken | Custom parameter for MDM servers to use as they see fit. Typically, this can be used as a token to validate the enrollment request. Added in Windows 10, version 1703. | string |
|
| accesstoken | Custom parameter for MDM servers to use as they see fit. Typically, this can be used as a token to validate the enrollment request. Added in Windows 10, version 1703. | string |
|
||||||
|
@ -181,6 +181,12 @@ You can verify the Windows 10 Enterprise E3 or E5 subscription in **Settings &g
|
|||||||
|
|
||||||
If there are any problems with the Windows 10 Enterprise E3 or E5 license or the activation of the license, the **Activation** panel will display the appropriate error message or status. You can use this information to help you diagnose the licensing and activation process.
|
If there are any problems with the Windows 10 Enterprise E3 or E5 license or the activation of the license, the **Activation** panel will display the appropriate error message or status. You can use this information to help you diagnose the licensing and activation process.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If you use slmgr /dli or /dlv commands to retrieve the activation information for the Windows 10 E3 or E5 license, the license information displayed will be the following:<BR>
|
||||||
|
>Name: Windows(R), Professional edition<BR>
|
||||||
|
>Description: Windows(R) Operating System, RETAIL channel<BR>
|
||||||
|
>Partial Product Key: 3V66T<BR>
|
||||||
|
|
||||||
## Virtual Desktop Access (VDA)
|
## Virtual Desktop Access (VDA)
|
||||||
|
|
||||||
Subscriptions to Windows 10 Enterprise are also available for virtualized clients. Windows 10 Enterprise E3 and E5 are available for Virtual Desktop Access (VDA) in Windows Azure or in another [qualified multitenant hoster](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx).
|
Subscriptions to Windows 10 Enterprise are also available for virtualized clients. Windows 10 Enterprise E3 and E5 are available for Virtual Desktop Access (VDA) in Windows Azure or in another [qualified multitenant hoster](https://www.microsoft.com/en-us/CloudandHosting/licensing_sca.aspx).
|
||||||
|
@ -32,6 +32,14 @@ For Windows 10 deployment, Microsoft 365 includes a fantastic deployment advisor
|
|||||||
|
|
||||||
## Free trial account
|
## Free trial account
|
||||||
|
|
||||||
|
**If you already have a Microsoft services subscription account and access to the Microsoft 365 Admin Center**
|
||||||
|
|
||||||
|
From the [Microsoft 365 Admin Center](https://portal.office.com), go to Billing and then Purchase services.
|
||||||
|
In the Enterprise Suites section of the service offerings, you will find Microsoft 365 E3 and Microsoft 365 E5 tiles.
|
||||||
|
There are "Start Free Trial" options available for your selection by hovering your mouse over the tiles.
|
||||||
|
|
||||||
|
**If you do not already have a Microsoft services subscription**
|
||||||
|
|
||||||
You can check out the Microsoft 365 deployment advisor and other resources for free! Just follow the steps below.
|
You can check out the Microsoft 365 deployment advisor and other resources for free! Just follow the steps below.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -606,7 +606,7 @@ In these steps, you generate offline media from the MDT Production deployment sh
|
|||||||
|
|
||||||
Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini files. These files are stored in the Control folder of the offline media; they also can be accessed via properties of the offline media in the Deployment Workbench.
|
Offline media has its own rules, its own Bootstrap.ini and CustomSettings.ini files. These files are stored in the Control folder of the offline media; they also can be accessed via properties of the offline media in the Deployment Workbench.
|
||||||
|
|
||||||
1. On MDT01, using File Explorer, copy the CustomSettings.ini file from the **E:\\MDTBuildLab\\Control** folder to **E:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files.
|
1. On MDT01, using File Explorer, copy the CustomSettings.ini file from the **E:\MDTProduction\Control** folder to **E:\\MDTOfflineMedia\\Content\\Deploy\\Control**. Overwrite the existing files.
|
||||||
2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**.
|
2. Using Deployment Workbench, in the **MDT Production / Advanced Configuration / Media** node, right-click the **MEDIA001** media, and select **Properties**.
|
||||||
3. In the **General** tab, configure the following:
|
3. In the **General** tab, configure the following:
|
||||||
1. Clear the Generate x86 boot image check box.
|
1. Clear the Generate x86 boot image check box.
|
||||||
|
@ -26,8 +26,8 @@ To configure your environment for BitLocker, you will need to do the following:
|
|||||||
3. Configure the operating system deployment task sequence for BitLocker.
|
3. Configure the operating system deployment task sequence for BitLocker.
|
||||||
4. Configure the rules (CustomSettings.ini) for BitLocker.
|
4. Configure the rules (CustomSettings.ini) for BitLocker.
|
||||||
|
|
||||||
**Note**
|
>[!NOTE]
|
||||||
Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](https://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
>Even though it is not a BitLocker requirement, we recommend configuring BitLocker to store the recovery key and TPM owner information in Active Directory. For additional information about these features, see [Backing Up BitLocker and TPM Recovery Information to AD DS](https://go.microsoft.com/fwlink/p/?LinkId=619548). If you have access to Microsoft BitLocker Administration and Monitoring (MBAM), which is part of Microsoft Desktop Optimization Pack (MDOP), you have additional management features for BitLocker.
|
||||||
|
|
||||||
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
For the purposes of this topic, we will use DC01, a domain controller that is a member of the domain contoso.com for the fictitious Contoso Corporation. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-10-with-the-microsoft-deployment-toolkit.md#proof).
|
||||||
|
|
||||||
@ -35,8 +35,8 @@ For the purposes of this topic, we will use DC01, a domain controller that is a
|
|||||||
|
|
||||||
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
To enable BitLocker to store the recovery key and TPM information in Active Directory, you need to create a Group Policy for it in Active Directory. For this section, we are running Windows Server 2012 R2, so you do not need to extend the Schema. You do, however, need to set the appropriate permissions in Active Directory.
|
||||||
|
|
||||||
**Note**
|
>[!NOTE]
|
||||||
Depending on the Active Directory Schema version, you might need to update the Schema before you can store BitLocker information in Active Directory.
|
>Depending on the Active Directory Schema version, you might need to update the Schema before you can store BitLocker information in Active Directory.
|
||||||
|
|
||||||
In Windows Server 2012 R2 (as well as in Windows Server 2008 R2 and Windows Server 2012), you have access to the BitLocker Drive Encryption Administration Utilities features, which will help you manage BitLocker. When you install the features, the BitLocker Active Directory Recovery Password Viewer is included, and it extends Active Directory Users and Computers with BitLocker Recovery information.
|
In Windows Server 2012 R2 (as well as in Windows Server 2008 R2 and Windows Server 2012), you have access to the BitLocker Drive Encryption Administration Utilities features, which will help you manage BitLocker. When you install the features, the BitLocker Active Directory Recovery Password Viewer is included, and it extends Active Directory Users and Computers with BitLocker Recovery information.
|
||||||
|
|
||||||
@ -79,8 +79,8 @@ Following these steps, you enable the backup of BitLocker and TPM recovery infor
|
|||||||
Computer Configuration / Policies / Administrative Templates / System / Trusted Platform Module Services
|
Computer Configuration / Policies / Administrative Templates / System / Trusted Platform Module Services
|
||||||
4. Enable the **Turn on TPM backup to Active Directory Domain Services** policy.
|
4. Enable the **Turn on TPM backup to Active Directory Domain Services** policy.
|
||||||
|
|
||||||
**Note**
|
>[!NOTE]
|
||||||
If you consistently get the error "Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system." after encrypting a computer with BitLocker, you might have to change the various "Configure TPM platform validation profile" Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using.
|
>If you consistently get the error "Windows BitLocker Drive Encryption Information. The system boot information has changed since BitLocker was enabled. You must supply a BitLocker recovery password to start this system." after encrypting a computer with BitLocker, you might have to change the various "Configure TPM platform validation profile" Group Policies, as well. Whether or not you need to do this will depend on the hardware you are using.
|
||||||
|
|
||||||
### Set permissions in Active Directory for BitLocker
|
### Set permissions in Active Directory for BitLocker
|
||||||
|
|
||||||
|
@ -21,15 +21,15 @@ This topic is designed to teach you how to use the MDT database to pre-stage inf
|
|||||||
|
|
||||||
MDT can use either SQL Server Express or full SQL Server, but since the deployment database isn't big, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment.
|
MDT can use either SQL Server Express or full SQL Server, but since the deployment database isn't big, even in large enterprise environments, we recommend using the free SQL Server 2012 SP1 Express database in your environment.
|
||||||
|
|
||||||
**Note**
|
>[!NOTE]
|
||||||
Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database.
|
>Be sure to enable Named Pipes when configuring the SQL Server 2012 SP1 Express database. Although it is a legacy protocol, Named Pipes has proven to work well when connecting from Windows Preinstallation Environment (Windows PE) to the SQL Server database.
|
||||||
|
|
||||||
## <a href="" id="sec02"></a>Create the deployment database
|
## <a href="" id="sec02"></a>Create the deployment database
|
||||||
|
|
||||||
The MDT database is by default created and managed from the Deployment Workbench. In these steps, we assume you have installed SQL Server 2012 SP1 Express on MDT01.
|
The MDT database is by default created and managed from the Deployment Workbench. In these steps, we assume you have installed SQL Server 2012 SP1 Express on MDT01.
|
||||||
|
|
||||||
**Note**
|
>[!NOTE]
|
||||||
Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01.
|
>Since SQL Server 2012 SP1 Express runs by default on a separate instance (SQLEXPRESS), the SQL Server Browser service must be running, and the firewall configured to allow traffic to it. Port 1433 TCP and port 1434 UDP need to be opened for inbound traffic on MDT01.
|
||||||
|
|
||||||
1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**.
|
1. On MDT01, using Deployment Workbench, expand the MDT Production deployment share, expand **Advanced Configuration**, right-click **Database**, and select **New Database**.
|
||||||
2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and click **Next**:
|
2. In the New DB Wizard, on the **SQL Server Details** page, enter the following settings and click **Next**:
|
||||||
|
@ -20,6 +20,7 @@ ms.topic: article
|
|||||||
- Windows 8.1
|
- Windows 8.1
|
||||||
- Windows 8
|
- Windows 8
|
||||||
- Windows 7
|
- Windows 7
|
||||||
|
- Windows Server 2016
|
||||||
- Windows Server 2012
|
- Windows Server 2012
|
||||||
- Windows Server 2008 R2
|
- Windows Server 2008 R2
|
||||||
|
|
||||||
@ -29,10 +30,28 @@ After you deploy and store the customized databases on each of your local comput
|
|||||||
|
|
||||||
## Command-Line Options for Deploying Customized Database Files
|
## Command-Line Options for Deploying Customized Database Files
|
||||||
|
|
||||||
|
Sample output from the command `Sdbinst.exe /?` in an elevated CMD window:
|
||||||
|
|
||||||
The command-line options use the following conventions.
|
```
|
||||||
|
Microsoft Windows [Version 10.0.14393]
|
||||||
|
(c) 2016 Microsoft Corporation. All rights reserved.
|
||||||
|
|
||||||
Sdbinst.exe \[-q\] \[-?\] \[-u\] \[-g\] \[-p\] \[-u filepath\] \[-g *GUID*\] \[-n *"name"*\]
|
C:\Windows\system32>Sdbinst.exe /?
|
||||||
|
Usage: Sdbinst.exe [-?] [-q] [-u] [-g] [-p] [-n[:WIN32|WIN64]] myfile.sdb | {guid} | "name"
|
||||||
|
|
||||||
|
-? - print this help text.
|
||||||
|
-p - Allow SDBs containing patches.
|
||||||
|
-q - Quiet mode: prompts are auto-accepted.
|
||||||
|
-u - Uninstall.
|
||||||
|
-g {guid} - GUID of file (uninstall only).
|
||||||
|
-n "name" - Internal name of file (uninstall only).
|
||||||
|
|
||||||
|
C:\Windows\system32>_
|
||||||
|
```
|
||||||
|
|
||||||
|
The command-line options use the following conventions:
|
||||||
|
|
||||||
|
Sdbinst.exe \[-?\] \[-p\] \[-q\] \[-u\] \[-g\] \[-u filepath\] \[-g *GUID*\] \[-n *"name"*\]
|
||||||
|
|
||||||
The following table describes the available command-line options.
|
The following table describes the available command-line options.
|
||||||
|
|
||||||
@ -49,6 +68,18 @@ The following table describes the available command-line options.
|
|||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
|
<td align="left"><p>-?</p></td>
|
||||||
|
<td align="left"><p>Displays the Help for the Sdbinst.exe tool.</p>
|
||||||
|
<p>For example,</p>
|
||||||
|
<p><code>sdbinst.exe -?</code></p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td align="left"><p>-p</p></td>
|
||||||
|
<td align="left"><p>Allows SDBs installation with Patches</p>
|
||||||
|
<p>For example,</p>
|
||||||
|
<p><code>sdbinst.exe -p C:\Windows\AppPatch\Myapp.sdb</code></p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
<td align="left"><p>-q</p></td>
|
<td align="left"><p>-q</p></td>
|
||||||
<td align="left"><p>Performs a silent installation with no visible window, status, or warning information. Fatal errors appear only in Event Viewer (Eventvwr.exe).</p>
|
<td align="left"><p>Performs a silent installation with no visible window, status, or warning information. Fatal errors appear only in Event Viewer (Eventvwr.exe).</p>
|
||||||
<p>For example,</p>
|
<p>For example,</p>
|
||||||
@ -72,18 +103,6 @@ The following table describes the available command-line options.
|
|||||||
<p>For example,</p>
|
<p>For example,</p>
|
||||||
<p><code>sdbinst.exe -n "My_Database"</code></p></td>
|
<p><code>sdbinst.exe -n "My_Database"</code></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>-?</p></td>
|
|
||||||
<td align="left"><p>Displays the Help for the Sdbinst.exe tool.</p>
|
|
||||||
<p>For example,</p>
|
|
||||||
<p><code>sdbinst.exe -?</code></p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>-p</p></td>
|
|
||||||
<td align="left"><p>Allows SDBs installation with Patches</p>
|
|
||||||
<p>For example,</p>
|
|
||||||
<p><code>sdbinst.exe -p C:\Windows\AppPatch\Myapp.sdb</code></p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
@ -33,7 +33,7 @@ We've removed the following features and functionalities from the installed prod
|
|||||||
|Language control in the Control Panel| Use the Settings app to change your language settings.|
|
|Language control in the Control Panel| Use the Settings app to change your language settings.|
|
||||||
|HomeGroup|We are removing [HomeGroup](https://support.microsoft.com/help/17145) but not your ability to share printers, files, and folders.<br><br>When you update to Windows 10, version 1803, you won't see HomeGroup in File Explorer, the Control Panel, or Troubleshoot (**Settings > Update & Security > Troubleshoot**). Any printers, files, and folders that you shared using HomeGroup **will continue to be shared**.<br><br>Instead of using HomeGroup, you can now share printers, files and folders by using features that are built into Windows 10: <br>- [Share your network printer](https://www.bing.com/search?q=share+printer+windows+10) <br>- [Share files in File Explorer](https://support.microsoft.com/help/4027674/windows-10-share-files-in-file-explorer) |
|
|HomeGroup|We are removing [HomeGroup](https://support.microsoft.com/help/17145) but not your ability to share printers, files, and folders.<br><br>When you update to Windows 10, version 1803, you won't see HomeGroup in File Explorer, the Control Panel, or Troubleshoot (**Settings > Update & Security > Troubleshoot**). Any printers, files, and folders that you shared using HomeGroup **will continue to be shared**.<br><br>Instead of using HomeGroup, you can now share printers, files and folders by using features that are built into Windows 10: <br>- [Share your network printer](https://www.bing.com/search?q=share+printer+windows+10) <br>- [Share files in File Explorer](https://support.microsoft.com/help/4027674/windows-10-share-files-in-file-explorer) |
|
||||||
|**Connect to suggested open hotspots** option in Wi-Fi settings |We previously [disabled the **Connect to suggested open hotspots** option](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) and are now removing it from the Wi-Fi settings page. You can manually connect to free wireless hotspots with **Network & Internet** settings, from the taskbar or Control Panel, or by using Wi-Fi Settings (for mobile devices).|
|
|**Connect to suggested open hotspots** option in Wi-Fi settings |We previously [disabled the **Connect to suggested open hotspots** option](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) and are now removing it from the Wi-Fi settings page. You can manually connect to free wireless hotspots with **Network & Internet** settings, from the taskbar or Control Panel, or by using Wi-Fi Settings (for mobile devices).|
|
||||||
|XPS Viewer|We're changing the way you get XPS Viewer. In Windows 10, version 1709 and earlier versions, the app is included in the installation image. If you have XPS Viewer and you update to Windows 10, version 1803, there's no action required. You'll still have XPS Viewer. <br><br>However, if you install Windows 10, version 1803, on a new device (or as a clean installation), you may need to [install XPS Viewer from **Apps and Features** in the Settings app](https://docs.microsoft.com/windows/application-management/add-apps-and-features) or through [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). If you had XPS Viewer in Windows 10, version 1709, but manually removed it before updating, you'll need to manually reinstall it.|
|
|XPS Viewer|We're changing the way you get XPS Viewer. In Windows 10, version 1709 and earlier versions, the app is included in the installation image. <br><br>However, if you install Windows 10, version 1803, you may need to [install XPS Viewer from **Apps and Features** in the Settings app](https://docs.microsoft.com/windows/application-management/add-apps-and-features) or through [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities). If you had XPS Viewer in Windows 10, version 1709, but manually removed it before updating, you'll need to manually reinstall it.|
|
||||||
|
|
||||||
|
|
||||||
## Features we’re no longer developing
|
## Features we’re no longer developing
|
||||||
|
@ -26,7 +26,7 @@ ms.topic: article
|
|||||||
>
|
>
|
||||||
>Due to [naming changes](waas-overview.md#naming-changes), older terms like CB, CBB and LTSB may still be displayed in some of our products.
|
>Due to [naming changes](waas-overview.md#naming-changes), older terms like CB, CBB and LTSB may still be displayed in some of our products.
|
||||||
|
|
||||||
Semi-Annual Channel (Targeted) is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each edition of Windows 10.
|
Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition.
|
||||||
|
|
||||||
| Windows 10 edition | Semi-Annual Channel (Targeted) | Semi-Annual Channel | Long-Term Servicing Channel | Insider Program |
|
| Windows 10 edition | Semi-Annual Channel (Targeted) | Semi-Annual Channel | Long-Term Servicing Channel | Insider Program |
|
||||||
| --- | --- | --- | --- | --- |
|
| --- | --- | --- | --- | --- |
|
||||||
@ -44,6 +44,9 @@ Semi-Annual Channel (Targeted) is the default servicing channel for all Windows
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The LTSB edition of Windows 10 is only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx).
|
>The LTSB edition of Windows 10 is only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx).
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Semi-Annual Channel (Targeted) should be used only by the customers that are using [Windows Update for Business](https://docs.microsoft.com/windows/deployment/update/waas-manage-updates-wufb). For those, who don't use Windows Update for Business, Semi-Annual Channel (Targeted) would be the same as Semi-Annual Channel.
|
||||||
|
|
||||||
## Assign devices to Semi-Annual Channel
|
## Assign devices to Semi-Annual Channel
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
|
@ -195,6 +195,11 @@ Upgrade Readiness only collects app inventory on devices that are not yet upgrad
|
|||||||
Double-check that IE site discovery opt-in has been configured in the deployment script. (See the [Upgrade Readiness deployment script](../upgrade/upgrade-readiness-deployment-script.md) topic for information about obtaining and running the script, and for a description of the error codes that can be displayed. See ["Understanding connectivity scenarios and the deployment script"](https://blogs.technet.microsoft.com/upgradeanalytics/2017/03/10/understanding-connectivity-scenarios-and-the-deployment-script/) on the Windows Analytics blog for a summary of setting the ClientProxy for the script, which will enable the script properly check for diagnostic data endpoint connectivity.)
|
Double-check that IE site discovery opt-in has been configured in the deployment script. (See the [Upgrade Readiness deployment script](../upgrade/upgrade-readiness-deployment-script.md) topic for information about obtaining and running the script, and for a description of the error codes that can be displayed. See ["Understanding connectivity scenarios and the deployment script"](https://blogs.technet.microsoft.com/upgradeanalytics/2017/03/10/understanding-connectivity-scenarios-and-the-deployment-script/) on the Windows Analytics blog for a summary of setting the ClientProxy for the script, which will enable the script properly check for diagnostic data endpoint connectivity.)
|
||||||
|
|
||||||
Also, on Windows 10 devices remember that IE site discovery requires data diagnostics set to the Enhanced level.
|
Also, on Windows 10 devices remember that IE site discovery requires data diagnostics set to the Enhanced level.
|
||||||
|
|
||||||
|
There are two additional configurations to check:
|
||||||
|
1. Make sure Flip Ahead with Page Prediction is enabled. It can be configured at Internet Options -> Advanced -> Browsing -> Enable flip ahead with page prediction.
|
||||||
|
2. Make sure IE is not running in InPrivate mode.
|
||||||
|
|
||||||
Finally, Upgrade Readiness only collects IE site discovery data on devices that are not yet upgraded to the target operating system version specified in the Upgrade Readiness Overview blade. This is because Upgrade Readiness targets upgrade planning (for devices not yet upgraded).
|
Finally, Upgrade Readiness only collects IE site discovery data on devices that are not yet upgraded to the target operating system version specified in the Upgrade Readiness Overview blade. This is because Upgrade Readiness targets upgrade planning (for devices not yet upgraded).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
|
@ -141,3 +141,5 @@ There are different identifiers for the same update in different contexts. It’
|
|||||||
- Small integers (especially in Datastore) can be local IDs
|
- Small integers (especially in Datastore) can be local IDs
|
||||||

|

|
||||||
|
|
||||||
|
## Windows Setup log files analysis using SetupDiag tool
|
||||||
|
SetupDiag is a diagnostic tool that can be used for analysis of logs related to installation of Windows Updates. For detailed information, see [SetupDiag](https://docs.microsoft.com/windows/deployment/upgrade/setupdiag).
|
||||||
|
@ -20,7 +20,8 @@ If you run into problems when using Windows Update, start with the following ste
|
|||||||
1. Run the built-in Windows Update troubleshooter to fix common issues. Navigate to **Settings > Update & Security > Troubleshoot > Windows Update**.
|
1. Run the built-in Windows Update troubleshooter to fix common issues. Navigate to **Settings > Update & Security > Troubleshoot > Windows Update**.
|
||||||
2. Install the most recent Servicing Stack Update (SSU) that matches your version of Windows from the Microsoft Update Catalog. See [Servicing stack updates](servicing-stack-updates.md) for more details on SSU.
|
2. Install the most recent Servicing Stack Update (SSU) that matches your version of Windows from the Microsoft Update Catalog. See [Servicing stack updates](servicing-stack-updates.md) for more details on SSU.
|
||||||
3. Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update history for your system:
|
3. Make sure that you install the latest Windows updates, cumulative updates, and rollup updates. To verify the update status, refer to the appropriate update history for your system:
|
||||||
|
|
||||||
|
- [Windows 10, version 1809 and Windows Server 2019](https://support.microsoft.com/help/4464619/windows-10-update-history)
|
||||||
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479/windows-10-update-history)
|
- [Windows 10, version 1803](https://support.microsoft.com/help/4099479/windows-10-update-history)
|
||||||
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
|
- [Windows 10, version 1709](https://support.microsoft.com/help/4043454)
|
||||||
- [Windows 10, version 1703](https://support.microsoft.com/help/4018124)
|
- [Windows 10, version 1703](https://support.microsoft.com/help/4018124)
|
||||||
|
@ -89,7 +89,7 @@ To create an encrypted store using the Config.xml file and the default migration
|
|||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><em>StorePath</em></p></td>
|
<td align="left"><p><em>StorePath</em></p></td>
|
||||||
<td align="left"><p>Indicates a folder where files and settings will be saved. Note that <em>StorePath</em> cannot be <strong>c:\</strong>. You must specify the <em>StorePath</em> option in the <strong>ScanState</strong> command, except when using the <strong>/genconfig</strong> option. You cannot specify more than one <em>StorePath</em> location.</p></td>
|
<td align="left"><p>Indicates a folder where files and settings will be saved. Note that <em>StorePath</em> cannot be <strong>C:\</strong>. You must specify the <em>StorePath</em> option in the <strong>ScanState</strong> command, except when using the <strong>/genconfig</strong> option. You cannot specify more than one <em>StorePath</em> location.</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><strong>/apps</strong></p></td>
|
<td align="left"><p><strong>/apps</strong></p></td>
|
||||||
|
@ -15,17 +15,12 @@ ms.topic: article
|
|||||||
|
|
||||||
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
The Volume Activation Management Tool (VAMT) enables network administrators and other IT professionals to automate and centrally manage the Windows®, Microsoft® Office, and select other Microsoft products volume and retail-activation process.
|
||||||
VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
|
VAMT can manage volume activation using Multiple Activation Keys (MAKs) or the Windows Key Management Service (KMS). VAMT is a standard Microsoft Management Console (MMC) snap-in that requires the Microsoft Management Console (MMC) 3.0. VAMT can be installed on any computer that has one of the following Windows operating systems:
|
||||||
- Windows® 7
|
- Windows® 7 or above
|
||||||
- Windows 8
|
- Windows Server 2008 R2 or above
|
||||||
- Windows 8.1
|
|
||||||
- Windows 10
|
|
||||||
- Windows Server 2008 R2
|
|
||||||
- Windows Server® 2012
|
|
||||||
- Windows Server 2012 R2
|
|
||||||
|
|
||||||
**Important**
|
**Important**
|
||||||
VAMT is designed to manage volume activation for: Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Microsoft Office 2010, and Microsoft Office 2013. Computers installed with volume editions of
|
VAMT is designed to manage volume activation for: Windows 7, Windows 8, Windows 8.1, Windows 10, Windows Server 2008 (or obove), Microsoft Office 2010 (or above).
|
||||||
**Windows XP** or **Windows Server 2003** cannot be managed using VAMT. However, Office 2010 and Office 2013 products installed on these two operating systems can still be managed.
|
|
||||||
|
|
||||||
VAMT is only available in an EN-US (x86) package.
|
VAMT is only available in an EN-US (x86) package.
|
||||||
|
|
||||||
@ -42,4 +37,4 @@ VAMT is only available in an EN-US (x86) package.
|
|||||||
|[Manage VAMT Data](manage-vamt-data.md) |Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT. |
|
|[Manage VAMT Data](manage-vamt-data.md) |Describes how to save, import, export, and merge a Computer Information List (CILX) file using VAMT. |
|
||||||
|[VAMT Step-by-Step Scenarios](vamt-step-by-step.md) |Provides step-by-step instructions for using VAMT in typical environments. |
|
|[VAMT Step-by-Step Scenarios](vamt-step-by-step.md) |Provides step-by-step instructions for using VAMT in typical environments. |
|
||||||
|[VAMT Known Issues](vamt-known-issues.md) |Lists known issues in VAMT. |
|
|[VAMT Known Issues](vamt-known-issues.md) |Lists known issues in VAMT. |
|
||||||
|
|
||||||
|
@ -63,7 +63,7 @@ The following figure illustrates how deploying Windows 10 has evolved with each
|
|||||||
|
|
||||||
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following:
|
For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products & Services Agreements (MPSA), you must have the following:
|
||||||
|
|
||||||
- Windows 10 (Pro or Enterprise) version 1703 or later installed and **activated** on the devices to be upgraded.
|
- Windows 10 (Pro or Enterprise) version 1703 or later installed on the devices to be upgraded.
|
||||||
- Azure Active Directory (Azure AD) available for identity management.
|
- Azure Active Directory (Azure AD) available for identity management.
|
||||||
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
||||||
|
|
||||||
|
@ -32,7 +32,7 @@ To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
|
|||||||
- The device must be connected to the Internet and have access to an Active Directory domain controller.
|
- The device must be connected to the Internet and have access to an Active Directory domain controller.
|
||||||
- The Intune Connector for Active Directory must be installed.
|
- The Intune Connector for Active Directory must be installed.
|
||||||
- Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
|
- Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
|
||||||
- If using Proxy, WDAP Proxy settings option must be enabled and configured.
|
- If using Proxy, WPAD Proxy settings option must be enabled and configured.
|
||||||
|
|
||||||
**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
|
**AAD device join**: The hybrid AAD join process uses the system context to perform device AAD join, therefore it is not affected by user based AAD join permission settings. In addition, all users are enabled to join devices to AAD by default.
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@ ms.topic: article
|
|||||||
|
|
||||||
When performing a remote Windows Autopilot Reset, an MDM service such an Microsoft Intune can be used to initiate the reset process, avoiding the need for IT staff or other administrators to visit each machine to initiate the process.
|
When performing a remote Windows Autopilot Reset, an MDM service such an Microsoft Intune can be used to initiate the reset process, avoiding the need for IT staff or other administrators to visit each machine to initiate the process.
|
||||||
|
|
||||||
To enable a device for a remote Windows Autopilot Reset, the device must be MDM managed, joined to Azure AD, and configured to use the [enrollment status page](enrollment-status.md).
|
To enable a device for a remote Windows Autopilot Reset, the device must be MDM managed, joined to Azure AD, and configured to use the [enrollment status page](enrollment-status.md). This feature is not supported on devices that were enrolled using [Autopilot self deploying mode](self-deploying.md).
|
||||||
|
|
||||||
## Triggering a remote Windows Autopilot Reset
|
## Triggering a remote Windows Autopilot Reset
|
||||||
|
|
||||||
@ -34,5 +34,8 @@ To trigger a remote Windows Autopilot Reset via Intune, follow these steps:
|
|||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Autopilot Reset option will not be enabled in Microsoft Intune for devices not running Windows 10 build 17672 or higher.
|
>The Autopilot Reset option will not be enabled in Microsoft Intune for devices not running Windows 10 build 17672 or higher.
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>The feature for Autopilot Reset (preview) will stay grayed out, **unless** you reset the device using Autopilot (either using Fresh Reset or manually sysprep the device).
|
||||||
|
|
||||||
Once the reset is complete, the device is again ready for use.
|
Once the reset is complete, the device is again ready for use.
|
||||||
|
|
||||||
|
@ -33,6 +33,9 @@ Windows Autopilot Reset will block the user from accessing the desktop until thi
|
|||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>To reestablish Wi-Fi connectivity after reset, make sure the **Connect automatically** box is checked for the device's wireless network connection.
|
>To reestablish Wi-Fi connectivity after reset, make sure the **Connect automatically** box is checked for the device's wireless network connection.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>The Autopilot Reset does not support Hybrid Azure AD joined devices.
|
||||||
|
|
||||||
## Scenarios
|
## Scenarios
|
||||||
|
|
||||||
Windows Autopilot Reset supports two scenarios:
|
Windows Autopilot Reset supports two scenarios:
|
||||||
|
@ -258,279 +258,286 @@ The following tables provide descriptions of the default groups that are located
|
|||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
|
<td><p>[Device Owners](#bkmk-device-owners)</p></td>
|
||||||
|
<td><p>Yes</p></td>
|
||||||
|
<td><p>Yes</p></td>
|
||||||
|
<td><p>Yes</p></td>
|
||||||
|
<td><p>Yes</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
<td><p>[Distributed COM Users](#bkmk-distributedcomusers)</p></td>
|
<td><p>[Distributed COM Users](#bkmk-distributedcomusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[DnsUpdateProxy](#bkmk-dnsupdateproxy)</p></td>
|
<td><p>[DnsUpdateProxy](#bkmk-dnsupdateproxy)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[DnsAdmins](#bkmk-dnsadmins)</p></td>
|
<td><p>[DnsAdmins](#bkmk-dnsadmins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Domain Admins](#bkmk-domainadmins)</p></td>
|
<td><p>[Domain Admins](#bkmk-domainadmins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Domain Computers](#bkmk-domaincomputers)</p></td>
|
<td><p>[Domain Computers](#bkmk-domaincomputers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Domain Controllers](#bkmk-domaincontrollers)</p></td>
|
<td><p>[Domain Controllers](#bkmk-domaincontrollers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Domain Guests](#bkmk-domainguests)</p></td>
|
<td><p>[Domain Guests](#bkmk-domainguests)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Domain Users](#bkmk-domainusers)</p></td>
|
<td><p>[Domain Users](#bkmk-domainusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Enterprise Admins](#bkmk-entadmins)</p></td>
|
<td><p>[Enterprise Admins](#bkmk-entadmins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Enterprise Key Admins](#bkmk-enterprise-key-admins)</p></td>
|
<td><p>[Enterprise Key Admins](#enterprise-key-admins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Enterprise Read-only Domain Controllers](#bkmk-entrodc)</p></td>
|
<td><p>[Enterprise Read-only Domain Controllers](#bkmk-entrodc)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Event Log Readers](#bkmk-eventlogreaders)</p></td>
|
<td><p>[Event Log Readers](#bkmk-eventlogreaders)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Group Policy Creator Owners](#bkmk-gpcreatorsowners)</p></td>
|
<td><p>[Group Policy Creator Owners](#bkmk-gpcreatorsowners)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Guests](#bkmk-guests)</p></td>
|
<td><p>[Guests](#bkmk-guests)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Hyper-V Administrators](#bkmk-hypervadministrators)</p></td>
|
<td><p>[Hyper-V Administrators](#bkmk-hypervadministrators)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[IIS_IUSRS](#bkmk-iis-iusrs)</p></td>
|
<td><p>[IIS_IUSRS](#bkmk-iis-iusrs)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Incoming Forest Trust Builders](#bkmk-inforesttrustbldrs)</p></td>
|
<td><p>[Incoming Forest Trust Builders](#bkmk-inforesttrustbldrs)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Key Admins](#key-admins)</p></td>
|
<td><p>[Key Admins](#key-admins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Network Configuration Operators](#bkmk-networkcfgoperators)</p></td>
|
<td><p>[Network Configuration Operators](#bkmk-networkcfgoperators)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Performance Log Users](#bkmk-perflogusers)</p></td>
|
<td><p>[Performance Log Users](#bkmk-perflogusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Performance Monitor Users](#bkmk-perfmonitorusers)</p></td>
|
<td><p>[Performance Monitor Users](#bkmk-perfmonitorusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Pre–Windows 2000 Compatible Access](#bkmk-pre-ws2kcompataccess)</p></td>
|
<td><p>[Pre–Windows 2000 Compatible Access](#bkmk-pre-ws2kcompataccess)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Print Operators](#bkmk-printoperators)</p></td>
|
<td><p>[Print Operators](#bkmk-printoperators)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Protected Users](#bkmk-protectedusers)</p></td>
|
<td><p>[Protected Users](#bkmk-protectedusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[RAS and IAS Servers](#bkmk-rasandias)</p></td>
|
<td><p>[RAS and IAS Servers](#bkmk-rasandias)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[RDS Endpoint Servers](#bkmk-rdsendpointservers)</p></td>
|
<td><p>[RDS Endpoint Servers](#bkmk-rdsendpointservers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[RDS Management Servers](#bkmk-rdsmanagementservers)</p></td>
|
<td><p>[RDS Management Servers](#bkmk-rdsmanagementservers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[RDS Remote Access Servers](#bkmk-rdsremoteaccessservers)</p></td>
|
<td><p>[RDS Remote Access Servers](#bkmk-rdsremoteaccessservers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Read-only Domain Controllers](#bkmk-rodc)</p></td>
|
<td><p>[Read-only Domain Controllers](#bkmk-rodc)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Remote Desktop Users](#bkmk-remotedesktopusers)</p></td>
|
<td><p>[Remote Desktop Users](#bkmk-remotedesktopusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Remote Management Users](#bkmk-remotemanagementusers)</p></td>
|
<td><p>[Remote Management Users](#bkmk-remotemanagementusers)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Replicator](#bkmk-replicator)</p></td>
|
<td><p>[Replicator](#bkmk-replicator)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Schema Admins](#bkmk-schemaadmins)</p></td>
|
<td><p>[Schema Admins](#bkmk-schemaadmins)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Server Operators](#bkmk-serveroperators)</p></td>
|
<td><p>[Server Operators](#bkmk-serveroperators)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Storage Replica Administrators](#storage-replica-administrators)</p></td>
|
<td><p>[Storage Replica Administrators](#storage-replica-administrators)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[System Managed Accounts Group](#system-managed-accounts-group)</p></td>
|
<td><p>[System Managed Accounts Group](#system-managed-accounts-group)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Terminal Server License Servers](#bkmk-terminalserverlic)</p></td>
|
<td><p>[Terminal Server License Servers](#bkmk-terminalserverlic)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[Users](#bkmk-users)</p></td>
|
<td><p>[Users](#bkmk-users)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="even">
|
||||||
<td><p>[Windows Authorization Access Group](#bkmk-winauthaccess)</p></td>
|
<td><p>[Windows Authorization Access Group](#bkmk-winauthaccess)</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="odd">
|
||||||
<td><p>[WinRMRemoteWMIUsers_](#bkmk-winrmremotewmiusers-)</p></td>
|
<td><p>[WinRMRemoteWMIUsers_](#bkmk-winrmremotewmiusers-)</p></td>
|
||||||
<td><p></p></td>
|
<td><p></p></td>
|
||||||
<td><p>Yes</p></td>
|
<td><p>Yes</p></td>
|
||||||
@ -1208,6 +1215,68 @@ This security group includes the following changes since Windows Server 2008:
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
### <a href="" id="bkmk-device-owners"></a>Device Owners
|
||||||
|
This group is not currently used in Windows.
|
||||||
|
|
||||||
|
Microsoft does not recommend changing the default configuration where this security group has zero members. Changing the default configuration could hinder future scenarios that rely on this group.
|
||||||
|
|
||||||
|
The Device Owners group applies to versions of the Windows Server operating system listed in the [Active Directory Default Security Groups table](#bkmk-groupstable).
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<colgroup>
|
||||||
|
<col width="50%" />
|
||||||
|
<col width="50%" />
|
||||||
|
</colgroup>
|
||||||
|
<thead>
|
||||||
|
<tr class="header">
|
||||||
|
<th>Attribute</th>
|
||||||
|
<th>Value</th>
|
||||||
|
</tr>
|
||||||
|
</thead>
|
||||||
|
<tbody>
|
||||||
|
<tr class="odd">
|
||||||
|
<td><p>Well-Known SID/RID</p></td>
|
||||||
|
<td><p>S-1-5-32-583</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td><p>Type</p></td>
|
||||||
|
<td><p>BuiltIn Local</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td><p>Default container</p></td>
|
||||||
|
<td><p>CN=BuiltIn, DC=<domain>, DC=</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td><p>Default members</p></td>
|
||||||
|
<td><p>None</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td><p>Default member of</p></td>
|
||||||
|
<td><p>None</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td><p>Protected by ADMINSDHOLDER?</p></td>
|
||||||
|
<td><p>No</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td><p>Safe to move out of default container?</p></td>
|
||||||
|
<td><p>Can be moved out but it is not recommended</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="even">
|
||||||
|
<td><p>Safe to delegate management of this group to non-Service admins?</p></td>
|
||||||
|
<td><p>No</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
|
<td><p>Default User Rights</p></td>
|
||||||
|
<td><p>[Allow log on locally](/windows/device-security/security-policy-settings/allow-log-on-locally): SeInteractiveLogonRight</p>
|
||||||
|
<p>[Access this computer from the network](/windows/device-security/security-policy-settings/access-this-computer-from-the-network): SeNetworkLogonRight</p>
|
||||||
|
<p>[Bypass traverse checking](/windows/device-security/security-policy-settings/bypass-traverse-checking): SeChangeNotifyPrivilege</p>
|
||||||
|
<p>[Change the time zone](/windows/device-security/security-policy-settings/change-the-time-zone): SeTimeZonePrivilege</p>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</tbody>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### <a href="" id="bkmk-distributedcomusers"></a>Distributed COM Users
|
### <a href="" id="bkmk-distributedcomusers"></a>Distributed COM Users
|
||||||
@ -3692,6 +3761,7 @@ This security group was introduced in Windows Server 2012, and it has not chang
|
|||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [Security Principals](security-principals.md)
|
- [Security Principals](security-principals.md)
|
||||||
|
@ -22,8 +22,6 @@ ms.date: 08/17/2017
|
|||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
|
|
||||||
Prefer video? See [Windows Defender Credential Guard Design](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=mD3geLJyC_8304300474) in the **Deep Dive into Windows Defender Credential Guard** video series.
|
|
||||||
|
|
||||||
Kerberos, NTLM, and Credential manager isolate secrets by using virtualization-based security. Previous versions of Windows stored secrets in the Local Security Authority (LSA). Prior to Windows 10, the LSA stored secrets used by the operating system in its process memory. With Windows Defender Credential Guard enabled, the LSA process in the operating system talks to a new component called the isolated LSA process that stores and protects those secrets. Data stored by the isolated LSA process is protected using virtualization-based security and is not accessible to the rest of the operating system. LSA uses remote procedure calls to communicate with the isolated LSA process.
|
Kerberos, NTLM, and Credential manager isolate secrets by using virtualization-based security. Previous versions of Windows stored secrets in the Local Security Authority (LSA). Prior to Windows 10, the LSA stored secrets used by the operating system in its process memory. With Windows Defender Credential Guard enabled, the LSA process in the operating system talks to a new component called the isolated LSA process that stores and protects those secrets. Data stored by the isolated LSA process is protected using virtualization-based security and is not accessible to the rest of the operating system. LSA uses remote procedure calls to communicate with the isolated LSA process.
|
||||||
|
|
||||||
For security reasons, the isolated LSA process doesn't host any device drivers. Instead, it only hosts a small subset of operating system binaries that are needed for security and nothing else. All of these binaries are signed with a certificate that is trusted by virtualization-based security and these signatures are validated before launching the file in the protected environment.
|
For security reasons, the isolated LSA process doesn't host any device drivers. Instead, it only hosts a small subset of operating system binaries that are needed for security and nothing else. All of these binaries are signed with a certificate that is trusted by virtualization-based security and these signatures are validated before launching the file in the protected environment.
|
||||||
@ -46,4 +44,4 @@ Here's a high-level overview on how the LSA is isolated by using virtualization-
|
|||||||
|
|
||||||
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
[Virtualization-based security](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=1CoELLJyC_6704300474)
|
||||||
|
|
||||||
[Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
[Credentials protected by Windows Defender Credential Guard](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=pdc37LJyC_1204300474)
|
||||||
|
@ -21,10 +21,9 @@ ms.date: 03/01/2019
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See [Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474) in the Deep Dive into Windows Defender Credential Guard video series.
|
|
||||||
|
|
||||||
## Enable Windows Defender Credential Guard
|
## Enable Windows Defender Credential Guard
|
||||||
Windows Defender Credential Guard can be enabled either by using [Group Policy](#enable-credential-guard-by-using-group-policy), the [registry](#enable-credential-guard-by-using-the-registry), or the Windows Defender Device Guard and Windows Defender Credential Guard [hardware readiness tool](#hardware-readiness-tool). Windows Defender Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
|
Windows Defender Credential Guard can be enabled either by using [Group Policy](#enable-windows-defender-credential-guard-by-using-group-policy), the [registry](#enable-windows-defender-credential-guard-by-using-the-registry), or the Windows Defender Device Guard and Windows Defender Credential Guard [hardware readiness tool](#hardware-readiness-tool). Windows Defender Credential Guard can also protect secrets in a Hyper-V virtual machine, just as it would on a physical machine.
|
||||||
The same set of procedures used to enable Windows Defender Credential Guard on physical machines applies also to virtual machines.
|
The same set of procedures used to enable Windows Defender Credential Guard on physical machines applies also to virtual machines.
|
||||||
|
|
||||||
|
|
||||||
|
@ -21,9 +21,6 @@ ms.date: 01/12/2018
|
|||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
|
||||||
Prefer video? See
|
|
||||||
[Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474)
|
|
||||||
in the Deep Dive into Windows Defender Credential Guard video series.
|
|
||||||
|
|
||||||
For Windows Defender Credential Guard to provide protection, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
For Windows Defender Credential Guard to provide protection, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
||||||
|
|
||||||
|
@ -71,7 +71,7 @@ To allow fingerprint matching, you must have devices with fingerprint sensors an
|
|||||||
### Facial recognition sensors
|
### Facial recognition sensors
|
||||||
To allow facial recognition, you must have devices with integrated special infrared (IR) sensors and software. Facial recognition sensors use special cameras that see in IR light, letting them tell the difference between a photo and a living person while scanning an employee’s facial features. These sensors, like the fingerprint sensors, must also include anti-spoofing measures (required) and a way to configure them (optional).
|
To allow facial recognition, you must have devices with integrated special infrared (IR) sensors and software. Facial recognition sensors use special cameras that see in IR light, letting them tell the difference between a photo and a living person while scanning an employee’s facial features. These sensors, like the fingerprint sensors, must also include anti-spoofing measures (required) and a way to configure them (optional).
|
||||||
|
|
||||||
- False Accept Rate (FAR): <0.001
|
- False Accept Rate (FAR): <0.001%
|
||||||
|
|
||||||
- False Reject Rate (FRR) without Anti-spoofing or liveness detection: <5%
|
- False Reject Rate (FRR) without Anti-spoofing or liveness detection: <5%
|
||||||
|
|
||||||
|
@ -22,11 +22,11 @@ ms.date: 08/19/2018
|
|||||||
Windows Hello for Business authentication is passwordless, two-factor authentication. Authenticating with Windows Hello for Business provides a convenient sign-in experience that authenticates the user to both Azure Active Directory and Active Directory resources.<br>
|
Windows Hello for Business authentication is passwordless, two-factor authentication. Authenticating with Windows Hello for Business provides a convenient sign-in experience that authenticates the user to both Azure Active Directory and Active Directory resources.<br>
|
||||||
Azure Active Directory joined devices authenticate to Azure during sign-in and can optional authenticate to Active Directory. Hybrid Azure Active Directory joined devices authenticate to Active Directory during sign-in, and authenticate to Azure Active Directory in the background.<br>
|
Azure Active Directory joined devices authenticate to Azure during sign-in and can optional authenticate to Active Directory. Hybrid Azure Active Directory joined devices authenticate to Active Directory during sign-in, and authenticate to Azure Active Directory in the background.<br>
|
||||||
|
|
||||||
[Azure AD join authentication to Azure Active Directory](#Azure-AD-join-authentication-to-Azure-Active-Directory)<br>
|
[Azure AD join authentication to Azure Active Directory](#azure-ad-join-authentication-to-azure-active-directory)<br>
|
||||||
[Azure AD join authentication to Active Directory using a Key](#Azure-AD-join-authentication-to-Active-Directory-using-a-Key)<br>
|
[Azure AD join authentication to Active Directory using a Key](#azure-ad-join-authentication-to-active-directory-using-a-key)<br>
|
||||||
[Azure AD join authentication to Active Directory using a Certificate](#Azure-AD-join-authentication-to-Active-Directory-using-a-Certificate)<br>
|
[Azure AD join authentication to Active Directory using a Certificate](#azure-ad-join-authentication-to-active-directory-using-a-certificate)<br>
|
||||||
[Hybrid Azure AD join authentication using a Key](#Hybrid-Azure-AD-join-authentication-using-a-Key)<br>
|
[Hybrid Azure AD join authentication using a Key](#hybrid-azure-ad-join-authentication-using-a-key)<br>
|
||||||
[Hybrid Azure AD join authentication using a Certificate](#Hybrid-Azure-AD-join-authentication-using-a-Certificate)<br>
|
[Hybrid Azure AD join authentication using a Certificate](#hybrid-azure-ad-join-authentication-using-a-certificate)<br>
|
||||||
|
|
||||||
|
|
||||||
## Azure AD join authentication to Azure Active Directory
|
## Azure AD join authentication to Azure Active Directory
|
||||||
@ -40,7 +40,6 @@ Azure Active Directory joined devices authenticate to Azure during sign-in and c
|
|||||||
|D | The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.|
|
|D | The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.|
|
||||||
|E | The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT, and informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.|
|
|E | The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT, and informs winlogon of the success authentication. Winlogon creates a logon session, loads the user's profile, and starts explorer.exe.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Authentication)
|
|
||||||
## Azure AD join authentication to Active Directory using a Key
|
## Azure AD join authentication to Active Directory using a Key
|
||||||

|

|
||||||
|
|
||||||
@ -52,7 +51,6 @@ Azure Active Directory joined devices authenticate to Azure during sign-in and c
|
|||||||
|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not be revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.|
|
|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not be revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.|
|
||||||
|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Authentication)
|
|
||||||
## Azure AD join authentication to Active Directory using a Certificate
|
## Azure AD join authentication to Active Directory using a Certificate
|
||||||

|

|
||||||
|
|
||||||
@ -62,7 +60,6 @@ Azure Active Directory joined devices authenticate to Azure during sign-in and c
|
|||||||
|B | The Kerberos provider sends the signed pre-authentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.<br>The domain controller determines the certificate is not self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and has not been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed pre-authentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.|
|
|B | The Kerberos provider sends the signed pre-authentication data and user's certificate, which includes the public key, to the Key Distribution Center (KDC) service running on the domain controller in the form of a KERB_AS_REQ.<br>The domain controller determines the certificate is not self-signed certificate. The domain controller ensures the certificate chains to trusted root certificate, is within its validity period, can be used for authentication, and has not been revoked. It retrieves the public key and UPN from the certificate included in the KERB_AS_REQ and searches for the UPN in Active Directory. It validates the signed pre-authentication data using the public key from the certificate. On success, the KDC returns a TGT to the client with its certificate in a KERB_AS_REP.|
|
||||||
|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not be revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.|
|
|C | The Kerberos provider ensures it can trust the response from the domain controller. First, it ensures the KDC certificate chains to a root certificate that is trusted by the device. Next, it ensures the certificate is within its validity period and that it has not be revoked. The Kerberos provider then verifies the certificate has the KDC Authentication present and that the subject alternate name listed in the KDC's certificate matches the domain name to which the user is authenticating. After passing this criteria, Kerberos returns the TGT to lsass, where it is cached and used for subsequent service ticket requests.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Authentication)
|
|
||||||
## Hybrid Azure AD join authentication using a Key
|
## Hybrid Azure AD join authentication using a Key
|
||||||

|

|
||||||
|
|
||||||
@ -76,7 +73,6 @@ Azure Active Directory joined devices authenticate to Azure during sign-in and c
|
|||||||
|F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.|
|
|F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.|
|
||||||
|G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.<br>The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.<br>The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.|
|
|G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.<br>The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.<br>The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Authentication)
|
|
||||||
## Hybrid Azure AD join authentication using a Certificate
|
## Hybrid Azure AD join authentication using a Certificate
|
||||||

|

|
||||||
|
|
||||||
@ -90,6 +86,3 @@ Azure Active Directory joined devices authenticate to Azure during sign-in and c
|
|||||||
|F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.|
|
|F | While Windows loads the user's desktop, lsass passes the collected credentials to the Cloud Authentication security support provider, referred to as the Cloud AP provider. The Cloud AP provider requests a nonce from Azure Active Directory. Azure AD returns a nonce.|
|
||||||
|G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.<br>The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.<br>The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.|
|
|G | The Cloud AP provider signs the nonce using the user's private key and returns the signed nonce to the Azure Active Directory. Azure Active Directory validates the signed nonce using the user's securely registered public key against the nonce signature. After validating the signature, Azure AD then validates the returned signed nonce. After validating the nonce, Azure AD creates a PRT with session key that is encrypted to the device's transport key and returns it to the Cloud AP provider.<br>The Cloud AP provider receives the encrypted PRT with session key. Using the device's private transport key, the Cloud AP provider decrypt the session key and protects the session key using the device's TPM.<br>The Cloud AP provider returns a successful authentication response to lsass. Lsass caches the PRT.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Authentication)
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -28,6 +28,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
[Azure AD joined provisioning in a Federated environment](#azure-ad-joined-provisioning-in-a-federated-environment)<br>
|
[Azure AD joined provisioning in a Federated environment](#azure-ad-joined-provisioning-in-a-federated-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-key-trust-deployment-in-a-managed-environment)<br>
|
[Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-key-trust-deployment-in-a-managed-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-certificate-trust-deployment-in-a-managed-environment)<br>
|
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-certificate-trust-deployment-in-a-managed-environment)<br>
|
||||||
|
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment in a Federated environment](#hybrid-azure-ad-joined-provisioning-in-a-certificate-trust-deployment-in-a-managed-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-synchronous-certificate-trust-deployment-in-a-managed-environment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment](#hybrid-azure-ad-joined-provisioning-in-a-synchronous-certificate-trust-deployment-in-a-managed-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Federated environment](#hybrid-azure-ad-joined-provisioning-in-a-synchronous-certificate-trust-deployment-in-a-federated-environment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Federated environment](#hybrid-azure-ad-joined-provisioning-in-a-synchronous-certificate-trust-deployment-in-a-federated-environment)<br>
|
||||||
[Domain joined provisioning in an On-premises Key Trust deployment](#domain-joined-provisioning-in-an-on-premises-key-trust-deployment)<br>
|
[Domain joined provisioning in an On-premises Key Trust deployment](#domain-joined-provisioning-in-an-on-premises-key-trust-deployment)<br>
|
||||||
@ -56,7 +57,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates MFA claim remains current. On successful validation, Azure DRS locates the user's object in Azure Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Azure Active Directory returns key ID to the application which signals the end of user provisioning and the application exits.|
|
|C | The application sends the ADRS token, ukpub, attestation data, and device information to ADRS for user key registration. Azure DRS validates MFA claim remains current. On successful validation, Azure DRS locates the user's object in Azure Active Directory, writes the key information to a multi-values attribute. The key information includes a reference to the device from which it was created. Azure Active Directory returns key ID to the application which signals the end of user provisioning and the application exits.|
|
||||||
|
|
||||||
[Return to top](#windows-hello-for-business-provisioning)
|
[Return to top](#windows-hello-for-business-provisioning)
|
||||||
## Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed envrionment
|
## Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed environment
|
||||||

|

|
||||||
|
|
||||||
| Phase | Description |
|
| Phase | Description |
|
||||||
|
@ -71,7 +71,7 @@ The minimum required enterprise certificate authority that can be used with Wind
|
|||||||
## Directory Synchronization ##
|
## Directory Synchronization ##
|
||||||
The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.
|
The two directories used in hybrid deployments must be synchronized. You need Azure Active Directory Connect to synchronize user accounts in the on-premises Active Directory with Azure Active Directory.
|
||||||
|
|
||||||
Organizations using older directory synchronization technology, such as DirSync or Azure AD sync need to upgrade to Azure AD Connect
|
Organizations using older directory synchronization technology, such as DirSync or Azure AD sync, need to upgrade to Azure AD Connect. In case the schema of your local AD DS was changed since the last directory synchronization, you may need to [refresh directory schema](https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-installation-wizard#refresh-directory-schema).
|
||||||
|
|
||||||
### Section Review
|
### Section Review
|
||||||
> [!div class="checklist"]
|
> [!div class="checklist"]
|
||||||
|
@ -29,12 +29,14 @@ Enterprises can use [Microsoft BitLocker Administration and Monitoring (MBAM)](h
|
|||||||
|
|
||||||
## Managing devices joined to Azure Active Directory
|
## Managing devices joined to Azure Active Directory
|
||||||
|
|
||||||
Devices joined to Azure AD are managed using Mobile Device Management (MDM) policy from an MDM solution such as Microsoft Intune. [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
Devices joined to Azure AD are managed using Mobile Device Management (MDM) policy from an MDM solution such as Microsoft Intune. Without Windows 10, version 1809, only local administrators can enable BitLocker via Intune policy. Starting with Windows 10, version 1809, Intune can enable BitLocker for standard users. [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
||||||
|
|
||||||
Starting with Windows 10 version 1703 (also known as the Windows Creators Update), the enablement of BitLocker can be triggered over MDM either by the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) or the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The BitLocker CSP adds policy options that go beyond ensuring that encryption has occurred, and is available on computers that run Windows 10 Business or Enterprise editions and on Windows Phones.
|
Starting with Windows 10 version 1703 (also known as the Windows Creators Update), the enablement of BitLocker can be triggered over MDM either by the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) or the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The BitLocker CSP adds policy options that go beyond ensuring that encryption has occurred, and is available on computers that run Windows 10 and on Windows phones.
|
||||||
|
|
||||||
For hardware that is compliant with Modern Standby and HSTI, when using either of these features, [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) is automatically turned on whenever the user joins a device to Azure AD. Azure AD provides a portal where recovery keys are also backed up, so users can retrieve their own recovery key for self-service, if required. For older devices that are not yet encrypted, beginning with Windows 10 version 1703 (the Windows 10 Creators Update), admins can use the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) to trigger encryption and store the recovery key in Azure AD.
|
For hardware that is compliant with Modern Standby and HSTI, when using either of these features, [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) is automatically turned on whenever the user joins a device to Azure AD. Azure AD provides a portal where recovery keys are also backed up, so users can retrieve their own recovery key for self-service, if required. For older devices that are not yet encrypted, beginning with Windows 10 version 1703 (the Windows 10 Creators Update), admins can use the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) to trigger encryption and store the recovery key in Azure AD.
|
||||||
|
|
||||||
|
This is applicable to Azure Hybrid AD as well.
|
||||||
|
|
||||||
|
|
||||||
## Managing workplace-joined PCs and phones
|
## Managing workplace-joined PCs and phones
|
||||||
|
|
||||||
@ -51,7 +53,7 @@ If you are installing a server manually, such as a stand-alone server, then choo
|
|||||||
|
|
||||||
Additionally, lights out data centers can take advantage of the enhanced security of a second factor while avoiding the need for user intervention during reboots by optionally using a combination of BitLocker (TPM+PIN) and BitLocker Network Unlock. BitLocker Network Unlock brings together the best of hardware protection, location dependence, and automatic unlock, while in the trusted location. For the configuration steps, see [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md).
|
Additionally, lights out data centers can take advantage of the enhanced security of a second factor while avoiding the need for user intervention during reboots by optionally using a combination of BitLocker (TPM+PIN) and BitLocker Network Unlock. BitLocker Network Unlock brings together the best of hardware protection, location dependence, and automatic unlock, while in the trusted location. For the configuration steps, see [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md).
|
||||||
|
|
||||||
For more information, see the Bitlocker FAQs article and other useful links in [Related Articles](#articles).
|
For more information, see the Bitlocker FAQs article and other useful links in [Related Articles](#related-articles).
|
||||||
|
|
||||||
## PowerShell examples
|
## PowerShell examples
|
||||||
|
|
||||||
@ -134,4 +136,4 @@ PS C:\> Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpace
|
|||||||
|
|
||||||
[BitLocker cmdlets for Windows PowerShell](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#a-href-idbkmk-blcmdletsabitlocker-cmdlets-for-windows-powershell)
|
[BitLocker cmdlets for Windows PowerShell](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md#a-href-idbkmk-blcmdletsabitlocker-cmdlets-for-windows-powershell)
|
||||||
|
|
||||||
[Surface Pro Specifications](https://www.microsoft.com/surface/support/surface-pro-specs)
|
[Surface Pro Specifications](https://www.microsoft.com/surface/support/surface-pro-specs)
|
||||||
|
@ -50,6 +50,24 @@ As a result, if the currently used PCR bank is switched all keys that have been
|
|||||||
|
|
||||||
Before switching PCR banks you should suspend or disable BitLocker – or have your recovery key ready. For steps on how to switch PCR banks on your PC, you should contact your OEM or UEFI vendor.
|
Before switching PCR banks you should suspend or disable BitLocker – or have your recovery key ready. For steps on how to switch PCR banks on your PC, you should contact your OEM or UEFI vendor.
|
||||||
|
|
||||||
|
## How can I identify which PCR bank is being used?
|
||||||
|
|
||||||
|
A TPM can be configured to have multiple PCR banks active. When BIOS is performing measurements it will do so into all active PCR banks, depending on its capability to make these measurements. BIOS may chose to deactivate PCR banks that it does not support or "cap" PCR banks that it does not support by extending a separator. The following registry value identifies which PCR banks are active.
|
||||||
|
|
||||||
|
- Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\IntegrityServices<br>
|
||||||
|
- DWORD: TPMActivePCRBanks<br>
|
||||||
|
- Defines which PCR banks are currently active. This is a bitmap defined in the TCG Algorithm Registry.<br>
|
||||||
|
|
||||||
|
Windows checks which PCR banks are active and supported by the BIOS. Windows also checks if the measured boot log supports measurements for all active PCR banks. Windows will prefer the use of the SHA-256 bank for measurements and will fall back to SHA1 PCR bank if one of the pre-conditions is not met.
|
||||||
|
|
||||||
|
You can identify which PCR bank is currently used by Windows by looking at the registry.
|
||||||
|
|
||||||
|
- Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\IntegrityServices<br>
|
||||||
|
- DWORD: TPMDigestAlgID<br>
|
||||||
|
- Algorithm ID of the PCR bank that Windows is currently using. (For the full list of supported algorithms, see the TCG Algorithm Registry.)<br>
|
||||||
|
|
||||||
|
Windows only uses one PCR bank to continue boot measurements. All other active PCR banks will be extended with a separator to indicate that they are not used by Windows and measurements that appear to be from Windows should not be trusted.
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
- [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics)
|
- [Trusted Platform Module](trusted-platform-module-top-node.md) (list of topics)
|
||||||
|
@ -24,7 +24,7 @@ ms.date: 02/26/2019
|
|||||||
- Windows 10, version 1703 and later
|
- Windows 10, version 1703 and later
|
||||||
- Windows 10 Mobile, version 1703 and later
|
- Windows 10 Mobile, version 1703 and later
|
||||||
|
|
||||||
With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports are accessed from Microsoft Azure Intune, and you can alternately access the App learning report from Microsoft Operations Management Suite (OMS).
|
With WIP Learning, you can intelligently tune which apps and websites are included in your WIP policy to help reduce disruptive prompts and keep it accurate and relevant. WIP Learning generates two reports: The **App learning report** and the **Website learning report**. Both reports can be accessed from Microsoft Azure Intune.
|
||||||
|
|
||||||
The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly.
|
The **App learning report** monitors your apps, not in policy, that attempt to access work data. You can identify these apps using the report and add them to your WIP policies to avoid productivity disruption before fully enforcing WIP with [“Block”](protect-enterprise-data-using-wip.md#bkmk-modes) mode. Frequent monitoring of the report will help you continuously identify access attempts so you can update your policy accordingly.
|
||||||
|
|
||||||
@ -44,59 +44,42 @@ In the **Website learning report**, you can view a summary of the devices that h
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
Once you have the apps and websites showing up in the WIP Learning logging reports, you can decide whether to add them to your app protection policies. Next, we'll look at how to do that in Operations Management Suite (OMS).
|
Once you have the apps and websites showing up in the WIP Learning logging reports, you can decide whether to add them to your app protection policies.
|
||||||
|
|
||||||
## View the WIP app learning report in Microsoft Operations Management Suite
|
## Use the WIP section of Device Health
|
||||||
|
|
||||||
From Intune, you can open OMS by choosing **WIP in the OMS console**. Then you can view the WIP App learning blade to monitor access events per app, and devices that have reported WIP access events:
|
You can use Device Health to adjust your WIP protection policy. See [Using Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-using#windows-information-protection) to learn more.
|
||||||
|
|
||||||

|
If you want to configure your environment for Windows Analytics: Device Health, see [Get Started with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-get-started) for more information.
|
||||||
|
|
||||||
If you don't have OMS linked to your Microsoft Azure Account, and want to configure your environment for Windows Analytics: Device Health, see [Get Started with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-get-started) for more information.
|
|
||||||
|
|
||||||
>[!NOTE]
|
|
||||||
>Intune has a 14 day data retention capacity, while OMS offers better querying capabilities and longer data retention.
|
|
||||||
|
|
||||||
Once you have WIP policies in place, by using the WIP section of Device Health, you can:
|
Once you have WIP policies in place, by using the WIP section of Device Health, you can:
|
||||||
|
|
||||||
- Reduce disruptive prompts by adding rules to allow data sharing from approved apps.
|
- Reduce disruptive prompts by adding rules to allow data sharing from approved apps.
|
||||||
- Tune WIP rules by confirming that certain apps are allowed or denied by current policy.
|
- Tune WIP rules by confirming that certain apps are allowed or denied by current policy.
|
||||||
|
|
||||||

|
## Use Device Health and Intune to adjust WIP protection policy
|
||||||
|
|
||||||
The **APP LEARNING** tile shows details of app statistics that you can use to evaluate each incident and update app policies by using WIP AppIDs.
|
The information needed for the following steps can be found using Device Health, which you will first have to set up. Learn more about how you can [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor).
|
||||||
|
|
||||||

|
1. In **Device Health** click the app you want to add to your policy and copy the publisher information.
|
||||||
|
|
||||||
In this chart view, you can see apps that have been used on connected devices which, when clicked on, will open additional details on the app, including details you need to adjust your WIP Policy:
|
2. In Intune, click **App protection policies** and then choose the app policy you want to add an application to.
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
Here, you can copy the **WipAppid** and use it to adjust your WIP protection policies.
|
3. Click **Protected apps**, and then click **Add Apps**.
|
||||||
|
|
||||||
## Use OMS and Intune to adjust WIP protection policy
|
4. In the **Recommended apps** drop down menu, choose either **Store apps** or **Desktop apps**, depending on the app you've chosen (for example, an executable (EXE) is a desktop app).
|
||||||
|
|
||||||
1. Click the **APP LEARNING** tile in OMS, as described above, to determine which apps are being used for work so you can add those you choose to your WIP policy.
|
|
||||||
|
|
||||||
2. Click the app you want to add to your policy and copy the publisher information from the app details screen.
|
|
||||||
|
|
||||||
3. Back in Intune, click **App protection policies** and then choose the app policy you want to add an application to.
|
|
||||||
|
|
||||||
4. Click **Protected apps**, and then click **Add Apps**.
|
|
||||||
|
|
||||||
5. In the **Recommended apps** drop down menu, choose either **Store apps** or **Desktop apps**, depending on the app you've chosen (for example, an executable (EXE) is a desktop app).
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. In **NAME** (optional), type the name of the app, and then in **PUBLISHER** (required), paste the publisher information that you copied in step 2 above.
|
5. In **NAME** (optional), type the name of the app, and then in **PUBLISHER** (required), paste the publisher information that you copied in step 1 above.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Type the name of the product in **PRODUCT NAME** (required) (this will probably be the same as what you typed for **NAME**).
|
6. Type the name of the product in **PRODUCT NAME** (required) (this will probably be the same as what you typed for **NAME**).
|
||||||
|
|
||||||
8. Back in OMS, copy the name of the executable (for example, snippingtool.exe) and then go back to Intune and paste it in **FILE** (required).
|
7. Copy the name of the executable (for example, snippingtool.exe) and paste it in **FILE** (required).
|
||||||
|
|
||||||
9. Go back to OMS one more time and note the version number of the app and type it in **MIN VERSION** in Intune (alternately, you can specify the max version, but one or the other is required), and then select the **ACTION**: **Allow** or **Deny**
|
8. Type the version number of the app into **MIN VERSION** in Intune (alternately, you can specify the max version, but one or the other is required), and then select the **ACTION**: **Allow** or **Deny**
|
||||||
|
|
||||||
When working with WIP-enabled apps and WIP-unknown apps, it is recommended that you start with **Silent** or **Allow overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. For more information about WIP modes, see: [Protect enterprise data using WIP: WIP-modes](protect-enterprise-data-using-wip.md#bkmk-modes)
|
When working with WIP-enabled apps and WIP-unknown apps, it is recommended that you start with **Silent** or **Allow overrides** while verifying with a small group that you have the right apps on your allowed apps list. After you're done, you can change to your final enforcement policy, **Block**. For more information about WIP modes, see: [Protect enterprise data using WIP: WIP-modes](protect-enterprise-data-using-wip.md#bkmk-modes)
|
||||||
|
|
||||||
|
@ -224,7 +224,7 @@ The most common values:
|
|||||||
| 0x18 | KDC\_ERR\_PREAUTH\_FAILED | Pre-authentication information was invalid | The wrong password was provided.<br>This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
|
| 0x18 | KDC\_ERR\_PREAUTH\_FAILED | Pre-authentication information was invalid | The wrong password was provided.<br>This error code cannot occur in event “[4768](event-4768.md). A Kerberos authentication ticket (TGT) was requested”. It occurs in “[4771](event-4771.md). Kerberos pre-authentication failed” event. |
|
||||||
| 0x19 | KDC\_ERR\_PREAUTH\_REQUIRED | Additional pre-authentication required | This error often occurs in UNIX interoperability scenarios. MIT-Kerberos clients do not request pre-authentication when they send a KRB\_AS\_REQ message. If pre-authentication is required (the default), Windows systems will send this error. Most MIT-Kerberos clients will respond to this error by giving the pre-authentication, in which case the error can be ignored, but some clients might not respond in this way. |
|
| 0x19 | KDC\_ERR\_PREAUTH\_REQUIRED | Additional pre-authentication required | This error often occurs in UNIX interoperability scenarios. MIT-Kerberos clients do not request pre-authentication when they send a KRB\_AS\_REQ message. If pre-authentication is required (the default), Windows systems will send this error. Most MIT-Kerberos clients will respond to this error by giving the pre-authentication, in which case the error can be ignored, but some clients might not respond in this way. |
|
||||||
| 0x1A | KDC\_ERR\_SERVER\_NOMATCH | KDC does not know about the requested server | No information. |
|
| 0x1A | KDC\_ERR\_SERVER\_NOMATCH | KDC does not know about the requested server | No information. |
|
||||||
| 0x1B | KDC\_ERR\_SVC\_UNAVAILABLE | KDC is unavailable | No information. |
|
| 0x1B | KDC\_ERR\_MUST\_USE\_USER2USER | Server principal valid for user2user only | This error occurs because the service is missing an SPN. |
|
||||||
| 0x1F | KRB\_AP\_ERR\_BAD\_INTEGRITY | Integrity check on decrypted field failed | The authenticator was encrypted with something other than the session key. The result is that the client cannot decrypt the resulting message. The modification of the message could be the result of an attack or it could be because of network noise. |
|
| 0x1F | KRB\_AP\_ERR\_BAD\_INTEGRITY | Integrity check on decrypted field failed | The authenticator was encrypted with something other than the session key. The result is that the client cannot decrypt the resulting message. The modification of the message could be the result of an attack or it could be because of network noise. |
|
||||||
| 0x20 | KRB\_AP\_ERR\_TKT\_EXPIRED | The ticket has expired | The smaller the value for the “Maximum lifetime for user ticket” Kerberos policy setting, the more likely it is that this error will occur. Because ticket renewal is automatic, you should not have to do anything if you get this message. |
|
| 0x20 | KRB\_AP\_ERR\_TKT\_EXPIRED | The ticket has expired | The smaller the value for the “Maximum lifetime for user ticket” Kerberos policy setting, the more likely it is that this error will occur. Because ticket renewal is automatic, you should not have to do anything if you get this message. |
|
||||||
| 0x21 | KRB\_AP\_ERR\_TKT\_NYV | The ticket is not yet valid | The ticket presented to the server is not yet valid (in relationship to the server time). The most probable cause is that the clocks on the KDC and the client are not synchronized.<br>If cross-realm Kerberos authentication is being attempted, then you should verify time synchronization between the KDC in the target realm and the KDC in the client realm, as well. |
|
| 0x21 | KRB\_AP\_ERR\_TKT\_NYV | The ticket is not yet valid | The ticket presented to the server is not yet valid (in relationship to the server time). The most probable cause is that the clocks on the KDC and the client are not synchronized.<br>If cross-realm Kerberos authentication is being attempted, then you should verify time synchronization between the KDC in the target realm and the KDC in the client realm, as well. |
|
||||||
|
@ -20,9 +20,9 @@ ms.date: 10/02/2018
|
|||||||
|
|
||||||
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
- [Windows Defender Advanced Threat Protection (Windows Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can identify and block PUAs from downloading and installing on endpoints in your network.
|
The potentially unwanted application (PUA) protection feature in Windows Defender Antivirus can detect and block PUAs on endpoints in your network.
|
||||||
|
|
||||||
These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have a poor reputation.
|
These applications are not considered viruses, malware, or other types of threats, but might perform actions on endpoints that adversely affect their performance or use. PUA can also refer to applications that are considered to have poor reputation.
|
||||||
|
|
||||||
Typical PUA behavior includes:
|
Typical PUA behavior includes:
|
||||||
|
|
||||||
@ -37,25 +37,17 @@ These applications can increase the risk of your network being infected with mal
|
|||||||
|
|
||||||
## How it works
|
## How it works
|
||||||
|
|
||||||
PUAs are blocked when a user attempts to download or install the detected file, and if the file meets one of the following conditions:
|
Windows Defender Antivirus blocks detected PUA files and attempts to download, move, run, or install them. Blocked PUA files are then moved to quarantined.
|
||||||
|
|
||||||
- The file is being scanned from the browser
|
When a PUA is detected on an endpoint, Windows Defender Antivirus presents a notification to the user ([unless notifications have been disabled](configure-notifications-windows-defender-antivirus.md)) in the same format as normal threat detections (prefaced with "PUA:").
|
||||||
- The file is in a folder with "**downloads**" in the path
|
|
||||||
- The file is in a folder with "**temp**" in the path
|
|
||||||
- The file is on the user's desktop
|
|
||||||
- The file does not meet one of these conditions and is not under *%programfiles%*, *%appdata%*, or *%windows%*
|
|
||||||
|
|
||||||
The file is placed in the quarantine section so it won't run.
|
|
||||||
|
|
||||||
When a PUA is detected on an endpoint, the endpoint will present a notification to the user ([unless notifications have been disabled](configure-notifications-windows-defender-antivirus.md)) in the same format as normal threat detections (prefaced with "PUA:").
|
|
||||||
|
|
||||||
They will also appear in the usual [quarantine list in the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
They will also appear in the usual [quarantine list in the Windows Security app](windows-defender-security-center-antivirus.md#detection-history).
|
||||||
|
|
||||||
## View PUA events
|
## View PUA events
|
||||||
|
|
||||||
PUA events are reported in the Windows Event Viewer and not in System Center Configuration Manager or Intune.
|
PUA events are reported in the Windows Event Viewer, but not in System Center Configuration Manager or Intune.
|
||||||
|
|
||||||
Hoever, PUA detections will be reported if you have set up email notifications for detections.
|
You can turn on email notifications for PUA detections.
|
||||||
|
|
||||||
See [Troubleshoot event IDs](troubleshoot-windows-defender-antivirus.md) for details on viewing Windows Defender Antivirus events. PUA events are recorded under event ID 1160.
|
See [Troubleshoot event IDs](troubleshoot-windows-defender-antivirus.md) for details on viewing Windows Defender Antivirus events. PUA events are recorded under event ID 1160.
|
||||||
|
|
||||||
|
@ -27,7 +27,9 @@ You might want to do this when testing how the features will work in your organi
|
|||||||
|
|
||||||
While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled.
|
While the features will not block or prevent apps, scripts, or files from being modified, the Windows Event Log will record events as if the features were fully enabled. This means you can enable audit mode and then review the event log to see what impact the feature would have had were it enabled.
|
||||||
|
|
||||||
You can use Windows Defender Advanced Threat Protection to get greater deatils for each event, especially for investigating attack surface reduction rules. Using the Windows Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
To find the audited entries, go to **Applications and Services** > **Microsoft** > **Windows** > **Windows Defender** > **Operational**.
|
||||||
|
|
||||||
|
You can use Windows Defender Advanced Threat Protection to get greater details for each event, especially for investigating attack surface reduction rules. Using the Windows Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection.md).
|
||||||
|
|
||||||
This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer.
|
This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer.
|
||||||
|
|
||||||
|
@ -9,8 +9,8 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: andreabichsel
|
author: Justinha
|
||||||
ms.author: v-anbic
|
ms.author: justinha
|
||||||
ms.date: 04/02/2019
|
ms.date: 04/02/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -72,11 +72,11 @@ If you've tested the feature with the demo site and with audit mode, and network
|
|||||||
When you report a problem with network protection, you are asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
|
When you report a problem with network protection, you are asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
|
||||||
|
|
||||||
1. Open an elevated command prompt and change to the Windows Defender directory:
|
1. Open an elevated command prompt and change to the Windows Defender directory:
|
||||||
```console
|
```
|
||||||
cd c:\program files\windows defender
|
cd c:\program files\windows defender
|
||||||
```
|
```
|
||||||
2. Run this command to generate the diagnostic logs:
|
2. Run this command to generate the diagnostic logs:
|
||||||
```console
|
```
|
||||||
mpcmdrun -getfiles
|
mpcmdrun -getfiles
|
||||||
```
|
```
|
||||||
3. By default, they are saved to C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab. Attach the file to the submission form.
|
3. By default, they are saved to C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab. Attach the file to the submission form.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user