diff --git a/education/windows/federated-sign-in.md b/education/windows/federated-sign-in.md index 9c6425ae8e..aca908bb45 100644 --- a/education/windows/federated-sign-in.md +++ b/education/windows/federated-sign-in.md @@ -1,7 +1,7 @@ --- title: Configure federated sign-in for Windows devices description: Learn how federated sign-in in Windows works and how to configure it. -ms.date: 04/10/2024 +ms.date: 06/03/2024 ms.topic: how-to appliesto: - ✅ Windows 11 @@ -87,7 +87,7 @@ Review the following instructions to configure your devices using either Microso |--|--|--| | Education | Is Education Environment | Enabled | | Federated Authentication | Enable Web Sign In For Primary User | Enabled | -| Authentication | Configure Web Sign In Allowed Urls | Semicolon separated list of domains, for example: `samlidp.clever.com;clever.com;mobile-redirector.clever.com` | +| Authentication | Configure Web Sign In Allowed Urls | Enter the list of domains, with each URL in a separate row. For example:
- `samlidp.clever.com`
- `clever.com`
- `mobile-redirector.clever.com` | | Authentication | Configure Webcam Access Domain Names | This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: `clever.com` | [!INCLUDE [intune-settings-catalog-2](../../includes/configure/intune-settings-catalog-2.md)] @@ -134,7 +134,7 @@ Review the following instructions to configure your shared devices using either | Education | Is Education Environment | Enabled | | SharedPC | Enable Shared PC Mode With OneDrive Sync | True | | Authentication | Enable Web Sign In | Enabled | -| Authentication | Configure Web Sign In Allowed Urls | Semicolon separated list of domains, for example: `samlidp.clever.com;clever.com;mobile-redirector.clever.com` | +| Authentication | Configure Web Sign In Allowed Urls | Enter the list of domains, with each URL in a separate row. For example:
- `samlidp.clever.com`
- `clever.com`
- `mobile-redirector.clever.com` | | Authentication | Configure Webcam Access Domain Names | This setting is optional, and it should be configured if you need to use the webcam during the sign-in process. Specify the list of domains that are allowed to use the webcam during the sign-in process, separated by a semicolon. For example: `clever.com` | [!INCLUDE [intune-settings-catalog-2](../../includes/configure/intune-settings-catalog-2.md)] diff --git a/windows/configuration/start/layout.md b/windows/configuration/start/layout.md index 8a771280ae..30baa389a1 100644 --- a/windows/configuration/start/layout.md +++ b/windows/configuration/start/layout.md @@ -649,45 +649,3 @@ When you configure the Start layout with policy settings, you overwrite the enti [MEM-1]: /mem/intune/configuration/custom-settings-windows-10 [PS-1]: /powershell/module/startlayout/export-startlayout [WIN-1]: /windows/client-management/mdm/policy-csp-start - - - diff --git a/windows/configuration/taskbar/includes/allow-widgets.md b/windows/configuration/taskbar/includes/allow-widgets.md index 83a0bb12e7..7033aec825 100644 --- a/windows/configuration/taskbar/includes/allow-widgets.md +++ b/windows/configuration/taskbar/includes/allow-widgets.md @@ -15,4 +15,4 @@ This policy specifies whether the widgets feature is allowed on the device. | | Path | |--|--| | **CSP** | `./Device/Vendor/MSFT/Policy/Config/NewsAndInterests/`[AllowNewsAndInterests](/windows/client-management/mdm/policy-csp-newsandinterests#allownewsandinterests) | -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Widgets** | +| **GPO** | - **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Widgets** | diff --git a/windows/configuration/taskbar/includes/configure-start-layout.md b/windows/configuration/taskbar/includes/configure-start-layout.md index 7edd14def2..ce75e3d6df 100644 --- a/windows/configuration/taskbar/includes/configure-start-layout.md +++ b/windows/configuration/taskbar/includes/configure-start-layout.md @@ -13,7 +13,7 @@ This policy setting lets you specify the applications pinned to the taskbar. The | | Path | |--|--| -| **CSP** | - `./Device/Vendor/MSFT/Policy/Config/Start/StartLayout`/[Configure start layout](/windows/client-management/mdm/policy-csp-start#startlayout)

- `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`/[Configure start layout](/windows/client-management/mdm/policy-csp-start#startlayout) | -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar**

**User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **CSP** | - `./Device/Vendor/MSFT/Policy/Config/Start/StartLayout`/[Configure start layout](/windows/client-management/mdm/policy-csp-start#startlayout)
- `./User/Vendor/MSFT/Policy/Config/Start/StartLayout`/[Configure start layout](/windows/client-management/mdm/policy-csp-start#startlayout) | +| **GPO** | - **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar**
- **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | For more information, see [Customize the taskbar pinned applications](../pinned-apps.md). diff --git a/windows/configuration/taskbar/includes/configures-search-on-the-taskbar.md b/windows/configuration/taskbar/includes/configures-search-on-the-taskbar.md index 3382db1ac7..5e009d1125 100644 --- a/windows/configuration/taskbar/includes/configures-search-on-the-taskbar.md +++ b/windows/configuration/taskbar/includes/configures-search-on-the-taskbar.md @@ -18,4 +18,4 @@ This policy setting allows you to configure search on the taskbar. | | Path | |--|--| | **CSP** | `./Device/Vendor/MSFT/Policy/Config/Search/`[ConfigureSearchOnTaskbarMode](/windows/client-management/mdm/policy-csp-search#configuresearchontaskbarmode) | -| **GPO** | **Computer Configuration** > **Windows Components** > **Search** | +| **GPO** | - **Computer Configuration** > **Windows Components** > **Search** | diff --git a/windows/configuration/taskbar/includes/disable-editing-quick-settings.md b/windows/configuration/taskbar/includes/disable-editing-quick-settings.md index d1f29ba96d..e57bff141e 100644 --- a/windows/configuration/taskbar/includes/disable-editing-quick-settings.md +++ b/windows/configuration/taskbar/includes/disable-editing-quick-settings.md @@ -13,4 +13,4 @@ ms.topic: include | | Path | |--|--| | **CSP** | `./Device/Vendor/MSFT/Policy/Config/Start/`[DisableEditingQuickSettings](/windows/client-management/mdm/policy-csp-start#disableeditingquicksettings)| -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **Disable editing quick settings** | +| **GPO** | - **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **Disable editing quick settings** | diff --git a/windows/configuration/taskbar/includes/do-not-allow-pinning-items-in-jump-lists.md b/windows/configuration/taskbar/includes/do-not-allow-pinning-items-in-jump-lists.md index 22d26069ab..9813a70d10 100644 --- a/windows/configuration/taskbar/includes/do-not-allow-pinning-items-in-jump-lists.md +++ b/windows/configuration/taskbar/includes/do-not-allow-pinning-items-in-jump-lists.md @@ -15,4 +15,4 @@ With this policy setting you control the pinning of items in Jump Lists. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/do-not-allow-pinning-programs-to-the-taskbar.md b/windows/configuration/taskbar/includes/do-not-allow-pinning-programs-to-the-taskbar.md index 70b4320f49..8017676f8c 100644 --- a/windows/configuration/taskbar/includes/do-not-allow-pinning-programs-to-the-taskbar.md +++ b/windows/configuration/taskbar/includes/do-not-allow-pinning-programs-to-the-taskbar.md @@ -15,4 +15,4 @@ This policy setting allows you to control pinning programs to the Taskbar. | | Path | |--|--| | **CSP** | `./Device/Vendor/MSFT/Policy/Config/Start/`[NoPinningToTaskbar](/windows/client-management/mdm/policy-csp-start#nopinningtotaskbar) | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/do-not-allow-pinning-store-app-to-the-taskbar.md b/windows/configuration/taskbar/includes/do-not-allow-pinning-store-app-to-the-taskbar.md index a394034ed7..bdfd18c8cc 100644 --- a/windows/configuration/taskbar/includes/do-not-allow-pinning-store-app-to-the-taskbar.md +++ b/windows/configuration/taskbar/includes/do-not-allow-pinning-store-app-to-the-taskbar.md @@ -15,4 +15,4 @@ This policy setting allows you to control pinning the Store app to the Taskbar. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/do-not-allow-taskbars-on-more-than-one-display.md b/windows/configuration/taskbar/includes/do-not-allow-taskbars-on-more-than-one-display.md index 7766466c8c..4d42fdee7d 100644 --- a/windows/configuration/taskbar/includes/do-not-allow-taskbars-on-more-than-one-display.md +++ b/windows/configuration/taskbar/includes/do-not-allow-taskbars-on-more-than-one-display.md @@ -12,4 +12,4 @@ This policy setting allows you to prevent taskbars from being displayed on more | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/do-not-display-or-track-items-in-jump-lists-from-remote-locations.md b/windows/configuration/taskbar/includes/do-not-display-or-track-items-in-jump-lists-from-remote-locations.md index fb0d96e2d0..a91be73b37 100644 --- a/windows/configuration/taskbar/includes/do-not-display-or-track-items-in-jump-lists-from-remote-locations.md +++ b/windows/configuration/taskbar/includes/do-not-display-or-track-items-in-jump-lists-from-remote-locations.md @@ -18,4 +18,4 @@ This policy setting allows you to control displaying or tracking items in Jump L | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/hide-recent-jumplists.md b/windows/configuration/taskbar/includes/hide-recent-jumplists.md index 67c433344f..8e4ad2a207 100644 --- a/windows/configuration/taskbar/includes/hide-recent-jumplists.md +++ b/windows/configuration/taskbar/includes/hide-recent-jumplists.md @@ -19,5 +19,5 @@ Prevents the operating system and installed programs from creating and displayin | | Path | |--|--| -| **CSP** | - `./Device/Vendor/MSFT/Policy/Config/Start/`[HideRecentJumplists](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists)

- `./User/Vendor/MSFT/Policy/Config/Start/`[HideRecentJumplists](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists) | -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **don't keep history of recently opened documents**

**User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **don't keep history of recently opened documents**| +| **CSP** | - `./Device/Vendor/MSFT/Policy/Config/Start/`[HideRecentJumplists](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists)
- `./User/Vendor/MSFT/Policy/Config/Start/`[HideRecentJumplists](/windows/client-management/mdm/policy-csp-start#hiderecentjumplists) | +| **GPO** | - **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **don't keep history of recently opened documents**
- **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** > **don't keep history of recently opened documents**| diff --git a/windows/configuration/taskbar/includes/hide-the-notification-area.md b/windows/configuration/taskbar/includes/hide-the-notification-area.md index 1313ae901b..f7f8b3f04d 100644 --- a/windows/configuration/taskbar/includes/hide-the-notification-area.md +++ b/windows/configuration/taskbar/includes/hide-the-notification-area.md @@ -12,4 +12,4 @@ This setting affects the notification area (previously called the "system tray") | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/hide-the-taskview-button.md b/windows/configuration/taskbar/includes/hide-the-taskview-button.md index aa95d9a03f..567f130a95 100644 --- a/windows/configuration/taskbar/includes/hide-the-taskview-button.md +++ b/windows/configuration/taskbar/includes/hide-the-taskview-button.md @@ -11,5 +11,5 @@ This policy setting allows you to hide the TaskView button. If you enable this p | | Path | |--|--| -| **CSP** |- `./Device/Vendor/MSFT/Policy/Config/Start/`[HideTaskViewButton](/windows/client-management/mdm/policy-csp-start#hidetaskviewbutton)

- `./User/Vendor/MSFT/Policy/Config/Start/`[HideTaskViewButton](/windows/client-management/mdm/policy-csp-start#hidetaskviewbutton) | -| **GPO** |- **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**

- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **CSP** |- `./Device/Vendor/MSFT/Policy/Config/Start/`[HideTaskViewButton](/windows/client-management/mdm/policy-csp-start#hidetaskviewbutton)
- `./User/Vendor/MSFT/Policy/Config/Start/`[HideTaskViewButton](/windows/client-management/mdm/policy-csp-start#hidetaskviewbutton) | +| **GPO** |- **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**
- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/lock-all-taskbar-settings.md b/windows/configuration/taskbar/includes/lock-all-taskbar-settings.md index 59e7e89884..981e828059 100644 --- a/windows/configuration/taskbar/includes/lock-all-taskbar-settings.md +++ b/windows/configuration/taskbar/includes/lock-all-taskbar-settings.md @@ -15,4 +15,4 @@ With this policy setting you lock all taskbar settings. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/lock-the-taskbar.md b/windows/configuration/taskbar/includes/lock-the-taskbar.md index 2f5694702d..93986d5626 100644 --- a/windows/configuration/taskbar/includes/lock-the-taskbar.md +++ b/windows/configuration/taskbar/includes/lock-the-taskbar.md @@ -12,4 +12,4 @@ This setting affects the taskbar, which is used to switch between running applic | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-changes-to-taskbar-and-start-menu-settings.md b/windows/configuration/taskbar/includes/prevent-changes-to-taskbar-and-start-menu-settings.md index a159c12d82..07b9780bb7 100644 --- a/windows/configuration/taskbar/includes/prevent-changes-to-taskbar-and-start-menu-settings.md +++ b/windows/configuration/taskbar/includes/prevent-changes-to-taskbar-and-start-menu-settings.md @@ -15,4 +15,4 @@ With this policy setting you prevent changes to taskbar and Start settings. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**

- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**
- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-grouping-of-taskbar-items.md b/windows/configuration/taskbar/includes/prevent-grouping-of-taskbar-items.md index eb97a11ff8..8fdaf1d499 100644 --- a/windows/configuration/taskbar/includes/prevent-grouping-of-taskbar-items.md +++ b/windows/configuration/taskbar/includes/prevent-grouping-of-taskbar-items.md @@ -15,4 +15,4 @@ Taskbar grouping consolidates similar applications when there's no room on the t | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-users-from-adding-or-removing-toolbars.md b/windows/configuration/taskbar/includes/prevent-users-from-adding-or-removing-toolbars.md index da36dcc670..bfd489e4ba 100644 --- a/windows/configuration/taskbar/includes/prevent-users-from-adding-or-removing-toolbars.md +++ b/windows/configuration/taskbar/includes/prevent-users-from-adding-or-removing-toolbars.md @@ -15,4 +15,4 @@ With this policy setting you prevent users from adding or removing toolbars. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-users-from-moving-taskbar-to-another-screen-dock-location.md b/windows/configuration/taskbar/includes/prevent-users-from-moving-taskbar-to-another-screen-dock-location.md index 953135ecf3..34d6cbff58 100644 --- a/windows/configuration/taskbar/includes/prevent-users-from-moving-taskbar-to-another-screen-dock-location.md +++ b/windows/configuration/taskbar/includes/prevent-users-from-moving-taskbar-to-another-screen-dock-location.md @@ -15,4 +15,4 @@ With this policy setting you prevent users from moving taskbar to another screen | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-users-from-rearranging-toolbars.md b/windows/configuration/taskbar/includes/prevent-users-from-rearranging-toolbars.md index 0e64eb8a09..801b804b91 100644 --- a/windows/configuration/taskbar/includes/prevent-users-from-rearranging-toolbars.md +++ b/windows/configuration/taskbar/includes/prevent-users-from-rearranging-toolbars.md @@ -15,4 +15,4 @@ With this policy setting you prevent users from rearranging toolbars. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/prevent-users-from-resizing-the-taskbar.md b/windows/configuration/taskbar/includes/prevent-users-from-resizing-the-taskbar.md index cddb749761..8796175a15 100644 --- a/windows/configuration/taskbar/includes/prevent-users-from-resizing-the-taskbar.md +++ b/windows/configuration/taskbar/includes/prevent-users-from-resizing-the-taskbar.md @@ -15,4 +15,4 @@ With this policy setting you prevent users from resizing the taskbar. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-access-to-the-context-menus-for-the-taskbar.md b/windows/configuration/taskbar/includes/remove-access-to-the-context-menus-for-the-taskbar.md index 5ff72e3932..a79bd60c89 100644 --- a/windows/configuration/taskbar/includes/remove-access-to-the-context-menus-for-the-taskbar.md +++ b/windows/configuration/taskbar/includes/remove-access-to-the-context-menus-for-the-taskbar.md @@ -17,4 +17,4 @@ This policy setting doesn't prevent users from using other methods to issue the | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**

- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**
- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-clock-from-the-system-notification-area.md b/windows/configuration/taskbar/includes/remove-clock-from-the-system-notification-area.md index 569921f889..ee455afcd7 100644 --- a/windows/configuration/taskbar/includes/remove-clock-from-the-system-notification-area.md +++ b/windows/configuration/taskbar/includes/remove-clock-from-the-system-notification-area.md @@ -13,4 +13,4 @@ ms.topic: include | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-notifications-and-action-center.md b/windows/configuration/taskbar/includes/remove-notifications-and-action-center.md index 850a20179f..d141649c74 100644 --- a/windows/configuration/taskbar/includes/remove-notifications-and-action-center.md +++ b/windows/configuration/taskbar/includes/remove-notifications-and-action-center.md @@ -17,4 +17,4 @@ The notification area is located at the far right end of the taskbar, and includ | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-pinned-programs-from-the-taskbar.md b/windows/configuration/taskbar/includes/remove-pinned-programs-from-the-taskbar.md index 069de94c04..901e8f2402 100644 --- a/windows/configuration/taskbar/includes/remove-pinned-programs-from-the-taskbar.md +++ b/windows/configuration/taskbar/includes/remove-pinned-programs-from-the-taskbar.md @@ -15,4 +15,4 @@ This policy setting allows you to remove pinned programs from the taskbar. | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**

- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar**
- **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-quick-settings.md b/windows/configuration/taskbar/includes/remove-quick-settings.md index 55eaca637d..58e2e01069 100644 --- a/windows/configuration/taskbar/includes/remove-quick-settings.md +++ b/windows/configuration/taskbar/includes/remove-quick-settings.md @@ -17,4 +17,4 @@ If this setting is enabled, Quick Settings isn't displayed in the Quick Settings | | Path | |--|--| | **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/`[DisableControlCenter](/windows/client-management/mdm/policy-csp-start#disablecontrolcenter) | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-the-battery-meter.md b/windows/configuration/taskbar/includes/remove-the-battery-meter.md index 445dba6aa5..5eac19f260 100644 --- a/windows/configuration/taskbar/includes/remove-the-battery-meter.md +++ b/windows/configuration/taskbar/includes/remove-the-battery-meter.md @@ -15,4 +15,4 @@ With this policy setting you can remove the battery meter from the system contro | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-the-meet-now-icon.md b/windows/configuration/taskbar/includes/remove-the-meet-now-icon.md index 75cd22365b..e0ed92dcbb 100644 --- a/windows/configuration/taskbar/includes/remove-the-meet-now-icon.md +++ b/windows/configuration/taskbar/includes/remove-the-meet-now-icon.md @@ -15,4 +15,4 @@ With this policy setting allows you can remove the Meet Now icon from the system | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-the-networking-icon.md b/windows/configuration/taskbar/includes/remove-the-networking-icon.md index a1825e5f0e..18f8a0d6ba 100644 --- a/windows/configuration/taskbar/includes/remove-the-networking-icon.md +++ b/windows/configuration/taskbar/includes/remove-the-networking-icon.md @@ -15,4 +15,4 @@ With this policy setting you can remove the networking icon from the system cont | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-the-people-bar-from-the-taskbar.md b/windows/configuration/taskbar/includes/remove-the-people-bar-from-the-taskbar.md index 679df69fde..9a07b3ea06 100644 --- a/windows/configuration/taskbar/includes/remove-the-people-bar-from-the-taskbar.md +++ b/windows/configuration/taskbar/includes/remove-the-people-bar-from-the-taskbar.md @@ -12,4 +12,4 @@ With this policy allows you can remove the People Bar from the taskbar and disab | | Path | |--|--| | **CSP** | `./User/Vendor/MSFT/Policy/Config/Start/`[HidePeopleBar](/windows/client-management/mdm/policy-csp-start#hidepeoplebar) | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/remove-the-volume-control-icon.md b/windows/configuration/taskbar/includes/remove-the-volume-control-icon.md index 8e34ed3d84..b1c847e81c 100644 --- a/windows/configuration/taskbar/includes/remove-the-volume-control-icon.md +++ b/windows/configuration/taskbar/includes/remove-the-volume-control-icon.md @@ -15,4 +15,4 @@ With this policy setting you can remove the volume control icon from the system | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/show-additional-calendar.md b/windows/configuration/taskbar/includes/show-additional-calendar.md index 39ecd45a89..8198012d72 100644 --- a/windows/configuration/taskbar/includes/show-additional-calendar.md +++ b/windows/configuration/taskbar/includes/show-additional-calendar.md @@ -19,4 +19,4 @@ By default, the calendar is set according to the locale of the operating system, | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/simplify-quick-settings-layout.md b/windows/configuration/taskbar/includes/simplify-quick-settings-layout.md index ea3d57141e..bce9e7ab7d 100644 --- a/windows/configuration/taskbar/includes/simplify-quick-settings-layout.md +++ b/windows/configuration/taskbar/includes/simplify-quick-settings-layout.md @@ -13,4 +13,4 @@ ms.topic: include | | Path | |--|--| | **CSP** | `./Device/Vendor/MSFT/Policy/Config/Start/`[SimplifyQuickSettings](/windows/client-management/mdm/policy-csp-start#simplifyquicksettings) | -| **GPO** | **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **Computer Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/turn-off-automatic-promotion-of-notification-icons-to-the-taskbar.md b/windows/configuration/taskbar/includes/turn-off-automatic-promotion-of-notification-icons-to-the-taskbar.md index 4e9527beef..9642aecd96 100644 --- a/windows/configuration/taskbar/includes/turn-off-automatic-promotion-of-notification-icons-to-the-taskbar.md +++ b/windows/configuration/taskbar/includes/turn-off-automatic-promotion-of-notification-icons-to-the-taskbar.md @@ -15,4 +15,4 @@ With this policy setting you can turn off automatic promotion of notification ic | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/includes/turn-off-notification-area-cleanup.md b/windows/configuration/taskbar/includes/turn-off-notification-area-cleanup.md index 56f39f1f65..6150f80740 100644 --- a/windows/configuration/taskbar/includes/turn-off-notification-area-cleanup.md +++ b/windows/configuration/taskbar/includes/turn-off-notification-area-cleanup.md @@ -18,4 +18,4 @@ This setting determines whether the items are always expanded or always collapse | | Path | |--|--| | **CSP** | Not available. | -| **GPO** | **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | +| **GPO** | - **User Configuration** > **Administrative Templates** > **Start Menu and Taskbar** | diff --git a/windows/configuration/taskbar/pinned-apps.md b/windows/configuration/taskbar/pinned-apps.md index d38c8a7d60..f7cbe59725 100644 --- a/windows/configuration/taskbar/pinned-apps.md +++ b/windows/configuration/taskbar/pinned-apps.md @@ -231,3 +231,7 @@ If you apply the taskbar configuration to a clean install or an update, users ca Learn more about the options available to configure Start menu settings using the Configuration Service Provider (CSP) and Group Policy (GPO): - [Taskbar policy settings](policy-settings.md) + +--- +[WIN-1]: /windows/client-management/mdm/policy-csp-start +[MEM-1]: /mem/intune/configuration/custom-settings-windows-10 diff --git a/windows/deployment/do/waas-delivery-optimization-faq.yml b/windows/deployment/do/waas-delivery-optimization-faq.yml index af0a3d0fd2..e75c33678a 100644 --- a/windows/deployment/do/waas-delivery-optimization-faq.yml +++ b/windows/deployment/do/waas-delivery-optimization-faq.yml @@ -77,11 +77,12 @@ sections: questions: - question: Which ports does Delivery Optimization use? answer: | - Delivery Optimization listens on port 7680 for requests from other peers by using TCP/IP. The service registers and opens this port on the device. The port must be set to accept inbound traffic through your firewall. If you don't allow inbound traffic over port 7680, you can't use the peer-to-peer functionality of Delivery Optimization. However, devices can still successfully download by using HTTP or HTTPS traffic over port 80 (such as for default Windows Update data). + Delivery Optimization listens on port 7680 for requests from other peers by using TCP/IP. The service registers and opens this port on the device. The port must be set to accept inbound and outbound TCP traffic through your firewall. If you don't allow traffic over port 7680, you can't use the peer-to-peer functionality of Delivery Optimization. However, devices can still successfully download updates by using HTTP over port 80 (or HTTPS over port 443 where applicable). - Delivery Optimization uses Teredo to create peer groups, which include devices across NATs (or any form of internal subnet that uses gateways or firewalls between subnets). To enable this scenario, you must allow inbound TCP/IP traffic over port 3544. Look for a "NAT traversal" setting in your firewall to set this up. + If you set the "Download Mode" policy to "Group (2)" or "Internet (3)", Teredo will be used by Delivery Optimization to connect to peer devices across NATs. You must allow inbound and outbound UDP traffic over port 3544. Look for a "NAT traversal" setting in your firewall to set this up. - Delivery Optimization also communicates with its cloud service by using HTTP/HTTPS over port 80. + Delivery Optimization also communicates with its cloud service by using HTTPS over port 443. + - question: What are the requirements if I use a proxy? answer: | For Delivery Optimization to successfully use the proxy, you should set up the proxy by using Windows proxy settings or Internet Explorer proxy settings. For details see [Using a proxy with Delivery Optimization](../do/delivery-optimization-proxy.md). Most content downloaded with Delivery Optimization uses byte range requests. Make sure your proxy allows byte range requests. For more information, see [Proxy requirements for Windows Update](/windows/deployment/update/windows-update-troubleshooting). diff --git a/windows/deployment/do/waas-delivery-optimization-monitor.md b/windows/deployment/do/waas-delivery-optimization-monitor.md index 675851ae42..6c30ab2dc4 100644 --- a/windows/deployment/do/waas-delivery-optimization-monitor.md +++ b/windows/deployment/do/waas-delivery-optimization-monitor.md @@ -88,12 +88,12 @@ For details, see [Windows Update for Business Delivery Optimization Report](/win | CpuUsagePct | Average CPU usage by the Delivery Optimization process | | MemUsageKB | Amount of committed memory currently used by the Delivery Optimization process | | NumberOfPeers | Total number of peers found across all files currently in the cache | -| CacheHostConnections | Number of cache host server connections | -| CdnConnections | Number of CDN server connections | -| LanConnections | Number of peer connections over LAN | -| LinkLocalConnections | Number of peer connections over Link Local | -| GroupConnections | Number of peer connections over Group | -| InternetConnections | Number of peer connections over Internet | +| CacheHostConnections | Number of connections to Microsoft Connected Cache servers | +| CdnConnections | Number of connections to CDN servers | +| LanConnections | Number of connections to LAN peers | +| LinkLocalConnections | Number of connections to Link Local peers | +| GroupConnections | Number of connections to Group peers| +| InternetConnections | Number of connections to Internet peers | | DownlinkBps | Average download bandwidth usage currently seen across all network adapters | | DownlinkUsageBps | Average bandwidth currently used by Delivery Optimization for downloads | | UplinkBps | Average upload bandwidth usage currently seen across all network adapters | diff --git a/windows/deployment/do/waas-delivery-optimization-reference.md b/windows/deployment/do/waas-delivery-optimization-reference.md index c93596986a..9c90b088c4 100644 --- a/windows/deployment/do/waas-delivery-optimization-reference.md +++ b/windows/deployment/do/waas-delivery-optimization-reference.md @@ -42,7 +42,7 @@ In MDM, the same settings are under **.Vendor/MSFT/Policy/Config/DeliveryOptimiz | [Minimum disk size allowed to use peer caching](#minimum-disk-size-allowed-to-use-peer-caching) | DOMinDiskSizeAllowedToPeer | 1703 | Default value is 32 GB. | | [Max cache age](#max-cache-age) | DOMaxCacheAge | 1511 | Default value is 259,200 seconds (three days). | | [Max cache size](#max-cache-size) | DOMaxCacheSize | 1511 | Default value is 20%. | -| [Absolute max cache size (in GBs)](#absolute-max-cache-size) | DOAbsoluteMaxCacheSize | 1607 | Default is not configured.| +| [Absolute max cache size (in GBs)](#absolute-max-cache-size) | DOAbsoluteMaxCacheSize | 1607 | Default isn't configured.| | [Modify cache drive](#modify-cache-drive) | DOModifyCacheDrive | 1607 | Default to the operating system drive through the %SYSTEMDRIVE% environment variable. | | [Minimum peer caching content file size](#minimum-peer-caching-content-file-size) | DOMinFileSizeToCache | 1703 | Default file size is 50 MB. | | [Monthly upload data cap](#monthly-upload-data-cap) | DOMonthlyUploadDataCap | 1607 | Default value is 20 GB. | diff --git a/windows/deployment/do/whats-new-do.md b/windows/deployment/do/whats-new-do.md index c9a0382033..b750903a23 100644 --- a/windows/deployment/do/whats-new-do.md +++ b/windows/deployment/do/whats-new-do.md @@ -35,10 +35,11 @@ There are two different versions: ### General -[Check out](https://aka.ms/do-fix) the new Delivery Optimization Troubleshooter. This tool provides a device health check to verify the device is set up properly to use Delivery Optimization. To scope the output more specifically, use one of the two switches: +[Check out](https://aka.ms/do-fix) the new Delivery Optimization Troubleshooter. This tool provides a device health check to verify the device is set up properly to use Delivery Optimization. To scope the output more specifically, use one of the available switches: -- -p2p: Provides output specific to P2P settings, efficiency, and errors. -- -mcc: Provides output specific to MCC settings and verifies the client can access the cache server. +- -HealthCheck: Provides an overall check of the device setup to ensure Delivery Optimization communication is possible on the device. +- -P2P: Provides output specific to P2P settings, efficiency, and errors. +- -MCC: Provides output specific to MCC settings and verifies the client can access the cache server. ### Windows 11 22H2 diff --git a/windows/deployment/update/includes/wufb-deployment-limitations.md b/windows/deployment/update/includes/wufb-deployment-limitations.md index a57711bffd..5ed854edd0 100644 --- a/windows/deployment/update/includes/wufb-deployment-limitations.md +++ b/windows/deployment/update/includes/wufb-deployment-limitations.md @@ -10,4 +10,6 @@ ms.localizationpriority: medium --- -Windows Update for Business deployment service is a Windows service hosted in Azure that uses Windows diagnostic data. You should be aware that Windows Update for Business deployment service doesn't meet [US Government community compliance (GCC)](/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc#us-government-community-compliance) requirements. For a list of GCC offerings for Microsoft products and services, see the [Microsoft Trust Center](/compliance/regulatory/offering-home). Windows Update for Business deployment service is available in the Azure Commercial cloud, but not available for GCC High or United States Department of Defense customers. +Windows Update for Business deployment service is a Windows service hosted in Azure Commercial that uses Windows diagnostic data. While customers with GCC tenants may choose to use it, the Windows Update for Business deployment service is outside the [US Government community compliance (GCC)](/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc#us-government-community-compliance) boundary. For a list of GCC offerings for Microsoft products and services, see the [Microsoft Trust Center](/compliance/regulatory/offering-home). + +Windows Update for Business deployment service isn't available in Azure Government for [Office 365 GCC High and DoD](/office365/servicedescriptions/office-365-platform-service-description/office-365-us-government/gcc-high-and-dod) tenants. diff --git a/windows/deployment/update/wufb-wsus.md b/windows/deployment/update/wufb-wsus.md index 6062716b60..2cb3016af2 100644 --- a/windows/deployment/update/wufb-wsus.md +++ b/windows/deployment/update/wufb-wsus.md @@ -46,7 +46,7 @@ To help you better understand the scan source policy, see the default scan behav - On Windows 10: All of your updates will come from WSUS. - On Windows 11: All of your updates will still come from WSUS unless you configure the specify scan source policy. -- If you configure a WSUS server and deferral policies: All of your updates will come from Windows Update unless you specify the scan source policy. +- If you configure a WSUS server and deferral policies on Windows 10: All of your updates will come from Windows Update unless you specify the scan source policy or have disabled dual scan. - If you configure a WSUS server and the scan source policy: All of your updates will come from the source chosen in the scan source policy. > [!TIP] diff --git a/windows/whats-new/deprecated-features-resources.md b/windows/whats-new/deprecated-features-resources.md index b9a23d6024..3e79887cbe 100644 --- a/windows/whats-new/deprecated-features-resources.md +++ b/windows/whats-new/deprecated-features-resources.md @@ -1,7 +1,7 @@ --- title: Resources for deprecated features in the Windows client description: Resources and details for deprecated features in the Windows client. -ms.date: 03/25/2024 +ms.date: 06/03/2024 ms.service: windows-client ms.subservice: itpro-fundamentals ms.localizationpriority: medium @@ -21,6 +21,14 @@ appliesto: This article provides additional resources about [deprecated features for Windows client](deprecated-features.md) that may be needed by IT professionals. The following information is provided to help IT professionals plan for the removal of deprecated features: +## NTLM + +Customers concerned about NTLM usage in their environments are encouraged to utilize [NTLM auditing](/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain) to [investigate how NTLM is being used](https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/ntlm-blocking-and-you-application-analysis-and-auditing/ba-p/397191). + +In many cases, applications should be able to replace NTLM with Negotiate using a one-line change in their `AcquireCredentialsHandle` request to the SSPI. One known exception is for applications that have made hard assumptions about the maximum number of round trips needed to complete authentication. In most cases, Negotiate will add at least one additional round trip. Some scenarios may require additional configuration. For more information, see [Kerberos authentication troubleshooting guidance](/troubleshoot/windows-server/windows-security/kerberos-authentication-troubleshooting-guidance). + +Negotiate's built-in fallback to NTLM is preserved to mitigate compatibility issues during this transition. For updates on NTLM deprecation, see [https://aka.ms/ntlm](https://aka.ms/ntlm). + ## WordPad WordPad will be removed from all editions of Windows starting in Windows 11, version 24H2 and Windows Server 2025. As a result, Windows will no longer have a built-in, default RTF reader. We recommend Microsoft Word for rich text documents like .doc and .rtf and Notepad for plain text documents like .txt. The following binaries will be removed as a result of WordPad removal: diff --git a/windows/whats-new/deprecated-features.md b/windows/whats-new/deprecated-features.md index d06a4e9689..0a7bbc5918 100644 --- a/windows/whats-new/deprecated-features.md +++ b/windows/whats-new/deprecated-features.md @@ -1,7 +1,7 @@ --- title: Deprecated features in the Windows client description: Review the list of features that Microsoft is no longer actively developing in Windows 10 and Windows 11. -ms.date: 05/30/2024 +ms.date: 06/03/2024 ms.service: windows-client ms.subservice: itpro-fundamentals ms.localizationpriority: medium @@ -47,6 +47,7 @@ The features in this article are no longer being actively developed, and might b | Feature | Details and mitigation | Deprecation announced | |---|---|---| +| NTLM | All versions of [NTLM](/windows/win32/secauthn/microsoft-ntlm), including LANMAN, NTLMv1, and NTLMv2, are no longer under active feature development and are deprecated. Use of NTLM will continue to work in the next release of Windows Server and the next annual release of Windows. Calls to NTLM should be replaced by calls to Negotiate, which will try to authenticate with Kerberos and only fall back to NTLM when necessary. For more information, see [Resources for deprecated features](deprecated-features-resources.md). | June 2024 | | Driver Verifier GUI (verifiergui.exe) | Driver Verifier GUI, verifiergui.exe, is deprecated and will be removed in a future version of Windows. You can use the [Verifier Command Line](/windows-hardware/drivers/devtest/verifier-command-line) (verifier.exe) instead of the Driver Verifier GUI.| May 2024 | | NPLogonNotify and NPPasswordChangeNotify APIs | Starting in Windows 11, version 24H2, the inclusion of password payload in MPR notifications is set to disabled by default through group policy in [NPLogonNotify](/windows/win32/api/npapi/nf-npapi-nplogonnotify) and [NPPasswordChangeNotify](/windows/win32/api/npapi/nf-npapi-nppasswordchangenotify) APIs. The APIs may be removed in a future release. The primary reason for disabling this feature is to enhance security. When enabled, these APIs allow the caller to retrieve a user's password, presenting potential risks for password exposure and harvesting by malicious users. To include password payload in MPR notifications, set the [EnableMPRNotifications](/windows/client-management/mdm/policy-csp-windowslogon#enablemprnotifications) policy to `enabled`.| March 2024 | | TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits | Support for certificates using RSA keys with key lengths shorter than 2048 bits will be deprecated. Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer. For more information, see [Transitioning of Cryptographic Algorithms and Key Sizes - Discussion Paper (nist.gov)](https://csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf). This deprecation focuses on ensuring that all RSA certificates used for TLS server authentication must have key lengths greater than or equal to 2048 bits to be considered valid by Windows.

TLS certificates issued by enterprise or test certification authorities (CA) aren't impacted with this change. However, we recommend that they be updated to RSA keys greater than or equal to 2048 bits as a security best practice. This change is necessary to preserve security of Windows customers using certificates for authentication and cryptographic purposes.| March 2024|