From 1daf1317ef19b94b140a34695777a97664819853 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 3 Apr 2018 15:40:50 -0700 Subject: [PATCH 01/20] initial import --- .../update/windows-update-sources.md | 159 ++++++++++++++++++ 1 file changed, 159 insertions(+) create mode 100644 windows/deployment/update/windows-update-sources.md diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md new file mode 100644 index 0000000000..1f8e758809 --- /dev/null +++ b/windows/deployment/update/windows-update-sources.md @@ -0,0 +1,159 @@ + +--- +title: Determining the Windows Update Service source +description: Determine the source that Windows Update service is currently using. +ms.prod: w10 +ms.mktglfcycl: +ms.sitesec: library +author: kaushika-msft +ms.localizationpriority: high +ms.author: kaushika +ms.date: 04/03/2018 +--- + +# Determining the Windows Update Service source + +Windows 10 devices can receive updates from a variety of sources, including Windows Update online, a Windows Server Update Services server, and others. To determine the source of Windows Updates currently being used on a device, follow these steps:  + +1. Start Windows PowerShell as an administrator +2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. +3. Run `\$MUSM.Services`. The resulting output should be similar to the following: + +``` +Name : Microsoft Update +ContentValidationCert : {} +ExpirationDate : +IsManaged : False +IsRegisteredWithAU : True +IssueDate : 01-Jan-01 12:00:00 AM +OffersWindowsUpdates : True +RedirectUrls : System.__ComObject +ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d +IsScanPackageService : False +CanRegisterWithAU : True +ServiceUrl : https://fe2.update.microsoft.com/v6/ +SetupPrefix : mu +IsDefaultAUService : False + +Name : DCat Flighting Prod +ContentValidationCert : {} +ExpirationDate : +IsManaged : False +IsRegisteredWithAU : False +IssueDate : 01-Jan-01 12:00:00 AM +OffersWindowsUpdates : False +RedirectUrls : System.__ComObject +ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552 +IsScanPackageService : False +CanRegisterWithAU : False +ServiceUrl : https://fe3.delivery.mp.microsoft.com/ +SetupPrefix : wu +IsDefaultAUService : False + +Name : Windows Store (DCat Prod) +ContentValidationCert : {} +ExpirationDate : +IsManaged : False +IsRegisteredWithAU : False +IssueDate : 01-Jan-01 12:00:00 AM +OffersWindowsUpdates : False +RedirectUrls : System.__ComObject +ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289 +IsScanPackageService : False +CanRegisterWithAU : True +ServiceUrl : https://fe3.delivery.mp.microsoft.com/ +SetupPrefix : ws +IsDefaultAUService : False + +Name : Windows Server Update Service +ContentValidationCert : {} +ExpirationDate : 18-Jun-54 9:21:00 PM +IsManaged : True +IsRegisteredWithAU : True +IssueDate : 01-Jan-03 12:00:00 AM +OffersWindowsUpdates : True +RedirectUrls : System.__ComObject +ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7 +IsScanPackageService : False +CanRegisterWithAU : True +ServiceUrl : +SetupPrefix : +IsDefaultAUService : True + +Name : Windows Update +ContentValidationCert : {} +ExpirationDate : +IsManaged : False +IsRegisteredWithAU : False +IssueDate : 01-Jan-01 12:00:00 AM +OffersWindowsUpdates : True +RedirectUrls : System.__ComObject +ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77 +IsScanPackageService : False +CanRegisterWithAU : True +ServiceUrl : https://fe2.update.microsoft.com/v6/ +SetupPrefix : wu +IsDefaultAUService : False +``` + + +4. Check the category **Name** and **OffersWindowsUpdates**:  + +Name: **Microsoft Update** + +Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox. + +OffersWindowsUpdates: **True** + +Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) + +--- + +Name: **DCat Flighting Prod** + +The update source is the Windows Insider Program. + +OffersWindowsUpdates: **False** + +Indicates that the client will not receive or is not configured to receive these updates. + +--- + +Name: **Windows Store (DCat Prod)** + +The update source is Insider Updates for Store Apps. + +OffersWindowsUpdates: **False** + +Indicates that the client will not receive or is not configured to receive these updates. + +--- + +Name: **Windows Server Update Service** + +The source is a Windows Server Updates Services server. + +OffersWindowsUpdates: **True** + +The client is configured to receive updates from WSUS + +--- + +Name: **Windows Update** + +The source is Windows Update. + +OffersWindowsUpdates: **True** + +The client is configured to receive updates from Windows Update Online + +--- +  + +See also: + +[Understanding the Windowsupdate.log file for advanced users](https://support.microsoft.com/help/4035760) + +[You can't install updates on a Windows-based computer](https://support.microsoft.com/help/2509997/you-can-t-install-updates-on-a-windows-based-computer) + +[How to read the Windowsupdate.log file on Windows 7 and earlier OS versions](https://support.microsoft.com/help/902093/how-to-read-the-windowsupdate-log-file) From cf790ba4f49bec31670a20d7caa956e7199da269 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 4 Apr 2018 10:50:41 -0700 Subject: [PATCH 02/20] trying to fix step numbering --- windows/deployment/update/windows-update-sources.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index 1f8e758809..d4b5967b12 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -17,10 +17,9 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 1. Start Windows PowerShell as an administrator 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. -3. Run `\$MUSM.Services`. The resulting output should be similar to the following: - -``` -Name : Microsoft Update +3. Run `\$MUSM.Services`. The resulting output should be similar to the following: + ``` + Name : Microsoft Update ContentValidationCert : {} ExpirationDate : IsManaged : False From c820a727b01328beeafb8d8de04a01ee91c882a1 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 4 Apr 2018 13:35:56 -0700 Subject: [PATCH 03/20] trying again with the steps --- windows/deployment/update/windows-update-sources.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index d4b5967b12..d51999abef 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -1,4 +1,3 @@ - --- title: Determining the Windows Update Service source description: Determine the source that Windows Update service is currently using. @@ -18,6 +17,7 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 1. Start Windows PowerShell as an administrator 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. 3. Run `\$MUSM.Services`. The resulting output should be similar to the following: + ``` Name : Microsoft Update ContentValidationCert : {} From d23d32ad1232a5d2e3c01cf7f1788d4fe1bceb87 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 4 Apr 2018 14:28:55 -0700 Subject: [PATCH 04/20] still not right --- windows/deployment/update/windows-update-sources.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index d51999abef..9e8a789f4f 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -18,8 +18,8 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. 3. Run `\$MUSM.Services`. The resulting output should be similar to the following: - ``` - Name : Microsoft Update +``` +Name : Microsoft Update ContentValidationCert : {} ExpirationDate : IsManaged : False From 20ea1fd5673988b4d11d0248d58156a7005f8ed6 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Wed, 4 Apr 2018 15:23:38 -0700 Subject: [PATCH 05/20] applying Liza's fix --- .../update/windows-update-sources.md | 198 +++++++++--------- 1 file changed, 99 insertions(+), 99 deletions(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index 9e8a789f4f..5019699f81 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -17,136 +17,136 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 1. Start Windows PowerShell as an administrator 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. 3. Run `\$MUSM.Services`. The resulting output should be similar to the following: + + ``` + Name : Microsoft Update + ContentValidationCert : {} + ExpirationDate : + IsManaged : False + IsRegisteredWithAU : True + IssueDate : 01-Jan-01 12:00:00 AM + OffersWindowsUpdates : True + RedirectUrls : System.__ComObject + ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d + IsScanPackageService : False + CanRegisterWithAU : True + ServiceUrl : https://fe2.update.microsoft.com/v6/ + SetupPrefix : mu + IsDefaultAUService : False -``` -Name : Microsoft Update -ContentValidationCert : {} -ExpirationDate : -IsManaged : False -IsRegisteredWithAU : True -IssueDate : 01-Jan-01 12:00:00 AM -OffersWindowsUpdates : True -RedirectUrls : System.__ComObject -ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d -IsScanPackageService : False -CanRegisterWithAU : True -ServiceUrl : https://fe2.update.microsoft.com/v6/ -SetupPrefix : mu -IsDefaultAUService : False + Name : DCat Flighting Prod + ContentValidationCert : {} + ExpirationDate : + IsManaged : False + IsRegisteredWithAU : False + IssueDate : 01-Jan-01 12:00:00 AM + OffersWindowsUpdates : False + RedirectUrls : System.__ComObject + ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552 + IsScanPackageService : False + CanRegisterWithAU : False + ServiceUrl : https://fe3.delivery.mp.microsoft.com/ + SetupPrefix : wu + IsDefaultAUService : False -Name : DCat Flighting Prod -ContentValidationCert : {} -ExpirationDate : -IsManaged : False -IsRegisteredWithAU : False -IssueDate : 01-Jan-01 12:00:00 AM -OffersWindowsUpdates : False -RedirectUrls : System.__ComObject -ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552 -IsScanPackageService : False -CanRegisterWithAU : False -ServiceUrl : https://fe3.delivery.mp.microsoft.com/ -SetupPrefix : wu -IsDefaultAUService : False + Name : Windows Store (DCat Prod) + ContentValidationCert : {} + ExpirationDate : + IsManaged : False + IsRegisteredWithAU : False + IssueDate : 01-Jan-01 12:00:00 AM + OffersWindowsUpdates : False + RedirectUrls : System.__ComObject + ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289 + IsScanPackageService : False + CanRegisterWithAU : True + ServiceUrl : https://fe3.delivery.mp.microsoft.com/ + SetupPrefix : ws + IsDefaultAUService : False -Name : Windows Store (DCat Prod) -ContentValidationCert : {} -ExpirationDate : -IsManaged : False -IsRegisteredWithAU : False -IssueDate : 01-Jan-01 12:00:00 AM -OffersWindowsUpdates : False -RedirectUrls : System.__ComObject -ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289 -IsScanPackageService : False -CanRegisterWithAU : True -ServiceUrl : https://fe3.delivery.mp.microsoft.com/ -SetupPrefix : ws -IsDefaultAUService : False - -Name : Windows Server Update Service -ContentValidationCert : {} -ExpirationDate : 18-Jun-54 9:21:00 PM -IsManaged : True -IsRegisteredWithAU : True -IssueDate : 01-Jan-03 12:00:00 AM -OffersWindowsUpdates : True -RedirectUrls : System.__ComObject -ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7 -IsScanPackageService : False -CanRegisterWithAU : True -ServiceUrl : -SetupPrefix : -IsDefaultAUService : True - -Name : Windows Update -ContentValidationCert : {} -ExpirationDate : -IsManaged : False -IsRegisteredWithAU : False -IssueDate : 01-Jan-01 12:00:00 AM -OffersWindowsUpdates : True -RedirectUrls : System.__ComObject -ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77 -IsScanPackageService : False -CanRegisterWithAU : True -ServiceUrl : https://fe2.update.microsoft.com/v6/ -SetupPrefix : wu -IsDefaultAUService : False -``` + Name : Windows Server Update Service + ContentValidationCert : {} + ExpirationDate : 18-Jun-54 9:21:00 PM + IsManaged : True + IsRegisteredWithAU : True + IssueDate : 01-Jan-03 12:00:00 AM + OffersWindowsUpdates : True + RedirectUrls : System.__ComObject + ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7 + IsScanPackageService : False + CanRegisterWithAU : True + ServiceUrl : + SetupPrefix : + IsDefaultAUService : True + Name : Windows Update + ContentValidationCert : {} + ExpirationDate : + IsManaged : False + IsRegisteredWithAU : False + IssueDate : 01-Jan-01 12:00:00 AM + OffersWindowsUpdates : True + RedirectUrls : System.__ComObject + ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77 + IsScanPackageService : False + CanRegisterWithAU : True + ServiceUrl : https://fe2.update.microsoft.com/v6/ + SetupPrefix : wu + IsDefaultAUService : False + ``` 4. Check the category **Name** and **OffersWindowsUpdates**:  -Name: **Microsoft Update** + Name: **Microsoft Update** -Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox. + Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox. -OffersWindowsUpdates: **True** + OffersWindowsUpdates: **True** -Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) + Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) ---- + --- -Name: **DCat Flighting Prod** + Name: **DCat Flighting Prod** -The update source is the Windows Insider Program. + The update source is the Windows Insider Program. -OffersWindowsUpdates: **False** + OffersWindowsUpdates: **False** -Indicates that the client will not receive or is not configured to receive these updates. + Indicates that the client will not receive or is not configured to receive these updates. ---- + --- -Name: **Windows Store (DCat Prod)** + Name: **Windows Store (DCat Prod)** -The update source is Insider Updates for Store Apps. + The update source is Insider Updates for Store Apps. -OffersWindowsUpdates: **False** + OffersWindowsUpdates: **False** -Indicates that the client will not receive or is not configured to receive these updates. + Indicates that the client will not receive or is not configured to receive these updates. ---- + --- -Name: **Windows Server Update Service** + Name: **Windows Server Update Service** -The source is a Windows Server Updates Services server. + The source is a Windows Server Updates Services server. -OffersWindowsUpdates: **True** + OffersWindowsUpdates: **True** -The client is configured to receive updates from WSUS + The client is configured to receive updates from WSUS ---- + --- -Name: **Windows Update** + Name: **Windows Update** -The source is Windows Update. + The source is Windows Update. -OffersWindowsUpdates: **True** + OffersWindowsUpdates: **True** -The client is configured to receive updates from Windows Update Online + The client is configured to receive updates from Windows Update Online ---- + --- +    See also: From 1ce86f7f963e5519eb291a95fc94dff362f83db6 Mon Sep 17 00:00:00 2001 From: Adam Wilson Date: Wed, 4 Apr 2018 16:09:46 -0700 Subject: [PATCH 06/20] Update Cortana Policy Page There was some confusion about how to enable SafeSearch without using Search/SafeSearchPermissions. Added extra detail for clarity. --- .../cortana-at-work/cortana-at-work-policy-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/cortana-at-work/cortana-at-work-policy-settings.md b/windows/configuration/cortana-at-work/cortana-at-work-policy-settings.md index f411b5bc5e..7e48ef64a7 100644 --- a/windows/configuration/cortana-at-work/cortana-at-work-policy-settings.md +++ b/windows/configuration/cortana-at-work/cortana-at-work-policy-settings.md @@ -26,7 +26,7 @@ ms.date: 10/05/2017 |None|System/AllowLocation|Specifies whether to allow app access to the Location service.

**In Windows 10, version 1511**
Cortana won’t work if this setting is turned off (disabled).

**In Windows 10, version 1607 and later**
Cortana still works if this setting is turned off (disabled).| |None|Accounts/AllowMicrosoftAccountConnection|Specifies whether to allow employees to sign in using a Microsoft account (MSA) from Windows apps.

Use this setting if you only want to support Azure AD in your organization.| |Computer Configuration\Administrative Templates\Windows Components\Search\Allow search and Cortana to use location|Search/AllowSearchToUseLocation|Specifies whether Cortana can use your current location during searches and for location reminders.| -|Computer Configuration\Administrative Templates\Windows Components\Search\Set the SafeSearch setting for Search|Search/SafeSearchPermissions|Specifies what level of safe search (filtering adult content) is required.

**Note**
This setting only applies to Windows 10 Mobile.| +|Computer Configuration\Administrative Templates\Windows Components\Search\Set the SafeSearch setting for Search|Search/SafeSearchPermissions|Specifies what level of safe search (filtering adult content) is required.

**Note**
This setting only applies to Windows 10 Mobile. Other versions of Windows should use Don't search the web or display web results. | |User Configuration\Administrative Templates\Windows Components\File Explorer\Turn off display of recent search entries in the File Explorer search box|None|Specifies whether the search box can suggest recent queries and prevent entries from being stored in the registry for future reference.| |Computer Configuration\Administrative Templates\Windows Components\Search\Don't search the web or display web results|None|Specifies whether search can perform queries on the web and if the web results are displayed in search.

**In Windows 10 Pro edition**
This setting can’t be managed.

**In Windows 10 Enterprise edition**
Cortana won't work if this setting is turned off (disabled).| |Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana|Experience/AllowCortana|Specifies whether employees can use Cortana.

**Important**
Cortana won’t work if this setting is turned off (disabled). However, employees can still perform local searches even with Cortana turned off.| From 4f0fd0da495a87f42610d114ad1bc881eee2cd59 Mon Sep 17 00:00:00 2001 From: Adam Wilson Date: Wed, 4 Apr 2018 16:15:52 -0700 Subject: [PATCH 07/20] Clarify SafeSearch Options There was some confusion over the safe search options for desktop users. Added a note on what they should use. --- windows/client-management/mdm/policy-csp-search.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index dfdf82afa1..12b9c8386e 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -834,7 +834,7 @@ The following list shows the supported values: > [!NOTE] -> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. +> This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. Desktop users should use Search/DoNotUseWebResults. Specifies what level of safe search (filtering adult content) is required. From fd24a1aa206608e3b87464126a0231e5bdbde3b7 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 5 Apr 2018 10:23:41 -0700 Subject: [PATCH 08/20] rearranged as table --- .../update/windows-update-sources.md | 141 ++---------------- 1 file changed, 10 insertions(+), 131 deletions(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index 5019699f81..351417d13b 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -7,7 +7,7 @@ ms.sitesec: library author: kaushika-msft ms.localizationpriority: high ms.author: kaushika -ms.date: 04/03/2018 +ms.date: 04/05/2018 --- # Determining the Windows Update Service source @@ -16,138 +16,17 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 1. Start Windows PowerShell as an administrator 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. -3. Run `\$MUSM.Services`. The resulting output should be similar to the following: - - ``` - Name : Microsoft Update - ContentValidationCert : {} - ExpirationDate : - IsManaged : False - IsRegisteredWithAU : True - IssueDate : 01-Jan-01 12:00:00 AM - OffersWindowsUpdates : True - RedirectUrls : System.__ComObject - ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d - IsScanPackageService : False - CanRegisterWithAU : True - ServiceUrl : https://fe2.update.microsoft.com/v6/ - SetupPrefix : mu - IsDefaultAUService : False +3. Run `\$MUSM.Services`. Compare the resulting output to this table: - Name : DCat Flighting Prod - ContentValidationCert : {} - ExpirationDate : - IsManaged : False - IsRegisteredWithAU : False - IssueDate : 01-Jan-01 12:00:00 AM - OffersWindowsUpdates : False - RedirectUrls : System.__ComObject - ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552 - IsScanPackageService : False - CanRegisterWithAU : False - ServiceUrl : https://fe3.delivery.mp.microsoft.com/ - SetupPrefix : wu - IsDefaultAUService : False +| Output | Interpretation | +|-----------------------------------------------|-----------------------------------| +| Name : Microsoft Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : True
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : mu
IsDefaultAUService : False | - Name: **Microsoft Update** Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox.
- OffersWindowsUpdates: **True** Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.)| +| Name : Microsoft Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : True
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : mu
IsDefaultAUService : False |- Name: **DCat Flighting Prod** The update source is the Windows Insider Program.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates.| +|Name : DCat Flighting Prod
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : False
RedirectUrls : System.__ComObject
ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552
IsScanPackageService : False
CanRegisterWithAU : False
ServiceUrl: https://fe3.delivery.mp.microsoft.com/
SetupPrefix : wu
IsDefaultAUService : False | - Name: **DCat Flighting Prod** The update source is the Windows Insider Program.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates. | +|Name : Windows Store (DCat Prod)
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : False
RedirectUrls : System.__ComObject
ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe3.delivery.mp.microsoft.com/
SetupPrefix : ws
IsDefaultAUService : False | - Name: **Windows Store (DCat Prod)** The update source is Insider Updates for Store Apps.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates. | +| Name : Windows Server Update Service
ContentValidationCert : {}
ExpirationDate : 18-Jun-54 9:21:00 PM
IsManaged : True
IsRegisteredWithAU : True
IssueDate : 01-Jan-03 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl :
SetupPrefix :
IsDefaultAUService : True|- Name: **Windows Server Update Service** The source is a Windows Server Updates Services server.
- OffersWindowsUpdates: **True** The client is configured to receive updates from WSUS | +| Name : Windows Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : wu
IsDefaultAUService : False |- Name: **Windows Update** The source is Windows Update.
- OffersWindowsUpdates: **True** The client is configured to receive updates from Windows Update Online | - Name : Windows Store (DCat Prod) - ContentValidationCert : {} - ExpirationDate : - IsManaged : False - IsRegisteredWithAU : False - IssueDate : 01-Jan-01 12:00:00 AM - OffersWindowsUpdates : False - RedirectUrls : System.__ComObject - ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289 - IsScanPackageService : False - CanRegisterWithAU : True - ServiceUrl : https://fe3.delivery.mp.microsoft.com/ - SetupPrefix : ws - IsDefaultAUService : False - - Name : Windows Server Update Service - ContentValidationCert : {} - ExpirationDate : 18-Jun-54 9:21:00 PM - IsManaged : True - IsRegisteredWithAU : True - IssueDate : 01-Jan-03 12:00:00 AM - OffersWindowsUpdates : True - RedirectUrls : System.__ComObject - ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7 - IsScanPackageService : False - CanRegisterWithAU : True - ServiceUrl : - SetupPrefix : - IsDefaultAUService : True - - Name : Windows Update - ContentValidationCert : {} - ExpirationDate : - IsManaged : False - IsRegisteredWithAU : False - IssueDate : 01-Jan-01 12:00:00 AM - OffersWindowsUpdates : True - RedirectUrls : System.__ComObject - ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77 - IsScanPackageService : False - CanRegisterWithAU : True - ServiceUrl : https://fe2.update.microsoft.com/v6/ - SetupPrefix : wu - IsDefaultAUService : False - ``` - -4. Check the category **Name** and **OffersWindowsUpdates**:  - - Name: **Microsoft Update** - - Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox. - - OffersWindowsUpdates: **True** - - Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) - - --- - - Name: **DCat Flighting Prod** - - The update source is the Windows Insider Program. - - OffersWindowsUpdates: **False** - - Indicates that the client will not receive or is not configured to receive these updates. - - --- - - Name: **Windows Store (DCat Prod)** - - The update source is Insider Updates for Store Apps. - - OffersWindowsUpdates: **False** - - Indicates that the client will not receive or is not configured to receive these updates. - - --- - - Name: **Windows Server Update Service** - - The source is a Windows Server Updates Services server. - - OffersWindowsUpdates: **True** - - The client is configured to receive updates from WSUS - - --- - - Name: **Windows Update** - - The source is Windows Update. - - OffersWindowsUpdates: **True** - - The client is configured to receive updates from Windows Update Online - - --- -  -  See also: From 93ac10dd15eb2c8dff05a7ec8d50a8319f54e81a Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 5 Apr 2018 11:27:54 -0700 Subject: [PATCH 09/20] trying a different layout --- .../update/windows-update-sources.md | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index 351417d13b..490b2664d9 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -6,7 +6,7 @@ ms.mktglfcycl: ms.sitesec: library author: kaushika-msft ms.localizationpriority: high -ms.author: kaushika +ms.author: jaimeo ms.date: 04/05/2018 --- @@ -16,16 +16,16 @@ Windows 10 devices can receive updates from a variety of sources, including Wind 1. Start Windows PowerShell as an administrator 2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`. -3. Run `\$MUSM.Services`. Compare the resulting output to this table: +3. Run `\$MUSM.Services`. Check the resulting output for the **Name** and **OffersWindowsUPdates** parameters, which you can intepret according to this table: + +| Output | Interpretation | +|-----------------------------------------------------|-----------------------------------| +| - Name: **Microsoft Update**
-OffersWindowsUpdates: **True** | - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.
- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.)| +|- Name: **DCat Flighting Prod**
- OffersWindowsUpdates: **False**|- The update source is the Windows Insider Program.
- Indicates that the client will not receive or is not configured to receive these updates. | +| - Name: **Windows Store (DCat Prod)**
- OffersWindowsUpdates: **False** |-The update source is Insider Updates for Store Apps.
- Indicates that the client will not receive or is not configured to receive these updates.| +|- Name: **Windows Server Update Service**
- OffersWindowsUpdates: **True** |- The source is a Windows Server Updates Services server.
- The client is configured to receive updates from WSUS.| +|- Name: **Windows Update**
- OffersWindowsUpdates: **True** |- The source is Windows Update.
- The client is configured to receive updates from Windows Update Online.| -| Output | Interpretation | -|-----------------------------------------------|-----------------------------------| -| Name : Microsoft Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : True
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : mu
IsDefaultAUService : False | - Name: **Microsoft Update** Indicates the source against which we will are checking the Client capability. Microsoft Updates indicates, updates for other Microsoft Products checkbox.
- OffersWindowsUpdates: **True** Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.)| -| Name : Microsoft Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : True
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 7971f918-a847-4430-9279-4a52d1efe18d
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : mu
IsDefaultAUService : False |- Name: **DCat Flighting Prod** The update source is the Windows Insider Program.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates.| -|Name : DCat Flighting Prod
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : False
RedirectUrls : System.__ComObject
ServiceID : 8b24b027-1dee-babb-9a95-3517dfb9c552
IsScanPackageService : False
CanRegisterWithAU : False
ServiceUrl: https://fe3.delivery.mp.microsoft.com/
SetupPrefix : wu
IsDefaultAUService : False | - Name: **DCat Flighting Prod** The update source is the Windows Insider Program.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates. | -|Name : Windows Store (DCat Prod)
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : False
RedirectUrls : System.__ComObject
ServiceID : 855e8a7c-ecb4-4ca3-b045-1dfa50104289
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe3.delivery.mp.microsoft.com/
SetupPrefix : ws
IsDefaultAUService : False | - Name: **Windows Store (DCat Prod)** The update source is Insider Updates for Store Apps.
- OffersWindowsUpdates: **False** Indicates that the client will not receive or is not configured to receive these updates. | -| Name : Windows Server Update Service
ContentValidationCert : {}
ExpirationDate : 18-Jun-54 9:21:00 PM
IsManaged : True
IsRegisteredWithAU : True
IssueDate : 01-Jan-03 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 3da21691-e39d-4da6-8a4b-b43877bcb1b7
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl :
SetupPrefix :
IsDefaultAUService : True|- Name: **Windows Server Update Service** The source is a Windows Server Updates Services server.
- OffersWindowsUpdates: **True** The client is configured to receive updates from WSUS | -| Name : Windows Update
ContentValidationCert : {}
ExpirationDate :
IsManaged : False
IsRegisteredWithAU : False
IssueDate : 01-Jan-01 12:00:00 AM
OffersWindowsUpdates : True
RedirectUrls : System.__ComObject
ServiceID : 9482f4b4-e343-43b6-b170-9a65bc822c77
IsScanPackageService : False
CanRegisterWithAU : True
ServiceUrl : https://fe2.update.microsoft.com/v6/
SetupPrefix : wu
IsDefaultAUService : False |- Name: **Windows Update** The source is Windows Update.
- OffersWindowsUpdates: **True** The client is configured to receive updates from Windows Update Online | See also: From d0801522fdea7557c3792d5728e9ac49703a1533 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 5 Apr 2018 12:31:58 -0700 Subject: [PATCH 10/20] tweak to title; wired into TOC --- windows/deployment/TOC.md | 1 + windows/deployment/update/windows-update-sources.md | 4 ++-- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/deployment/TOC.md b/windows/deployment/TOC.md index 94f70ce62d..3c88941d73 100644 --- a/windows/deployment/TOC.md +++ b/windows/deployment/TOC.md @@ -230,6 +230,7 @@ ### [Deploy Windows 10 updates using System Center Configuration Manager](update/waas-manage-updates-configuration-manager.md) ### [Manage device restarts after updates](update/waas-restart.md) ### [Manage additional Windows Update settings](update/waas-wu-settings.md) +### [Determining the source of Windows updates](update/windows-update-sources.md) ### [Windows Insider Program for Business](update/waas-windows-insider-for-business.md) #### [Introduction to the Windows Insider Program for Business](update/WIP4Biz-intro.md) #### [Windows Insider Program for Business Frequently Asked Questions](update/waas-windows-insider-for-business-faq.md) diff --git a/windows/deployment/update/windows-update-sources.md b/windows/deployment/update/windows-update-sources.md index 490b2664d9..c9b0be52ce 100644 --- a/windows/deployment/update/windows-update-sources.md +++ b/windows/deployment/update/windows-update-sources.md @@ -1,5 +1,5 @@ --- -title: Determining the Windows Update Service source +title: Determining the source of Windows updates description: Determine the source that Windows Update service is currently using. ms.prod: w10 ms.mktglfcycl: @@ -10,7 +10,7 @@ ms.author: jaimeo ms.date: 04/05/2018 --- -# Determining the Windows Update Service source +# Determining the source of Windows updates Windows 10 devices can receive updates from a variety of sources, including Windows Update online, a Windows Server Update Services server, and others. To determine the source of Windows Updates currently being used on a device, follow these steps:  From 971c875ff86fafbf37ec84e64de9b2b73a8a934d Mon Sep 17 00:00:00 2001 From: Patti Short Date: Thu, 5 Apr 2018 18:37:30 -0700 Subject: [PATCH 11/20] Updated the voice and tone, plus deleted duplicate content --- browsers/edge/available-policies.md | 66 ++++++++++++++++++----------- 1 file changed, 41 insertions(+), 25 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 65193cad8d..bedff7e283 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -8,7 +8,7 @@ ms.mktglfcycl: explore ms.sitesec: library title: Group Policy and Mobile Device Management settings for Microsoft Edge (Microsoft Edge for IT Pros) ms.localizationpriority: high -ms.date: 09/13/2017 #Previsou release date +ms.date: 4/5/2018 #Previsou release date 09/13/2017 --- # Group Policy and Mobile Device Management (MDM) settings for Microsoft Edge @@ -34,8 +34,9 @@ Microsoft Edge works with these Group Policy settings (`Computer Configuration\A ## Allow Address bar drop-down list suggestions >*Supporteded versions: Windows 10, version 1703 or later* +The Address bar drop-down list, when enabled, allows the Address bar drop-down functionality in Microsoft Edge. By default, this policy is enabled. If disabled, you do not see the address bar drop-down functionality and disables the user-defined policy "Show search and site suggestions as I type." Therefore, because search suggestions are shown in the drop-down, this policy takes precedence over the [Configure search suggestions in Address bar](https://review.docs.microsoft.com/en-us/microsoft-edge/deploy/available-policies?branch=pashort_edge-backlog_vsts15846461#configure-search-suggestions-in-address-bar) or [AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) policy. -This policy settings specifies whether to allow the address bar drop-down functionality in Microsoft Edge. By default, this setting is enabled. We recommend that you disable this setting if you want to minimize network connections from Microsoft Edge to Microsoft services. If disabled, you do not see the address bar drop-down functionality and also disables the user-defined settting "Show search and site suggestions as I type." Therefore, because search suggestions are shown in the drop-down, this setting takes precedence over the [Configure search suggestions in Address bar](https://review.docs.microsoft.com/en-us/microsoft-edge/deploy/available-policies?branch=pashort_edge-backlog_vsts15846461#configure-search-suggestions-in-address-bar) or [AllowSearchSuggestionsinAddressBar](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowsearchsuggestionsinaddressbar) setting. +If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend that you disable this policy. **Microsoft Intune to manage your MDM settings** | | | @@ -44,31 +45,30 @@ This policy settings specifies whether to allow the address bar drop-down functi |Supported devices |Desktop | |URI full path | ./Vendor/MSFT/Policy/Config/Browser/AllowAddressBarDropdown | |Data type | Integer | -|Allowed values |

  • **0** - Not Allowed. Address bar drop-down is disabled, which also disables the user-defined setting, "Show search and site suggestions as I type."
  • **1 (default)** - Allowed. Address bar drop-down is enabled.
| +|Allowed values |
  • **0** - Not Allowed. Address bar drop-down is disabled, which also disables the user-defined policy, "Show search and site suggestions as I type."
  • **1 (default)** - Allowed. Address bar drop-down is enabled.
| ## Allow Adobe Flash >*Supporteded version: Windows 10* - -This policy setting specifies whether Adobe Flash can run in Microsoft Edge. By default, this setting is enabled or not configured, which allows you to use Adobe Flash. +Adobe Flash is integrated with Microsoft Edge and is updated via Windows Update. By default, this policy is enabled or not configured allowing you to use Adobe Flash Player in Microsoft Edge. **Microsoft Intune to manage your MDM settings** | | | |---|---| |MDM name |[AllowFlash](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-allowflash) | |Supported devices |Desktop | -|URI full path | ./Vendor/MSFT/Policy/Config/Browser/AllowAutofill | +|URI full path | ./Vendor/MSFT/Policy/Config/Browser/AllowAdobeFlash | |Data type | Integer | -|Allowed values |
  • **0** - Adobe Flash cannot be used Microsoft Edge.
  • **1 (default)** - Adobe Flash can be used Microsoft Edge.
| +|Allowed values |
  • **0** - Adobe Flash cannot be used Microsoft Edge.
  • **1 (default)** - Adobe Flash can be used in Microsoft Edge.
| ## Allow clearing browsing data on exit >*Supporteded versions: Windows 10, version 1703* +Your browsing data is the information that Microsoft Edge remembers and stores as you browse websites. Browsing data includes information you entered into forms, passwords, and the websites you visited. By default, this policy is disabled or not configured, the browsing data is not cleared when exiting. When this policy is disabled or not configured, you can turn on and configure the Clear browsing data option under Settings. -This policy setting specifies whether to clear browsing data on exiting Microsoft Edge. By default, this setting is disabled or not configured, which means you can turn on and configure Clear browsing data option under Settings. If enabled, browsing history on exit is turned on. -**Microsoft Intune to manage your MDM settings** +**Microsoft Intune to manage your MDM settings** | | | |---|---| |MDM name |[ClearBrowsingDataOnExit](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-clearbrowsingdataonexit) | @@ -80,7 +80,7 @@ This policy setting specifies whether to clear browsing data on exiting Microsof ## Allow configuration updates for the Books Library >*Supporteded versions: Windows 10* -This policy setting specifies whether Microsoft Edge can automatically update the configuration data for the Books Library. By default, this setting is enabled, which means Microsoft Edge retrieves configuration data for the Books Library. If disabled, Microsoft Edge does not retrieve configuration data. +Microsoft Edge automatically retrieves the configuration data for the Books Library, when this policy is enabled or not configured. If disabled, Microsoft Edge does not retrieve the Books configuration data. **Microsoft Intune to manage your MDM settings** | | | @@ -95,7 +95,7 @@ This policy setting specifies whether Microsoft Edge can automatically update th ## Allow Cortana >*Supported versions: Windows 10, version 1607 or later* -This policy setting specifies whether Cortana is allowed on the device. By default, this setting is enabled (allowed), which allows you to use Cortana on your devices. If disabled (not allowed), Cortana is not available for use, but you can use search to find items on your device. +Cortana is integrated with Microsoft Edge, and when enabled, Cortana allows you use the voice assistant on your device. If disabled, Cortana is not available for use, but you can search to find items on your device. **Microsoft Intune to manage your MDM settings** | | | @@ -103,14 +103,14 @@ This policy setting specifies whether Cortana is allowed on the device. By defau |MDM name |[AllowCortana](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-experience#experience-allowcortana) | |Supported devices |Mobile | |URI full path |./Vendor/MSFT/Policy/Config/Browser/AllowCortana | -|Location |Computer Configuration\Administrative Templates\Windows Components\Search\Allow Cortana | +|Location |Computer Configuration\Administrative Templates\Windows Components\Search\AllowCortana | |Data type | Integer | |Allowed values |
  • **0** - Not allowed.
  • **1 (default)** - Allowed.
| ## Allow Developer Tools >*Supporteded versions: Windows 10, version 1511 or later* -This policy setting specifies whether you can use the F12 Developer Tools on Microsoft Edge. By default, this setting is enabled making the F12 Developer Tools availabe to use. If disabled, the F12 Developer Tools are not available. +F12 developer tools is a suite of tools to help you build and debug your webpage. By default, this policy is enabled making the F12 Developer Tools availabe to use. **Microsoft Intune to manage your MDM settings** | | | @@ -119,12 +119,12 @@ This policy setting specifies whether you can use the F12 Developer Tools on Mic |Supported devices |Desktop | |URI full path |./Vendor/MSFT/Policy/Config/Browser/AllowDeveloperTools | |Data type | Integer | -|Allowed values |
  • **0** - Employees cannot use the F12 Developer Tools./li>
  • **1 (default)** - Employees can use the F12 Developer Tools.
| +|Allowed values |
  • **0** - The F12 Developer Tools are disabled.
  • **1 (default)** - The F12 Developer Tools are enabled.
| ## Allow extended telemetry for the Books tab >*Supporteded versions: Windows 10* -This policy setting allows you to specify how much data to send to Microsoft about the books you are reading from the Books tab in Microsoft Edge. By default, this setting is disabled or not configured, which means Microsoft Edge only sends basic diagnostic data, depending on your device configuration. If enabled, Microsoft Edge sends additional diagnostic data in addition to the basic diagnostic data, from the Books tab. +If you enable this policy, both basic and additional diagnostic data is sent to Microsoft about the books you are reading from Books in Microsoft Edge. By default, this policy is disabled or not configured and only basic diagnostic data, depending on your device configuration, is sent to Microsoft. **Microsoft Intune to manage your MDM settings** | | | @@ -133,12 +133,12 @@ This policy setting allows you to specify how much data to send to Microsoft abo |Supported devices |Desktop
Mobile | |URI full path | ./Vendor/MSFT/Policy/Config/Browser/EnableExtendedBooksTelemetry | |Data type | Integer | -|Allowed values |
  • **0 (default)** - Disable. No additional diagnostic data.
  • **1** - Enable. Additional diagnostic data for schools.
| +|Allowed values |
  • **0 (default)** - Disable. Only basic diagnostic data is sent.
  • **1** - Enable. Both Basic and additional diagnostic data is sent.
| ## Allow Extensions >*Supporteded versions: Windows 10, version 1607 or later* -This policy setting specifies whether you can use Edge Extensions. By default, this setting is enabled allowing you to use extensions. If disabled, you cannot use extensions. +If you enable this policy, you can personalize and add new features to Microsoft Edge with extensions. By default, this policy is enabled. If you want to prevent others from installing unwanted extensions, disable this policy. **Microsoft Intune to manage your MDM settings** | | | @@ -147,12 +147,12 @@ This policy setting specifies whether you can use Edge Extensions. By default, |Supported devices |Desktop | |URI full path |./Vendor/MSFT/Policy/Config/Browser/AllowExtensions | |Data type | Integer | -|Allowed values |
  • **0** - Employees cannot use Edge Extensions.
  • **1 (default)** - Employees can use Edge Extensions.
| +|Allowed values |
  • **0** - Microsoft Edge extensions are disabled.
  • **1 (default)** - Microsoft Edge Extensions are enabled.
| ## Allow InPrivate browsing >*Supporteded versions: Windows 10, version 1511 or later* -This policy setting specifies whether InPrivate browsing is allowed on corporate networks. By default, this setting is enabled allowing you to use InPrivate website browsing. If disabled, you cannot use InPrivate website browsing. +InPrivate browsing, when enabled, prevents your browsing data is not saved on your device. Microsoft Edge deletes temporary data from your device after all your InPrivate tabs are closed. **Microsoft Intune to manage your MDM settings** | | | @@ -161,12 +161,13 @@ This policy setting specifies whether InPrivate browsing is allowed on corporate |Supported devices |Desktop
Mobile | |URI full path |./Vendor/MSFT/Policy/Config/Browser/AllowInPrivate | |Data type | Integer | -|Allowed values |
  • **0** - Employees cannot use InPrivate browsing.
  • **1 (default)** - Employees can use InPrivate browsing.
| +|Allowed values |
  • **0** - InPrivate browsing is disabled.
  • **1 (default)** - InPrivate browsing is enabled.
| ## Allow Microsoft Compatibility List >*Supporteded versions: Windows 10, version 1703 or later* -This policy setting specifies whether to use the Microsoft compatibility list in Microsoft Edge. The list helps websites with known compatibility issues to display properly. By default, the Microsoft compatibility list is enabled and used during browser navigation. The list can be viewed by visiting "about:compat". By default, this setting is enabled allowing periodic downloads and installation of updates. Visiting any site on the Microsoft Compatibility List prompts the employee to use Internet Explorer 11, where the site renders as though it is in whatever version of IE is necessary for it to appear properly. If disabled, the compatibility list is not used. +Microsoft Edge uses the compatibility list that helps websites with known compatibility issues display properly. When enabled, Microsoft Edge checks the list to determine if the website has compatibility issues during browser navigation. By default, this policy is enabled allowing periodic downloads and installation of updates. Visiting any site on the Microsoft compatibility list prompts the employee to use Internet Explorer 11, where the site renders as though it is in whatever version of IE is necessary for it to appear properly. If disabled, the compatibility list is not used. + **Microsoft Intune to manage your MDM settings** | | | @@ -175,7 +176,7 @@ This policy setting specifies whether to use the Microsoft compatibility list in |Supported devices |Desktop
Mobile | |URI full path |./Vendor/MSFT/Policy/Config/Browser/AllowMicrosoftCompatibilityList | |Data type | Integer | -|Allowed values |
  • **0** - Additional search engines are not allowed and the default cannot be changed in the Address bar.
  • **1 (default)** - Additional search engines are allowed and the default can be changed in the Address bar.
| +|Allowed values |
  • **0** - Disabled. The Microsoft compatibility list is ignored.
  • **1 (default)** - Enabled. The Microsoft compatibility list is periodically update and used during browser navigation.
| ## Allow search engine customization >*Supported versions: Windows 10, version 1703 or later* @@ -298,6 +299,15 @@ You can export a set of favorites from Edge and use that html file for provision |URI full path |./Vendor/MSFT/Policy/Config/Browser/ProvisionFavorites | |Data type | String | + + ## Configure Password Manager >*Supported versions: Windows 10* @@ -498,9 +508,15 @@ This policy setting specifies whether you can add, import, sort, or edit the Fav >[!Important] >Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops you from syncing their favorites between Internet Explorer and Microsoft Edge. - + +**Microsoft Intune to manage your MDM settings** +| | | +|---|---| +|MDM name |[LockdownFavorites](https://docs.microsoft.com/en-us/windows/client-management/mdm/policy-csp-browser#browser-lockdownfavorites) | +|Supported devices |Desktop
Mobile | +|URI full path |./Vendor/MSFT/Policy/Config/Browser/LockdownFavorites | +|Data type | Integer | +|Allowed values |
  • **0 (default)** - Disabled. Do not lockdown Favorites.
  • **1** - Enabled. Lockdown Favorites.
| ## Prevent Microsoft Edge from gathering Live Tile information when pinning a site to Start >*Supported versions: Windows 10, version 1703 or later* From 96e90d2f9f791aa5da738c8e896c9819ac2b7cd3 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 6 Apr 2018 06:11:38 -0700 Subject: [PATCH 12/20] Updated the voice and tone, plus deleted duplicate content --- browsers/edge/available-policies.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index bedff7e283..3b66180dfe 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -274,6 +274,7 @@ This policy setting specifies whether Do Not Track requests to websites is allow |Data type | Integer | |Allowed values |
  • **0 (default)** - Stops you from sending Do Not Track headers to websites requesting tracking info.
  • **1** - Employees can send Do Not Track headers to websites requesting tracking info.
| + @@ -132,7 +133,7 @@ Added in Windows 10, version 1803. List of exceptions to the blocked website URL Added in Windows 10, version 1803. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to. > [!Note] -> This policy only applies to kiosk browser. +> This policy only applies to the Kiosk Browser app in Microsoft Store. @@ -179,7 +180,7 @@ Added in Windows 10, version 1803. List of blocked website URLs (with wildcard s Added in Windows 10, version 1803. Configures the default URL kiosk browsers to navigate on launch and restart. > [!Note] -> This policy only applies to kiosk browser. +> This policy only applies to the Kiosk Browser app in Microsoft Store. @@ -226,7 +227,7 @@ Added in Windows 10, version 1803. Configures the default URL kiosk browsers to Added in Windows 10, version 1803. Enable/disable kiosk browser's home button. > [!Note] -> This policy only applies to kiosk browser. +> This policy only applies to the Kiosk Browser app in Microsoft Store. @@ -273,7 +274,7 @@ Added in Windows 10, version 1803. Enable/disable kiosk browser's home button. Added in Windows 10, version 1803. Enable/disable kiosk browser's navigation buttons (forward/back). > [!Note] -> This policy only applies to kiosk browser. +> This policy only applies to the Kiosk Browser app in Microsoft Store. @@ -322,7 +323,7 @@ Added in Windows 10, version 1803. Amount of time in minutes the session is idle The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser. > [!Note] -> This policy only applies to kiosk browser. +> This policy only applies to the Kiosk Browser app in Microsoft Store. From 2be1473f345aa96c9d1e7911e51902091651413c Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 6 Apr 2018 22:17:35 +0000 Subject: [PATCH 18/20] Merged PR 7002: LocalPoliciesSecurityOptions in Policy CSP - added new policies --- ...policy-csp-localpoliciessecurityoptions.md | 513 +++++++++++++++++- 1 file changed, 512 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 327397bc54..34c61a2c31 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 03/16/2018 +ms.date: 04/06/2018 --- # Policy CSP - LocalPoliciesSecurityOptions @@ -51,6 +51,15 @@ ms.date: 03/16/2018
LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly
+
+ LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways +
+
+ LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible +
+
+ LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges +
LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked
@@ -117,6 +126,18 @@ ms.date: 03/16/2018
LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers
+
+ LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication +
+
+ LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic +
+
+ LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic +
+
+ LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers +
LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon
@@ -757,6 +778,220 @@ GP Info:
+ +**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Domain member: Digitally encrypt or sign secure channel data (always) + +This security setting determines whether all secure channel traffic initiated by the domain member must be signed or encrypted. + +When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass through authentication, LSA SID/name Lookup etc. + +This setting determines whether or not all secure channel traffic initiated by the domain member meets minimum security requirements. Specifically it determines whether all secure channel traffic initiated by the domain member must be signed or encrypted. If this policy is enabled, then the secure channel will not be established unless either signing or encryption of all secure channel traffic is negotiated. If this policy is disabled, then encryption and signing of all secure channel traffic is negotiated with the Domain Controller in which case the level of signing and encryption depends on the version of the Domain Controller and the settings of the following two policies: + +Domain member: Digitally encrypt secure channel data (when possible) +Domain member: Digitally sign secure channel data (when possible) + +Default: Enabled. + +Notes: + +If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic. +If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic. +Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not. + + + +GP Info: +- GP English name: *Domain member: Digitally encrypt or sign secure channel data (always)* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ + +**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Domain member: Digitally encrypt secure channel data (when possible) + +This security setting determines whether a domain member attempts to negotiate encryption for all secure channel traffic that it initiates. + +When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass-through authentication, LSA SID/name Lookup etc. + +This setting determines whether or not the domain member attempts to negotiate encryption for all secure channel traffic that it initiates. If enabled, the domain member will request encryption of all secure channel traffic. If the domain controller supports encryption of all secure channel traffic, then all secure channel traffic will be encrypted. Otherwise only logon information transmitted over the secure channel will be encrypted. If this setting is disabled, then the domain member will not attempt to negotiate secure channel encryption. + +Default: Enabled. + +Important + +There is no known reason for disabling this setting. Besides unnecessarily reducing the potential confidentiality level of the secure channel, disabling this setting may unnecessarily reduce secure channel throughput, because concurrent API calls that use the secure channel are only possible when the secure channel is signed or encrypted. + +Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains. + + + +GP Info: +- GP English name: *Domain member: Digitally encrypt secure channel data (when possible)* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ + +**LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Domain member: Disable machine account password changes + +Determines whether a domain member periodically changes its computer account password. If this setting is enabled, the domain member does not attempt to change its computer account password. If this setting is disabled, the domain member attempts to change its computer account password as specified by the setting for Domain Member: Maximum age for machine account password, which by default is every 30 days. + +Default: Disabled. + +Notes + +This security setting should not be enabled. Computer account passwords are used to establish secure channel communications between members and domain controllers and, within the domain, between the domain controllers themselves. Once it is established, the secure channel is used to transmit sensitive information that is necessary for making authentication and authorization decisions. +This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names. + + + +GP Info: +- GP English name: *Domain member: Disable machine account password changes* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ **LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** @@ -2122,6 +2357,282 @@ GP Info:
+ +**LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication + +This policy setting allows you to create an exception list of remote servers to which clients are allowed to use NTLM authentication if the "Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers" policy setting is configured. + +If you configure this policy setting, you can define a list of remote servers to which clients are allowed to use NTLM authentication. + +If you do not configure this policy setting, no exceptions will be applied. + +The naming format for servers on this exception list is the fully qualified domain name (FQDN) or NetBIOS server name used by the application, listed one per line. To ensure exceptions the name used by all applications needs to be in the list, and to ensure an exception is accurate, the server name should be listed in both naming formats . A single asterisk (*) can be used anywhere in the string as a wildcard character. + + + +GP Info: +- GP English name: *Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ + +**LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Network security: Restrict NTLM: Audit Incoming NTLM Traffic + +This policy setting allows you to audit incoming NTLM traffic. + +If you select "Disable", or do not configure this policy setting, the server will not log events for incoming NTLM traffic. + +If you select "Enable auditing for domain accounts", the server will log events for NTLM pass-through authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all domain accounts" option. + +If you select "Enable auditing for all accounts", the server will log events for all NTLM authentication requests that would be blocked when the "Network Security: Restrict NTLM: Incoming NTLM traffic" policy setting is set to the "Deny all accounts" option. + +This policy is supported on at least Windows 7 or Windows Server 2008 R2. + +Note: Audit events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. + + + +GP Info: +- GP English name: *Network security: Restrict NTLM: Audit Incoming NTLM Traffic* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ + +**LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Network security: Restrict NTLM: Incoming NTLM traffic + +This policy setting allows you to deny or allow incoming NTLM traffic. + +If you select "Allow all" or do not configure this policy setting, the server will allow all NTLM authentication requests. + +If you select "Deny all domain accounts," the server will deny NTLM authentication requests for domain logon and display an NTLM blocked error, but allow local account logon. + +If you select "Deny all accounts," the server will deny NTLM authentication requests from incoming traffic and display an NTLM blocked error. + +This policy is supported on at least Windows 7 or Windows Server 2008 R2. + +Note: Block events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. + + + +GP Info: +- GP English name: *Network security: Restrict NTLM: Incoming NTLM traffic* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ + +**LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers** + + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck mark4check mark4check mark4check mark4cross markcross mark
+ + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers + +This policy setting allows you to deny or audit outgoing NTLM traffic from this Windows 7 or this Windows Server 2008 R2 computer to any Windows remote server. + +If you select "Allow all" or do not configure this policy setting, the client computer can authenticate identities to a remote server by using NTLM authentication. + +If you select "Audit all," the client computer logs an event for each NTLM authentication request to a remote server. This allows you to identify those servers receiving NTLM authentication requests from the client computer. + +If you select "Deny all," the client computer cannot authenticate identities to a remote server by using NTLM authentication. You can use the "Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication" policy setting to define a list of remote servers to which clients are allowed to use NTLM authentication. + +This policy is supported on at least Windows 7 or Windows Server 2008 R2. + +Note: Audit and block events are recorded on this computer in the "Operational" Log located under the Applications and Services Log/Microsoft/Windows/NTLM. + + + +GP Info: +- GP English name: *Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers* +- GP path: *Windows Settings/Security Settings/Local Policies/Security Options* + + + + + + + + + + + + + +
+ **LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** From 71111f56371482fbf2800e6124082dd04bfcb219 Mon Sep 17 00:00:00 2001 From: Patti Short Date: Fri, 6 Apr 2018 15:51:23 -0700 Subject: [PATCH 19/20] removed the commented out content --- browsers/edge/available-policies.md | 681 +--------------------------- 1 file changed, 1 insertion(+), 680 deletions(-) diff --git a/browsers/edge/available-policies.md b/browsers/edge/available-policies.md index 3b66180dfe..3766535880 100644 --- a/browsers/edge/available-policies.md +++ b/browsers/edge/available-policies.md @@ -27,10 +27,6 @@ Microsoft Edge works with the following Group Policy settings to help you manage Computer Configuration\Administrative Templates\Windows Components\Microsoft Edge\ - - ## Allow Address bar drop-down list suggestions >*Supporteded versions: Windows 10, version 1703 or later* @@ -274,7 +270,7 @@ This policy setting specifies whether Do Not Track requests to websites is allow |Data type | Integer | |Allowed values |
  • **0 (default)** - Stops you from sending Do Not Track headers to websites requesting tracking info.
  • **1** - Employees can send Do Not Track headers to websites requesting tracking info.
| - ## Configure Password Manager >*Supported versions: Windows 10* @@ -623,674 +612,6 @@ This policy setting specifies whether organizations should use a folder shared a |Data type | Integer | |Allowed values |
  • **0** - No shared folder.
  • **1** - Use as shared folder.
| - ## Related topics * [Mobile Device Management (MDM) settings]( https://go.microsoft.com/fwlink/p/?LinkId=722885) From 4859b5fea340be9a2cd4a84d7d6b656582e9625d Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Mon, 9 Apr 2018 19:08:46 +0000 Subject: [PATCH 20/20] Merged PR 7035: Bluetooth/AllowPromptedProximalConnections in Policy CSP - new policy --- ...ew-in-windows-mdm-enrollment-management.md | 28 ++++++++- .../policy-configuration-service-provider.md | 3 + .../mdm/policy-csp-bluetooth.md | 63 ++++++++++++++++++- 3 files changed, 90 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index dc568d07df..31bc357659 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 03/23/2018 +ms.date: 04/06/2018 --- # What's new in MDM enrollment and management @@ -1149,6 +1149,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • ApplicationDefaults/EnableAppUriHandlers
  • ApplicationManagement/MSIAllowUserControlOverInstall
  • ApplicationManagement/MSIAlwaysInstallWithElevatedPrivileges
  • +
  • Bluetooth/AllowPromptedProximalConnections
  • Browser/AllowConfigurationUpdateForBooksLibrary
  • Browser/AlwaysEnableBooksLibrary
  • Browser/EnableExtendedBooksTelemetry
  • @@ -1176,7 +1177,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon
  • LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia
  • LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters
  • -
  • LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly
  • +
  • LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly
  • +
  • LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways
  • +
  • LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible
  • +
  • LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges
  • LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior
  • LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees
  • LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers
  • @@ -1190,7 +1194,11 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM
  • LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange
  • LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel
  • -
  • LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic
  • +
  • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers
  • LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile
  • LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems
  • LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation
  • @@ -1630,6 +1638,20 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • Settings/SaveFilesToHost
  • + +[Policy CSP](policy-configuration-service-provider.md) +

    Added the following new policies for Windows 10, version 1803:

    +
      +
    • Bluetooth/AllowPromptedProximalConnections
    • +
    • LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways
    • +
    • LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible
    • +
    • LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges
    • +
    • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication
    • +
    • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic
    • +
    • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic
    • +
    • LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers
    • +
    + diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 3abd56fb99..d108e8bfc0 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -399,6 +399,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    Bluetooth/AllowPrepairing
    +
    + Bluetooth/AllowPromptedProximalConnections +
    Bluetooth/LocalDeviceName
    diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 7c004110fe..0205e259b0 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -6,11 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 03/12/2018 +ms.date: 04/06/2018 --- # Policy CSP - Bluetooth +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
    @@ -28,6 +30,9 @@ ms.date: 03/12/2018
    Bluetooth/AllowPrepairing
    +
    + Bluetooth/AllowPromptedProximalConnections +
    Bluetooth/LocalDeviceName
    @@ -197,6 +202,62 @@ The following list shows the supported values:
    + +**Bluetooth/AllowPromptedProximalConnections** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark4check mark4check mark4cross markcross markcross mark
    + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
    + + + +Added in Windows 10, version 1803. This policy allows the IT admin to block users on these managed devices from using Quick Pair and other proximity based scenarios. + + + +The following list shows the supported values: + +- 0 - Disallow. Block users on these managed devices from using Quick Pair and other proximity based scenarios +- 1 - Allow. Allow users on these managed devices to use Quick Pair and other proximity based scenarios + + + + + + + + + + +
    + **Bluetooth/LocalDeviceName**