Merge branch 'master' into mcafee-migration
@ -1,6 +1,21 @@
|
|||||||
{:allowed-branchname-matches ["master"]
|
{:allowed-branchname-matches ["master"]
|
||||||
:allowed-filename-matches ["windows/"]
|
:allowed-filename-matches ["windows/"]
|
||||||
|
|
||||||
|
:targets
|
||||||
|
{
|
||||||
|
:counts {
|
||||||
|
;;:spelling 10
|
||||||
|
;;:grammar 3
|
||||||
|
;;:total 15 ;; absolute flag count but i don't know the difference between this and issues
|
||||||
|
;;:issues 15 ;; coming from the platform, will need to be tested.
|
||||||
|
}
|
||||||
|
:scores {
|
||||||
|
;;:terminology 100
|
||||||
|
:qualityscore 65 ;; Confirmed with Hugo that you just comment out the single score and leave the structure in place
|
||||||
|
;;:spelling 40
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
:guidance-profile "d2b6c2c8-00ee-47f1-8d10-b280cc3434c1" ;; Profile ID for "M365-specific"
|
:guidance-profile "d2b6c2c8-00ee-47f1-8d10-b280cc3434c1" ;; Profile ID for "M365-specific"
|
||||||
|
|
||||||
:acrolinx-check-settings
|
:acrolinx-check-settings
|
||||||
@ -12,7 +27,7 @@
|
|||||||
"TERMINOLOGY_VALID"
|
"TERMINOLOGY_VALID"
|
||||||
"VOICE_GUIDANCE"
|
"VOICE_GUIDANCE"
|
||||||
]
|
]
|
||||||
"termSetNames" ["M365"]
|
"termSetNames" ["M365" "Products" "Microsoft"]
|
||||||
}
|
}
|
||||||
|
|
||||||
:template-header
|
:template-header
|
||||||
@ -20,7 +35,15 @@
|
|||||||
"
|
"
|
||||||
## Acrolinx Scorecards
|
## Acrolinx Scorecards
|
||||||
|
|
||||||
**A minimum Acrolinx score of 20 is required.**
|
**The minimum Acrolinx topic score of 65 is required for all MARVEL content merged to the default branch.**
|
||||||
|
|
||||||
|
If you need a scoring exception for content in this PR, add the *Sign off* and the *Acrolinx exception* labels to the PR. The PubOps Team will review the exception request and may take one or more of the following actions:
|
||||||
|
|
||||||
|
- Work with you to resolve the issues requiring the exception.
|
||||||
|
- Escalate the exception request to the Acrolinx Review Team for review.
|
||||||
|
- Approve the exception and work with the GitHub Admin Team to merge the PR to the default branch.
|
||||||
|
|
||||||
|
For more information about the exception criteria and exception process, see [Minimum Acrolinx topic scores for publishing](https://review.docs.microsoft.com/en-us/office-authoring-guide/acrolinx-min-score?branch=master).
|
||||||
|
|
||||||
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
|
Click the scorecard links for each article to review the Acrolinx feedback on grammar, spelling, punctuation, writing style, and terminology:
|
||||||
|
|
||||||
@ -36,6 +59,6 @@ Click the scorecard links for each article to review the Acrolinx feedback on gr
|
|||||||
"
|
"
|
||||||
**More info about Acrolinx**
|
**More info about Acrolinx**
|
||||||
|
|
||||||
We have set the minimum score to 20. This is effectively *not* setting a minimum score. If you need to bypass this score, please contact MARVEL PubOps.
|
Use the Acrolinx extension, or sidebar, in Visual Studio Code to check spelling, grammar, style, tone, clarity, and key terminology when you're creating or updating content. For more information, see [Use the Visual Studio Code extension to run Acrolinx locally](https://review.docs.microsoft.com/en-us/office-authoring-guide/acrolinx-vscode?branch=master).
|
||||||
"
|
"
|
||||||
}
|
}
|
||||||
|
@ -8,7 +8,7 @@ ms.prod: w10
|
|||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: ManikaDhiman
|
author: ManikaDhiman
|
||||||
ms.reviewer: jsuther1974
|
ms.reviewer: jsuther1974
|
||||||
ms.date: 05/21/2019
|
ms.date: 09/10/2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# ApplicationControl CSP
|
# ApplicationControl CSP
|
||||||
@ -266,7 +266,7 @@ The following is an example of Delete command:
|
|||||||
|
|
||||||
## PowerShell and WMI Bridge Usage Guidance
|
## PowerShell and WMI Bridge Usage Guidance
|
||||||
|
|
||||||
The ApplicationControl CSP can also be managed locally from PowerShell or via SCCM's task sequence scripting by leveraging the [WMI Bridge Provider](https://docs.microsoft.com/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider).
|
The ApplicationControl CSP can also be managed locally from PowerShell or via Microsoft Endpoint Manager Configuration Manager's (MEMCM, formerly known as SCCM) task sequence scripting by leveraging the [WMI Bridge Provider](https://docs.microsoft.com/windows/client-management/mdm/using-powershell-scripting-with-the-wmi-bridge-provider).
|
||||||
|
|
||||||
### Setup for using the WMI Bridge
|
### Setup for using the WMI Bridge
|
||||||
|
|
||||||
|
@ -35,7 +35,7 @@ Defines restrictions for applications.
|
|||||||
> Delete/unenrollment is not properly supported unless Grouping values are unique across enrollments. If multiple enrollments use the same Grouping value, then unenrollment will not work as expected since there are duplicate URIs that get deleted by the resource manager. To prevent this problem, the Grouping value should include some randomness. The best practice is to use a randomly generated GUID. However, there is no requirement on the exact value of the node.
|
> Delete/unenrollment is not properly supported unless Grouping values are unique across enrollments. If multiple enrollments use the same Grouping value, then unenrollment will not work as expected since there are duplicate URIs that get deleted by the resource manager. To prevent this problem, the Grouping value should include some randomness. The best practice is to use a randomly generated GUID. However, there is no requirement on the exact value of the node.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Deploying policies via the AppLocker CSP will force a reboot during OOBE.
|
> The AppLocker CSP will schedule a reboot when a policy is applied or a deletion occurs using the AppLocker/ApplicationLaunchRestrictions/Grouping/CodeIntegrity/Policy URI.
|
||||||
|
|
||||||
Additional information:
|
Additional information:
|
||||||
|
|
||||||
@ -484,7 +484,7 @@ The following list shows the apps that may be included in the inbox.
|
|||||||
<td></td>
|
<td></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td>Colour profile</td>
|
<td>Color profile</td>
|
||||||
<td>b08997ca-60ab-4dce-b088-f92e9c7994f3</td>
|
<td>b08997ca-60ab-4dce-b088-f92e9c7994f3</td>
|
||||||
<td></td>
|
<td></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -58,6 +58,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
||||||
|
|
||||||
- **Change history in MDM documentation**
|
- **Change history in MDM documentation**
|
||||||
|
- [September 2020](#september-2020)
|
||||||
- [August 2020](#august-2020)
|
- [August 2020](#august-2020)
|
||||||
- [July 2020](#july-2020)
|
- [July 2020](#july-2020)
|
||||||
- [June 2020](#june-2020)
|
- [June 2020](#june-2020)
|
||||||
@ -438,9 +439,6 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia</li>
|
<li>LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia</li>
|
||||||
<li>LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters</li>
|
<li>LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters</li>
|
||||||
<li>LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</li>
|
<li>LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</li>
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior</li>
|
<li>LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior</li>
|
||||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees</li>
|
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees</li>
|
||||||
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers</li>
|
<li>LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers</li>
|
||||||
@ -458,7 +456,6 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</li>
|
||||||
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
||||||
<li>LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode</li>
|
||||||
<li>Notifications/DisallowCloudNotification</li>
|
<li>Notifications/DisallowCloudNotification</li>
|
||||||
@ -768,7 +765,6 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn</li>
|
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests</li>
|
||||||
<li>LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</li>
|
<li>LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators</li>
|
||||||
@ -1414,6 +1410,7 @@ Policy, Policy/Channels, Policy/Channels/ChannelName, Policy/Channels/ChannelNam
|
|||||||
<li>Update/ExcludeWUDriversInQualityUpdate</li>
|
<li>Update/ExcludeWUDriversInQualityUpdate</li>
|
||||||
<li>Update/PauseFeatureUpdates</li>
|
<li>Update/PauseFeatureUpdates</li>
|
||||||
<li>Update/PauseQualityUpdates</li>
|
<li>Update/PauseQualityUpdates</li>
|
||||||
|
<li>Update/SetProxyBehaviorForUpdateDetection</li>
|
||||||
<li>Update/UpdateServiceUrlAlternate (Added in the January service release of Windows 10, version 1607)</li>
|
<li>Update/UpdateServiceUrlAlternate (Added in the January service release of Windows 10, version 1607)</li>
|
||||||
<li>WindowsInkWorkspace/AllowWindowsInkWorkspace</li>
|
<li>WindowsInkWorkspace/AllowWindowsInkWorkspace</li>
|
||||||
<li>WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace</li>
|
<li>WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace</li>
|
||||||
@ -1996,6 +1993,11 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
|
|
||||||
## Change history in MDM documentation
|
## Change history in MDM documentation
|
||||||
|
|
||||||
|
### September 2020
|
||||||
|
|New or updated topic | Description|
|
||||||
|
|--- | ---|
|
||||||
|
|[Policy CSP - LocalPoliciesSecurityOptions](policy-csp-localpoliciessecurityoptions.md)|Removed the following unsupported LocalPoliciesSecurityOptions policy settings from the documentation:<br>- RecoveryConsole_AllowAutomaticAdministrativeLogon <br>- DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways<br>- DomainMember_DigitallyEncryptSecureChannelDataWhenPossible<br>- DomainMember_DisableMachineAccountPasswordChanges<br>- SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems<br>|
|
||||||
|
|
||||||
### August 2020
|
### August 2020
|
||||||
|New or updated topic | Description|
|
|New or updated topic | Description|
|
||||||
|--- | ---|
|
|--- | ---|
|
||||||
@ -2436,9 +2438,6 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<ul>
|
<ul>
|
||||||
<li>Bluetooth/AllowPromptedProximalConnections</li>
|
<li>Bluetooth/AllowPromptedProximalConnections</li>
|
||||||
<li>KioskBrowser/EnableEndSessionButton</li>
|
<li>KioskBrowser/EnableEndSessionButton</li>
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AddRemoteServerExceptionsForNTLMAuthentication</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_AuditIncomingNTLMTraffic</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_IncomingNTLMTraffic</li>
|
||||||
@ -2647,7 +2646,6 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers</li>
|
||||||
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
<li>LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</li>
|
||||||
<li>LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode</li>
|
||||||
<li>RestrictedGroups/ConfigureGroupMembership</li>
|
<li>RestrictedGroups/ConfigureGroupMembership</li>
|
||||||
@ -3018,7 +3016,6 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
|||||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn</li>
|
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn</li>
|
||||||
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn</li>
|
<li>LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn</li>
|
||||||
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests</li>
|
<li>LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests</li>
|
||||||
<li>LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon</li>
|
|
||||||
<li>LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</li>
|
<li>LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</li>
|
||||||
<li>LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators</li>
|
<li>LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators</li>
|
||||||
|
@ -2498,15 +2498,6 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly" id="localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly">LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly" id="localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly">LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways" id="localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible" id="localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges" id="localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges">LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked" id="localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked">LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked" id="localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked">LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -2585,18 +2576,12 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers" id="localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers">LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers" id="localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers">LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-recoveryconsole-allowautomaticadministrativelogon" id="localpoliciessecurityoptions-recoveryconsole-allowautomaticadministrativelogon">LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile" id="localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile">LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile" id="localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile">LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-systemobjects-requirecaseinsensitivityfornonwindowssubsystems" id="localpoliciessecurityoptions-systemobjects-requirecaseinsensitivityfornonwindowssubsystems">LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
<a href="./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -3918,6 +3903,9 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-update.md#update-setedurestart" id="update-setedurestart">Update/SetEDURestart</a>
|
<a href="./policy-csp-update.md#update-setedurestart" id="update-setedurestart">Update/SetEDURestart</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-update.md#update-setproxybehaviorforupdatedetection"id="update-setproxybehaviorforupdatedetection">Update/SetProxyBehaviorForUpdateDetection</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="./policy-csp-update.md#update-targetreleaseversion"id="update-targetreleaseversion">Update/TargetReleaseVersion</a>
|
<a href="./policy-csp-update.md#update-targetreleaseversion"id="update-targetreleaseversion">Update/TargetReleaseVersion</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
@ -45,15 +45,6 @@ manager: dansimp
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly">LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</a>
|
<a href="#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly">LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible">LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
|
||||||
<a href="#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges">LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked">LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked</a>
|
<a href="#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked">LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -132,18 +123,12 @@ manager: dansimp
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers">LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</a>
|
<a href="#localpoliciessecurityoptions-networksecurity-restrictntlm-outgoingntlmtraffictoremoteservers">LocalPoliciesSecurityOptions/NetworkSecurity_RestrictNTLM_OutgoingNTLMTrafficToRemoteServers</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#localpoliciessecurityoptions-recoveryconsole-allowautomaticadministrativelogon">LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
<a href="#localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon">LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile">LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</a>
|
<a href="#localpoliciessecurityoptions-shutdown-clearvirtualmemorypagefile">LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile</a>
|
||||||
</dd>
|
</dd>
|
||||||
<dd>
|
|
||||||
<a href="#localpoliciessecurityoptions-systemobjects-requirecaseinsensitivityfornonwindowssubsystems">LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems</a>
|
|
||||||
</dd>
|
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
<a href="#localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation">LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -714,256 +699,6 @@ GP Info:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways"></a>**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Windows Edition</th>
|
|
||||||
<th>Supported?</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Home</td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Pro</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Business</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Education</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Scope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--/Scope-->
|
|
||||||
<!--Description-->
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Starting in the version 1809 of Windows, this policy is deprecated.
|
|
||||||
|
|
||||||
Domain member: Digitally encrypt or sign secure channel data (always)
|
|
||||||
|
|
||||||
This security setting determines whether all secure channel traffic initiated by the domain member must be signed or encrypted.
|
|
||||||
|
|
||||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass through authentication, LSA SID/name Lookup etc.
|
|
||||||
|
|
||||||
This setting determines whether or not all secure channel traffic initiated by the domain member meets minimum security requirements. Specifically it determines whether all secure channel traffic initiated by the domain member must be signed or encrypted. If this policy is enabled, then the secure channel will not be established unless either signing or encryption of all secure channel traffic is negotiated. If this policy is disabled, then encryption and signing of all secure channel traffic is negotiated with the Domain Controller in which case the level of signing and encryption depends on the version of the Domain Controller and the settings of the following two policies:
|
|
||||||
|
|
||||||
Domain member: Digitally encrypt secure channel data (when possible)
|
|
||||||
Domain member: Digitally sign secure channel data (when possible)
|
|
||||||
|
|
||||||
Default: Enabled.
|
|
||||||
|
|
||||||
Notes:
|
|
||||||
|
|
||||||
If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic.
|
|
||||||
If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic.
|
|
||||||
Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--RegistryMapped-->
|
|
||||||
GP Info:
|
|
||||||
- GP English name: *Domain member: Digitally encrypt or sign secure channel data (always)*
|
|
||||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
|
||||||
|
|
||||||
<!--/RegistryMapped-->
|
|
||||||
<!--SupportedValues-->
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--Example-->
|
|
||||||
|
|
||||||
<!--/Example-->
|
|
||||||
<!--Validation-->
|
|
||||||
|
|
||||||
<!--/Validation-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible"></a>**LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Windows Edition</th>
|
|
||||||
<th>Supported?</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Home</td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Pro</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Business</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Education</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Scope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--/Scope-->
|
|
||||||
<!--Description-->
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Starting in the version 1809 of Windows, this policy is deprecated.
|
|
||||||
|
|
||||||
Domain member: Digitally encrypt secure channel data (when possible)
|
|
||||||
|
|
||||||
This security setting determines whether a domain member attempts to negotiate encryption for all secure channel traffic that it initiates.
|
|
||||||
|
|
||||||
When a computer joins a domain, a computer account is created. After that, when the system starts, it uses the computer account password to create a secure channel with a domain controller for its domain. This secure channel is used to perform operations such as NTLM pass-through authentication, LSA SID/name Lookup etc.
|
|
||||||
|
|
||||||
This setting determines whether or not the domain member attempts to negotiate encryption for all secure channel traffic that it initiates. If enabled, the domain member will request encryption of all secure channel traffic. If the domain controller supports encryption of all secure channel traffic, then all secure channel traffic will be encrypted. Otherwise only logon information transmitted over the secure channel will be encrypted. If this setting is disabled, then the domain member will not attempt to negotiate secure channel encryption.
|
|
||||||
|
|
||||||
Default: Enabled.
|
|
||||||
|
|
||||||
Important
|
|
||||||
|
|
||||||
There is no known reason for disabling this setting. Besides unnecessarily reducing the potential confidentiality level of the secure channel, disabling this setting may unnecessarily reduce secure channel throughput, because concurrent API calls that use the secure channel are only possible when the secure channel is signed or encrypted.
|
|
||||||
|
|
||||||
Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--RegistryMapped-->
|
|
||||||
GP Info:
|
|
||||||
- GP English name: *Domain member: Digitally encrypt secure channel data (when possible)*
|
|
||||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
|
||||||
|
|
||||||
<!--/RegistryMapped-->
|
|
||||||
<!--SupportedValues-->
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--Example-->
|
|
||||||
|
|
||||||
<!--/Example-->
|
|
||||||
<!--Validation-->
|
|
||||||
|
|
||||||
<!--/Validation-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges"></a>**LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Windows Edition</th>
|
|
||||||
<th>Supported?</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Home</td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Pro</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Business</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Education</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Scope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--/Scope-->
|
|
||||||
<!--Description-->
|
|
||||||
|
|
||||||
> [!WARNING]
|
|
||||||
> Starting in the version 1809 of Windows, this policy is deprecated.
|
|
||||||
|
|
||||||
Domain member: Disable machine account password changes
|
|
||||||
|
|
||||||
Determines whether a domain member periodically changes its computer account password. If this setting is enabled, the domain member does not attempt to change its computer account password. If this setting is disabled, the domain member attempts to change its computer account password as specified by the setting for Domain Member: Maximum age for machine account password, which by default is every 30 days.
|
|
||||||
|
|
||||||
Default: Disabled.
|
|
||||||
|
|
||||||
Notes
|
|
||||||
|
|
||||||
This security setting should not be enabled. Computer account passwords are used to establish secure channel communications between members and domain controllers and, within the domain, between the domain controllers themselves. Once it is established, the secure channel is used to transmit sensitive information that is necessary for making authentication and authorization decisions.
|
|
||||||
This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--RegistryMapped-->
|
|
||||||
GP Info:
|
|
||||||
- GP English name: *Domain member: Disable machine account password changes*
|
|
||||||
- GP path: *Windows Settings/Security Settings/Local Policies/Security Options*
|
|
||||||
|
|
||||||
<!--/RegistryMapped-->
|
|
||||||
<!--SupportedValues-->
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--Example-->
|
|
||||||
|
|
||||||
<!--/Example-->
|
|
||||||
<!--Validation-->
|
|
||||||
|
|
||||||
<!--/Validation-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked"></a>**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked**
|
<a href="" id="localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked"></a>**LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked**
|
||||||
|
|
||||||
@ -2902,60 +2637,6 @@ GP Info:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="localpoliciessecurityoptions-recoveryconsole-allowautomaticadministrativelogon"></a>**LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Windows Edition</th>
|
|
||||||
<th>Supported?</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Home</td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Pro</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Business</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Education</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>3</sup></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Description-->
|
|
||||||
Recovery console: Allow automatic administrative logon
|
|
||||||
|
|
||||||
This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system.
|
|
||||||
|
|
||||||
Default: This policy is not defined and automatic administrative logon is not allowed.
|
|
||||||
|
|
||||||
Value type is integer. Supported operations are Add, Get, Replace, and Delete.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--SupportedValues-->
|
|
||||||
Valid values:
|
|
||||||
- 0 - disabled
|
|
||||||
- 1 - enabled (allow automatic administrative logon)
|
|
||||||
|
|
||||||
<!--/SupportedValues-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon"></a>**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn**
|
<a href="" id="localpoliciessecurityoptions-shutdown-allowsystemtobeshutdownwithouthavingtologon"></a>**LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn**
|
||||||
|
|
||||||
@ -3095,63 +2776,6 @@ GP Info:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
|
||||||
<a href="" id="localpoliciessecurityoptions-systemobjects-requirecaseinsensitivityfornonwindowssubsystems"></a>**LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems**
|
|
||||||
|
|
||||||
<!--SupportedSKUs-->
|
|
||||||
<table>
|
|
||||||
<tr>
|
|
||||||
<th>Windows Edition</th>
|
|
||||||
<th>Supported?</th>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Home</td>
|
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Pro</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Business</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Enterprise</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
|
||||||
<td>Education</td>
|
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>4</sup></td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
<!--/SupportedSKUs-->
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Scope-->
|
|
||||||
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
|
||||||
|
|
||||||
> [!div class = "checklist"]
|
|
||||||
> * Device
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--/Scope-->
|
|
||||||
<!--Description-->
|
|
||||||
System objects: Require case insensitivity for non-Windows subsystems
|
|
||||||
|
|
||||||
This security setting determines whether case insensitivity is enforced for all subsystems. The Win32 subsystem is case insensitive. However, the kernel supports case sensitivity for other subsystems, such as POSIX.
|
|
||||||
|
|
||||||
If this setting is enabled, case insensitivity is enforced for all directory objects, symbolic links, and IO objects, including file objects. Disabling this setting does not allow the Win32 subsystem to become case sensitive.
|
|
||||||
|
|
||||||
Default: Enabled.
|
|
||||||
|
|
||||||
<!--/Description-->
|
|
||||||
<!--/Policy-->
|
|
||||||
|
|
||||||
<hr/>
|
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation"></a>**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation**
|
<a href="" id="localpoliciessecurityoptions-useraccountcontrol-allowuiaccessapplicationstopromptforelevation"></a>**LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation**
|
||||||
|
|
||||||
|
@ -194,6 +194,9 @@ manager: dansimp
|
|||||||
<dd>
|
<dd>
|
||||||
<a href="#update-setedurestart">Update/SetEDURestart</a>
|
<a href="#update-setedurestart">Update/SetEDURestart</a>
|
||||||
</dd>
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="#update-setproxybehaviorforupdatedetection">Update/SetProxyBehaviorForUpdateDetection</a>
|
||||||
|
</dd>
|
||||||
<dd>
|
<dd>
|
||||||
<a href="#update-targetreleaseversion">Update/TargetReleaseVersion</a>
|
<a href="#update-targetreleaseversion">Update/TargetReleaseVersion</a>
|
||||||
</dd>
|
</dd>
|
||||||
@ -4133,6 +4136,78 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
|
||||||
|
<!--Policy-->
|
||||||
|
<a href="" id="update-setproxybehaviorforupdatedetection"></a>**Update/SetProxyBehaviorForUpdateDetection**
|
||||||
|
|
||||||
|
<!--SupportedSKUs-->
|
||||||
|
<table>
|
||||||
|
<tr>
|
||||||
|
<th>Windows Edition</th>
|
||||||
|
<th>Supported?</th>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Home</td>
|
||||||
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Pro</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Business</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Enterprise</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Education</td>
|
||||||
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
<!--/SupportedSKUs-->
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--Scope-->
|
||||||
|
[Scope](./policy-configuration-service-provider.md#policy-scope):
|
||||||
|
|
||||||
|
> [!div class = "checklist"]
|
||||||
|
> * Device
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
|
<!--/Scope-->
|
||||||
|
<!--Description-->
|
||||||
|
Available in Windows 10, version 1607 and later. By default, HTTP WSUS servers scan only if system proxy is configured. This policy setting allows you to configure user proxy as a fallback for detecting updates while using an HTTP based intranet server despite the vulnerabilities it presents.
|
||||||
|
|
||||||
|
This policy setting does not impact those customers who have, per Microsoft recommendation, secured their WSUS server with TLS/SSL protocol, thereby using HTTPS based intranet servers to keep systems secure. That said, if a proxy is required, we recommend configuring a system proxy to ensure the highest level of security.
|
||||||
|
|
||||||
|
<!--/Description-->
|
||||||
|
<!--ADMXMapped-->
|
||||||
|
ADMX Info:
|
||||||
|
- GP English name: *Select the proxy behavior for Windows Update client for detecting updates with non-TLS (HTTP) based service*
|
||||||
|
- GP name: *Select the proxy behavior*
|
||||||
|
- GP element: *Select the proxy behavior*
|
||||||
|
- GP path: *Windows Components/Windows Update/Specify intranet Microsoft update service location*
|
||||||
|
- GP ADMX file name: *WindowsUpdate.admx*
|
||||||
|
|
||||||
|
<!--/ADMXMapped-->
|
||||||
|
<!--SupportedValues-->
|
||||||
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
- 0 (default) - Allow system proxy only for HTTP scans.
|
||||||
|
- 1 - Allow user proxy to be used as a fallback if detection using system proxy fails.
|
||||||
|
> [!NOTE]
|
||||||
|
> Configuring this policy setting to 1 exposes your environment to potential security risk and makes scans unsecure.
|
||||||
|
|
||||||
|
<!--/SupportedValues-->
|
||||||
|
<!--/Policy-->
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
|
||||||
<!--Policy-->
|
<!--Policy-->
|
||||||
<a href="" id="update-targetreleaseversion"></a>**Update/TargetReleaseVersion**
|
<a href="" id="update-targetreleaseversion"></a>**Update/TargetReleaseVersion**
|
||||||
|
|
||||||
|
@ -533,9 +533,6 @@ ms.date: 07/18/2019
|
|||||||
- [LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-allowedtoformatandejectremovablemedia)
|
- [LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-allowedtoformatandejectremovablemedia)
|
||||||
- [LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-preventusersfrominstallingprinterdriverswhenconnectingtosharedprinters)
|
- [LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-preventusersfrominstallingprinterdriverswhenconnectingtosharedprinters)
|
||||||
- [LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly)
|
- [LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-devices-restrictcdromaccesstolocallyloggedonuseronly)
|
||||||
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptorsignsecurechanneldataalways)
|
|
||||||
- [LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-digitallyencryptsecurechanneldatawhenpossible)
|
|
||||||
- [LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-domainmember-disablemachineaccountpasswordchanges)
|
|
||||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked)
|
- [LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-displayuserinformationwhenthesessionislocked)
|
||||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin)
|
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplaylastsignedin)
|
||||||
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplayusernameatsignin)
|
- [LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn](./policy-csp-localpoliciessecurityoptions.md#localpoliciessecurityoptions-interactivelogon-donotdisplayusernameatsignin)
|
||||||
|
@ -66,6 +66,7 @@ ms.date: 07/18/2019
|
|||||||
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
|
- [Update/ConfigureDeadlineForQualityUpdates](policy-csp-update.md#update-configuredeadlineforqualityupdates)
|
||||||
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
|
- [Update/ConfigureDeadlineGracePeriod](policy-csp-update.md#update-configuredeadlinegraceperiod)
|
||||||
- [Update/ConfigureDeadlineNoAutoReboot](policy-csp-update.md#update-configuredeadlinenoautoreboot)
|
- [Update/ConfigureDeadlineNoAutoReboot](policy-csp-update.md#update-configuredeadlinenoautoreboot)
|
||||||
|
- [Update/SetProxyBehaviorForUpdateDetection](policy-csp-update.md#update-setproxybehaviorforupdatedetection)
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
@ -5,7 +5,7 @@ ms.assetid: 1F24ABD8-A57A-45EA-BA54-2DA2238C573D
|
|||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
keywords: ["MDM", "Group Policy"]
|
keywords: ["MDM", "Group Policy", "GP"]
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -21,9 +21,12 @@ ms.topic: reference
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
|
||||||
|
|
||||||
Windows 10 includes the following new policies for management. [Download the complete set of Administrative Template (.admx) files for Windows 10](https://www.microsoft.com/download/100591).
|
As of September 2020 This page will no longer be updated. To find the Group Polices that ship in each version of Windows, refer to the Group Policy Settings Reference Spreadsheet. You can always locate the most recent version of the Spreadsheet by searching the Internet for "Windows Version + Group Policy Settings Reference".
|
||||||
|
|
||||||
|
For example, searching for "Windows 2004" + "Group Policy Settings Reference Spreadsheet" in a web browser will return to you the link to download the Group Policy Settings Reference Spreadsheet for Windows 2004.
|
||||||
|
|
||||||
|
The latest [group policy reference for Windows 10 version 2004 is available here](https://www.microsoft.com/download/101451).
|
||||||
|
|
||||||
## New Group Policy settings in Windows 10, version 1903
|
## New Group Policy settings in Windows 10, version 1903
|
||||||
|
|
||||||
|
@ -131,4 +131,4 @@ This section contains advanced troubleshooting topics and links to help you reso
|
|||||||
|
|
||||||
## Other Resources
|
## Other Resources
|
||||||
|
|
||||||
### [Troubleshooting Windows Server components](https://docs.microsoft.com/windows-server/troubleshoot/windows-server-support-solutions)
|
- [Troubleshooting Windows Server components](https://docs.microsoft.com/windows-server/troubleshoot/windows-server-troubleshooting)
|
||||||
|
@ -135,7 +135,7 @@ Starting in Windows 10, version 1803, set this policy to restrict peer selection
|
|||||||
- 0 = not set
|
- 0 = not set
|
||||||
- 1 = AD Site
|
- 1 = AD Site
|
||||||
- 2 = Authenticated domain SID
|
- 2 = Authenticated domain SID
|
||||||
- 3 = DHCP Option ID (with this option, the client will query DHCP Option ID 235 and use the returned GUID value as the Group ID)
|
- 3 = DHCP Option ID (with this option, the client will query DHCP Option ID 234 and use the returned GUID value as the Group ID)
|
||||||
- 4 = DNS Suffix
|
- 4 = DNS Suffix
|
||||||
- 5 = Starting with Windows 10, version 1903, you can use the Azure Active Directory (AAD) Tenant ID as a means to define groups. To do this set the value for DOGroupIdSource to its new maximum value of 5.
|
- 5 = Starting with Windows 10, version 1903, you can use the Azure Active Directory (AAD) Tenant ID as a means to define groups. To do this set the value for DOGroupIdSource to its new maximum value of 5.
|
||||||
|
|
||||||
|
@ -95,7 +95,7 @@ To do this with MDM, go to **.Vendor/MSFT/Policy/Config/DeliveryOptimization/**
|
|||||||
|
|
||||||
In a lab situation, you typically have a large number of devices that are plugged in and have a lot of free disk space. By increasing the content expiration interval, you can take advantage of these devices, using them as excellent upload sources in order to upload much more content over a longer period.
|
In a lab situation, you typically have a large number of devices that are plugged in and have a lot of free disk space. By increasing the content expiration interval, you can take advantage of these devices, using them as excellent upload sources in order to upload much more content over a longer period.
|
||||||
|
|
||||||
To do this in Group Policy, go to **Configuration\Policies\Administrative Templates\Windows Components\Delivery Optimization** and set **Max Cache Age** to **6048000** (7 days) or more (up to 30 days).
|
To do this in Group Policy, go to **Configuration\Policies\Administrative Templates\Windows Components\Delivery Optimization** and set **Max Cache Age** to **604800** (7 days) or more (up to 30 days).
|
||||||
|
|
||||||
To do this with MDM, go to **.Vendor/MSFT/Policy/Config/DeliveryOptimization/** and set DOMaxCacheAge to 7 or more (up to 30 days).
|
To do this with MDM, go to **.Vendor/MSFT/Policy/Config/DeliveryOptimization/** and set DOMaxCacheAge to 7 or more (up to 30 days).
|
||||||
|
|
||||||
@ -191,7 +191,7 @@ With no options, this cmdlet returns these data:
|
|||||||
- overall efficiency
|
- overall efficiency
|
||||||
- efficiency in the peered files
|
- efficiency in the peered files
|
||||||
|
|
||||||
Using the `-ListConnections` option returns these detauls about peers:
|
Using the `-ListConnections` option returns these details about peers:
|
||||||
|
|
||||||
- destination IP address
|
- destination IP address
|
||||||
- peer type
|
- peer type
|
||||||
|
@ -115,7 +115,8 @@ If downloads through a proxy server fail with a 0x80d05001 DO_E_HTTP_BLOCKSIZE_M
|
|||||||
You may choose to apply a rule to permit HTTP RANGE requests for the following URLs:
|
You may choose to apply a rule to permit HTTP RANGE requests for the following URLs:
|
||||||
|
|
||||||
*.download.windowsupdate.com
|
*.download.windowsupdate.com
|
||||||
*.dl.delivery.mp.microsoft.com
|
*.dl.delivery.mp.microsoft.com
|
||||||
|
*.delivery.mp.microsoft.com
|
||||||
*.emdl.ws.microsoft.com
|
*.emdl.ws.microsoft.com
|
||||||
|
|
||||||
If you cannot permit RANGE requests, keep in mind that this means you are downloading more content than needed in updates (as delta patching will not work).
|
If you cannot permit RANGE requests, keep in mind that this means you are downloading more content than needed in updates (as delta patching will not work).
|
||||||
@ -166,6 +167,10 @@ Check that your device can access these Windows Update endpoints:
|
|||||||
- `http://*.download.windowsupdate.com`
|
- `http://*.download.windowsupdate.com`
|
||||||
- `http://wustat.windows.com`
|
- `http://wustat.windows.com`
|
||||||
- `http://ntservicepack.microsoft.com`
|
- `http://ntservicepack.microsoft.com`
|
||||||
|
- `https://*.prod.do.dsp.mp.microsoft.com`
|
||||||
|
- `http://*.dl.delivery.mp.microsoft.com`
|
||||||
|
- `https://*.delivery.mp.microsoft.com`
|
||||||
|
- `https://tsfe.trafficshaping.dsp.mp.microsoft.com`
|
||||||
|
|
||||||
Allow these endpoints for future use.
|
Allow these endpoints for future use.
|
||||||
|
|
||||||
|
@ -64,10 +64,10 @@ A final set of changes includes two new policies that can help you fine-tune dia
|
|||||||
|
|
||||||
- The **Limit dump collection** policy is a new policy that can be used to limit the types of [crash dumps](https://docs.microsoft.com/windows/win32/dxtecharts/crash-dump-analysis) that can be sent back to Microsoft. If this policy is enabled, Windows Error Reporting will send only kernel mini dumps and user mode triage dumps.
|
- The **Limit dump collection** policy is a new policy that can be used to limit the types of [crash dumps](https://docs.microsoft.com/windows/win32/dxtecharts/crash-dump-analysis) that can be sent back to Microsoft. If this policy is enabled, Windows Error Reporting will send only kernel mini dumps and user mode triage dumps.
|
||||||
- Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Limit Dump Collection**
|
- Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Limit Dump Collection**
|
||||||
- MDM policy: System/ LimitDiagnosticLogCollection
|
- MDM policy: System/LimitDumpCollection
|
||||||
- The **Limit diagnostic log collection** policy is another new policy that limits the number of diagnostic logs that are sent back to Microsoft. If this policy is enabled, diagnostic logs are not sent back to Microsoft.
|
- The **Limit diagnostic log collection** policy is another new policy that limits the number of diagnostic logs that are sent back to Microsoft. If this policy is enabled, diagnostic logs are not sent back to Microsoft.
|
||||||
- Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Limit Diagnostic Log Collection**
|
- Group Policy: Computer Configuration > Administrative Templates > Windows Components > Data Collection and Preview Builds > **Limit Diagnostic Log Collection**
|
||||||
- MDM policy: System/LimitDumpCollection
|
- MDM policy: System/LimitDiagnosticLogCollection
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>All of the changes mentioned in this section will not be released on versions of Windows, version 1809 and earlier as well as Windows Server 2019 and earlier.
|
>All of the changes mentioned in this section will not be released on versions of Windows, version 1809 and earlier as well as Windows Server 2019 and earlier.
|
||||||
|
@ -1458,15 +1458,15 @@ To turn this Off in the UI:
|
|||||||
|
|
||||||
-OR-
|
-OR-
|
||||||
|
|
||||||
- Create a REG_DWORD registry setting named **EnableActivityFeed** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 2 (two)**
|
- Create a REG_DWORD registry setting named **EnableActivityFeed** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 0 (zero)**
|
||||||
|
|
||||||
-and-
|
-and-
|
||||||
|
|
||||||
- Create a REG_DWORD registry setting named **PublishUserActivities** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 2 (two)**
|
- Create a REG_DWORD registry setting named **PublishUserActivities** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 0 (zero)**
|
||||||
|
|
||||||
-and-
|
-and-
|
||||||
|
|
||||||
- Create a REG_DWORD registry setting named **UploadUserActivities** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 2 (two)**
|
- Create a REG_DWORD registry setting named **UploadUserActivities** in **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\Windows\\System** with a **value of 0 (zero)**
|
||||||
|
|
||||||
### <a href="" id="bkmk-voice-act"></a>18.23 Voice Activation
|
### <a href="" id="bkmk-voice-act"></a>18.23 Voice Activation
|
||||||
|
|
||||||
|
@ -2189,7 +2189,7 @@ This security group was introduced in Windows Server 2012, and it has not chang
|
|||||||
|
|
||||||
IIS\_IUSRS is a built-in group that is used by Internet Information Services beginning with IIS 7.0. A built-in account and group are guaranteed by the operating system to always have a unique SID. IIS 7.0 replaces the IUSR\_MachineName account and the IIS\_WPG group with the IIS\_IUSRS group to ensure that the actual names that are used by the new account and group will never be localized. For example, regardless of the language of the Windows operating system that you install, the IIS account name will always be IUSR, and the group name will be IIS\_IUSRS.
|
IIS\_IUSRS is a built-in group that is used by Internet Information Services beginning with IIS 7.0. A built-in account and group are guaranteed by the operating system to always have a unique SID. IIS 7.0 replaces the IUSR\_MachineName account and the IIS\_WPG group with the IIS\_IUSRS group to ensure that the actual names that are used by the new account and group will never be localized. For example, regardless of the language of the Windows operating system that you install, the IIS account name will always be IUSR, and the group name will be IIS\_IUSRS.
|
||||||
|
|
||||||
For more information, see [Understanding Built-In User and Group Accounts in IIS 7](http://www.iis.net/learn/get-started/planning-for-security/understanding-built-in-user-and-group-accounts-in-iis).
|
For more information, see [Understanding Built-In User and Group Accounts in IIS 7](https://docs.microsoft.com/iis/get-started/planning-for-security/understanding-built-in-user-and-group-accounts-in-iis).
|
||||||
|
|
||||||
This security group has not changed since Windows Server 2008.
|
This security group has not changed since Windows Server 2008.
|
||||||
|
|
||||||
|
@ -44,11 +44,12 @@ Windows Hello for Business uses asymmetric keys as user credentials (rather than
|
|||||||
|
|
||||||
Sign-in to the domain controller hosting the schema master operational role using enterprise administrator equivalent credentials.
|
Sign-in to the domain controller hosting the schema master operational role using enterprise administrator equivalent credentials.
|
||||||
|
|
||||||
1. Open an elevated command prompt.
|
1. Mount the ISO file (or insert the DVD) containing the Windows Server 2016 or later installation media.
|
||||||
2. Type ```cd /d x:\support\adprep``` where *x* is the drive letter of the DVD or mounted ISO.
|
2. Open an elevated command prompt.
|
||||||
3. To update the schema, type ```adprep /forestprep```.
|
3. Type ```cd /d x:\support\adprep``` where *x* is the drive letter of the DVD or mounted ISO.
|
||||||
4. Read the Adprep Warning. Type the letter **C** and press **Enter** to update the schema.
|
4. To update the schema, type ```adprep /forestprep```.
|
||||||
5. Close the Command Prompt and sign-out.
|
5. Read the Adprep Warning. Type the letter **C** and press **Enter** to update the schema.
|
||||||
|
6. Close the Command Prompt and sign-out.
|
||||||
|
|
||||||
## Create the KeyCredential Admins Security Global Group
|
## Create the KeyCredential Admins Security Global Group
|
||||||
|
|
||||||
|
@ -77,9 +77,7 @@ Communicating with Azure Active Directory uses the following URLs:
|
|||||||
- login.windows.net
|
- login.windows.net
|
||||||
|
|
||||||
If your environment uses Microsoft Intune, you need these additional URLs:
|
If your environment uses Microsoft Intune, you need these additional URLs:
|
||||||
- enrollment.manage-beta.microsoft.com
|
|
||||||
- enrollment.manage.microsoft.com
|
- enrollment.manage.microsoft.com
|
||||||
- portal.manage-beta.microsoft.com
|
|
||||||
- portal.manage.microsoft.com
|
- portal.manage.microsoft.com
|
||||||
|
|
||||||
## What is the difference between non-destructive and destructive PIN reset?
|
## What is the difference between non-destructive and destructive PIN reset?
|
||||||
|
@ -49,7 +49,7 @@ In this task you will
|
|||||||
|
|
||||||
### Configure Active Directory to support Domain Administrator enrollment
|
### Configure Active Directory to support Domain Administrator enrollment
|
||||||
|
|
||||||
The designed Windows for Business configuration has you give the **Key Admins** (or **KeyCredential Admins** when using domain controllers prior to Windows Server 2016) group read and write permissions to the msDS-KeyCredentialsLink attribute. You provided these permissions at root of the domain and use object inheritance to ensure the permissions apply to all users in the domain regardless of their location within the domain hierarchy.
|
The designed Windows Hello for Business configuration gives the **Key Admins** (or **KeyCredential Admins** when using domain controllers prior to Windows Server 2016) group read and write permissions to the msDS-KeyCredentialsLink attribute. You provided these permissions at root of the domain and use object inheritance to ensure the permissions apply to all users in the domain regardless of their location within the domain hierarchy.
|
||||||
|
|
||||||
Active Directory Domain Services uses AdminSDHolder to secure privileged users and groups from unintentional modification by comparing and replacing the security on privileged users and groups to match those defined on the AdminSDHolder object on an hourly cycle. For Windows Hello for Business, your domain administrator account may receive the permissions but they will disappear from the user object unless you give the AdminSDHolder read and write permissions to the msDS-KeyCredential attribute.
|
Active Directory Domain Services uses AdminSDHolder to secure privileged users and groups from unintentional modification by comparing and replacing the security on privileged users and groups to match those defined on the AdminSDHolder object on an hourly cycle. For Windows Hello for Business, your domain administrator account may receive the permissions but they will disappear from the user object unless you give the AdminSDHolder read and write permissions to the msDS-KeyCredential attribute.
|
||||||
|
|
||||||
|
@ -76,10 +76,12 @@ Certificate authorities write CRL distribution points in certificates as they ar
|
|||||||
Windows Hello for Business enforces the strict KDC validation security feature, which imposes more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business, the Windows 10 client validates the reply from the domain controller by ensuring all of the following are met:
|
Windows Hello for Business enforces the strict KDC validation security feature, which imposes more restrictive criteria that must be met by the Key Distribution Center (KDC). When authenticating using Windows Hello for Business, the Windows 10 client validates the reply from the domain controller by ensuring all of the following are met:
|
||||||
|
|
||||||
- The domain controller has the private key for the certificate provided.
|
- The domain controller has the private key for the certificate provided.
|
||||||
- The root CA that issued the domain controller's certificate is in the device's **Trusted Root Certificate Authorities**.
|
- The root CA that issued the domain controller's certificate is in the device's **Trusted Root Certificate Authorities**.
|
||||||
- Use the **Kerberos Authentication certificate template** instead of any other older template.
|
- Use the **Kerberos Authentication certificate template** instead of any other older template.
|
||||||
- The domain controller's certificate has the **KDC Authentication** enhanced key usage.
|
- The domain controller's certificate has the **KDC Authentication** enhanced key usage.
|
||||||
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain.
|
- The domain controller's certificate's subject alternate name has a DNS Name that matches the name of the domain.
|
||||||
|
- The domain controller's certificate's signature hash algorithm is **sha256**.
|
||||||
|
- The domain controller's certificate's public key is **RSA (2048 Bits)**.
|
||||||
|
|
||||||
|
|
||||||
> [!Tip]
|
> [!Tip]
|
||||||
@ -301,35 +303,32 @@ A **Trusted Certificate** device configuration profile is how you deploy trusted
|
|||||||
|
|
||||||
Sign-in a workstation with access equivalent to a _domain user_.
|
Sign-in a workstation with access equivalent to a _domain user_.
|
||||||
|
|
||||||
1. Sign-in to the [Azure Portal](https://portal.azure.com/).
|
1. Sign in to the [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/).
|
||||||
2. Select **All Services**. Type **Intune** to filter the list of services. Click **Microsoft Intune**.
|
2. Select **Devices**.
|
||||||
3. Click **device enrollment**.
|
3. Choose **Enroll devices**.
|
||||||
4. Click **Windows enrollment**
|
4. Select **Windows enrollment**.
|
||||||
5. Under **Windows enrollment**, click **Windows Hello for Business**.
|
5. Under **Windows enrollment**, select **Windows Hello for Business**.
|
||||||

|

|
||||||
6. Under **Priority**, click **Default**.
|
6. Select **Enabled** from the **Configure Windows Hello for Business** list.
|
||||||
7. Under **All users and all devices**, click **Settings**.
|
7. Select **Required** next to **Use a Trusted Platform Module (TPM)**. By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software-based keys.
|
||||||
8. Select **Enabled** from the **Configure Windows Hello for Business** list.
|
8. Enter the desired **Minimum PIN length** and **Maximum PIN length**.
|
||||||
9. Select **Required** next to **Use a Trusted Platform Module (TPM)**. By default, Windows Hello for Business prefers TPM 2.0 or falls backs to software. Choosing **Required** forces Windows Hello for Business to only use TPM 2.0 or TPM 1.2 and does not allow fall back to software based keys.
|
|
||||||
10. Type the desired **Minimum PIN length** and **Maximum PIN length**.
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> The default minimum PIN length for Windows Hello for Business on Windows 10 is 6. Microsoft Intune defaults the minimum PIN length to 4, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to 6.
|
> The default minimum PIN length for Windows Hello for Business on Windows 10 is six. Microsoft Intune defaults the minimum PIN length to four, which reduces the security of the user's PIN. If you do not have a desired PIN length, set the minimum PIN length to six.
|
||||||
|
|
||||||

|
9. Select the appropriate configuration for the following settings:
|
||||||
|
|
||||||
11. Select the appropriate configuration for the following settings.
|
|
||||||
* **Lowercase letters in PIN**
|
* **Lowercase letters in PIN**
|
||||||
* **Uppercase letters in PIN**
|
* **Uppercase letters in PIN**
|
||||||
* **Special characters in PIN**
|
* **Special characters in PIN**
|
||||||
* **PIN expiration (days)**
|
* **PIN expiration (days)**
|
||||||
* **Remember PIN history**
|
* **Remember PIN history**
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The Windows Hello for Business PIN is not a symmetric key (a password). A copy of the current PIN is not stored locally or on a server like in the case of passwords. Making the PIN as complex and changed frequently as a password increases the likelihood of forgotten PINs. Additionally, enabling PIN history is the only scenario that requires Windows 10 to store older PIN combinations (protected to the current PIN). Windows Hello for Business combined with a TPM provides anti-hammering functionality that prevents brute force attacks of the user's PIN. If you are concerned with user-to-user shoulder surfacing, rather that forcing complex PIN that change frequently, consider using the [Multifactor Unlock](feature-multifactor-unlock.md) feature.
|
> The Windows Hello for Business PIN is not a symmetric key (a password). A copy of the current PIN is not stored locally or on a server like in the case of passwords. Making the PIN as complex and changed frequently as a password increases the likelihood of forgotten PINs. Additionally, enabling PIN history is the only scenario that requires Windows 10 to store older PIN combinations (protected to the current PIN). Windows Hello for Business combined with a TPM provides anti-hammering functionality that prevents brute force attacks of the user's PIN. If you are concerned with user-to-user shoulder surfacing, rather that forcing complex PIN that change frequently, consider using the [Multifactor Unlock](feature-multifactor-unlock.md) feature.
|
||||||
|
|
||||||
12. Select **Yes** next to **Allow biometric authentication** if you want to allow users to use biometrics (fingerprint and/or facial recognition) to unlock the device. To further secure the use of biometrics, select **Yes** to **Use enhanced anti-spoofing, when available**.
|
10. Select **Yes** next to **Allow biometric authentication** if you want to allow users to use biometrics (fingerprint and/or facial recognition) to unlock the device. To further secure the use of biometrics, select **Yes** to **Use enhanced anti-spoofing, when available**.
|
||||||
13. Select **No** to **Allow phone sign-in**. This feature has been deprecated.
|
11. Select **No** to **Allow phone sign-in**. This feature has been deprecated.
|
||||||
14. Click **Save**
|
12. Choose **Save**.
|
||||||
15. Sign-out of the Azure portal.
|
13. Sign out of the Microsoft Endpoint Manager admin center.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> For more details about the actual experience after everything has been configured, please see [Windows Hello for Business and Authentication](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication).
|
> For more details about the actual experience after everything has been configured, please see [Windows Hello for Business and Authentication](https://docs.microsoft.com/windows/security/identity-protection/hello-for-business/hello-how-it-works-authentication).
|
||||||
|
@ -71,7 +71,7 @@ Sign-in a domain controller or management workstation with _Domain Admin_ equiva
|
|||||||
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
> 2. Right click "Scope Descriptions" and select "Add Scope Description".
|
||||||
> 3. Under name type "ugs" and Click Apply > OK.
|
> 3. Under name type "ugs" and Click Apply > OK.
|
||||||
> 4. Launch Powershell as Administrator.
|
> 4. Launch Powershell as Administrator.
|
||||||
> 5. Execute the command "Get-AdfsApplicationPermission". Look for the ScopeNames :{openid, aza} that has the ClientRoleIdentifier Make a note of the ObjectIdentifier.
|
> 5. Execute the command "Get-AdfsApplicationPermission". Look for the ScopeNames :{openid, aza} that has the ClientRoleIdentifier is equal to 38aa3b87-a06d-4817-b275-7a316988d93b and make a note of the ObjectIdentifier.
|
||||||
> 6. Execute the command "Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'.
|
> 6. Execute the command "Set-AdfsApplicationPermission -TargetIdentifier <ObjectIdentifier from step 5> -AddScope 'ugs'.
|
||||||
> 7. Restart the ADFS service.
|
> 7. Restart the ADFS service.
|
||||||
> 8. On the client: Restart the client. User should be prompted to provision WHFB.
|
> 8. On the client: Restart the client. User should be prompted to provision WHFB.
|
||||||
|
After Width: | Height: | Size: 52 KiB |
@ -21,6 +21,7 @@ ms.custom: bitlocker
|
|||||||
# BitLocker basic deployment
|
# BitLocker basic deployment
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This topic for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.
|
This topic for the IT professional explains how BitLocker features can be used to protect your data through drive encryption.
|
||||||
@ -31,8 +32,9 @@ BitLocker provides full volume encryption (FVE) for operating system volumes, as
|
|||||||
|
|
||||||
In the event that the drive was prepared as a single contiguous space, BitLocker requires a new volume to hold the boot files. BdeHdCfg.exe can create these volumes.
|
In the event that the drive was prepared as a single contiguous space, BitLocker requires a new volume to hold the boot files. BdeHdCfg.exe can create these volumes.
|
||||||
|
|
||||||
> **Note:** For more info about using this tool, see [Bdehdcfg](https://technet.microsoft.com/library/ee732026.aspx) in the Command-Line Reference.
|
> [!NOTE]
|
||||||
|
> For more info about using this tool, see [Bdehdcfg](/windows-server/administration/windows-commands/bdehdcfg) in the Command-Line Reference.
|
||||||
|
|
||||||
BitLocker encryption can be done using the following methods:
|
BitLocker encryption can be done using the following methods:
|
||||||
|
|
||||||
- BitLocker control panel
|
- BitLocker control panel
|
||||||
@ -48,52 +50,16 @@ To start encryption for a volume, select **Turn on BitLocker** for the appropria
|
|||||||
### Operating system volume
|
### Operating system volume
|
||||||
|
|
||||||
Upon launch, the BitLocker Drive Encryption Wizard verifies the computer meets the BitLocker system requirements for encrypting an operating system volume. By default, the system requirements are:
|
Upon launch, the BitLocker Drive Encryption Wizard verifies the computer meets the BitLocker system requirements for encrypting an operating system volume. By default, the system requirements are:
|
||||||
<table>
|
|
||||||
<colgroup>
|
|Requirement|Description|
|
||||||
<col width="50%" />
|
|--- |--- |
|
||||||
<col width="50%" />
|
|Hardware configuration|The computer must meet the minimum requirements for the supported Windows versions.|
|
||||||
</colgroup>
|
|Operating system|BitLocker is an optional feature which can be installed by Server Manager on Windows Server 2012 and later.|
|
||||||
<thead>
|
|Hardware TPM|TPM version 1.2 or 2.0. <p> A TPM is not required for BitLocker; however, only a computer with a TPM can provide the additional security of pre-startup system integrity verification and multifactor authentication.|
|
||||||
<tr class="header">
|
|BIOS configuration|<li> A Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware.</li> <li> The boot order must be set to start first from the hard disk, and not the USB or CD drives.</li> <li> The firmware must be able to read from a USB flash drive during startup.</li>|
|
||||||
<th align="left">Requirement</th>
|
|File system|For computers that boot natively with UEFI firmware, at least one FAT32 partition for the system drive and one NTFS partition for the operating system drive. <br/> For computers with legacy BIOS firmware, at least two NTFS disk partitions, one for the system drive and one for the operating system drive. <br/> For either firmware, the system drive partition must be at least 350 megabytes (MB) and set as the active partition.|
|
||||||
<th align="left">Description</th>
|
|Hardware encrypted drive prerequisites (optional)|To use a hardware encrypted drive as the boot drive, the drive must be in the uninitialized state and in the security inactive state. In addition, the system must always boot with native UEFI version 2.3.1 or higher and the CSM (if any) disabled.|
|
||||||
</tr>
|
|
||||||
</thead>
|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Hardware configuration</p></td>
|
|
||||||
<td align="left"><p>The computer must meet the minimum requirements for the supported Windows versions.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Operating system</p></td>
|
|
||||||
<td align="left"><p>BitLocker is an optional feature which can be installed by Server Manager on Windows Server 2012 and later.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Hardware TPM</p></td>
|
|
||||||
<td align="left"><p>TPM version 1.2 or 2.0</p>
|
|
||||||
<p>A TPM is not required for BitLocker; however, only a computer with a TPM can provide the additional security of pre-startup system integrity verification and multifactor authentication.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>BIOS configuration</p></td>
|
|
||||||
<td align="left"><ul>
|
|
||||||
<li><p>A Trusted Computing Group (TCG)-compliant BIOS or UEFI firmware.</p></li>
|
|
||||||
<li><p>The boot order must be set to start first from the hard disk, and not the USB or CD drives.</p></li>
|
|
||||||
<li><p>The firmware must be able to read from a USB flash drive during startup.</p></li>
|
|
||||||
</ul></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>File system</p></td>
|
|
||||||
<td align="left"><p>For computers that boot natively with UEFI firmware, at least one FAT32 partition for the system drive and one NTFS partition for the operating system drive.</p>
|
|
||||||
<p>For computers with legacy BIOS firmware, at least two NTFS disk partitions, one for the system drive and one for the operating system drive.</p>
|
|
||||||
<p>For either firmware, the system drive partition must be at least 350 megabytes (MB) and set as the active partition.</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Hardware encrypted drive prerequisites (optional)</p></td>
|
|
||||||
<td align="left"><p>To use a hardware encrypted drive as the boot drive, the drive must be in the uninitialized state and in the security inactive state. In addition, the system must always boot with native UEFI version 2.3.1 or higher and the CSM (if any) disabled.</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
Upon passing the initial configuration, users are required to enter a password for the volume. If the volume does not pass the initial configuration for BitLocker, the user is presented with an error dialog describing the appropriate actions to be taken.
|
Upon passing the initial configuration, users are required to enter a password for the volume. If the volume does not pass the initial configuration for BitLocker, the user is presented with an error dialog describing the appropriate actions to be taken.
|
||||||
Once a strong password has been created for the volume, a recovery key will be generated. The BitLocker Drive Encryption Wizard will prompt for a location to save this key. A BitLocker recovery key is a special key that you can create when you turn on BitLocker Drive Encryption for the first time on each drive that you encrypt. You can use the recovery key to gain access to your computer if the drive that Windows is installed on (the operating system drive) is encrypted using BitLocker Drive Encryption and BitLocker detects a condition that prevents it from unlocking the drive when the computer is starting up. A recovery key can also be used to gain access to your files and folders on a removable data drive (such as an external hard drive or USB flash drive) that is encrypted using BitLocker To Go, if for some reason you forget the password or your computer cannot access the drive.
|
Once a strong password has been created for the volume, a recovery key will be generated. The BitLocker Drive Encryption Wizard will prompt for a location to save this key. A BitLocker recovery key is a special key that you can create when you turn on BitLocker Drive Encryption for the first time on each drive that you encrypt. You can use the recovery key to gain access to your computer if the drive that Windows is installed on (the operating system drive) is encrypted using BitLocker Drive Encryption and BitLocker detects a condition that prevents it from unlocking the drive when the computer is starting up. A recovery key can also be used to gain access to your files and folders on a removable data drive (such as an external hard drive or USB flash drive) that is encrypted using BitLocker To Go, if for some reason you forget the password or your computer cannot access the drive.
|
||||||
|
|
||||||
@ -106,8 +72,9 @@ When the recovery key has been properly stored, the BitLocker Drive Encryption W
|
|||||||
|
|
||||||
It is recommended that drives with little to no data utilize the **used disk space only** encryption option and that drives with data or an operating system utilize the **encrypt entire drive** option.
|
It is recommended that drives with little to no data utilize the **used disk space only** encryption option and that drives with data or an operating system utilize the **encrypt entire drive** option.
|
||||||
|
|
||||||
> **Note:** Deleted files appear as free space to the file system, which is not encrypted by **used disk space only**. Until they are wiped or overwritten, deleted files hold information that could be recovered with common data forensic tools.
|
> [!NOTE]
|
||||||
|
> Deleted files appear as free space to the file system, which is not encrypted by **used disk space only**. Until they are wiped or overwritten, deleted files hold information that could be recovered with common data forensic tools.
|
||||||
|
|
||||||
Selecting an encryption type and choosing **Next** will give the user the option of running a BitLocker system check (selected by default) which will ensure that BitLocker can properly access the recovery and encryption keys before the volume encryption begins. It is recommended to run this system check before starting the encryption process. If the system check is not run and a problem is encountered when the operating system attempts to start, the user will need to provide the recovery key to start Windows.
|
Selecting an encryption type and choosing **Next** will give the user the option of running a BitLocker system check (selected by default) which will ensure that BitLocker can properly access the recovery and encryption keys before the volume encryption begins. It is recommended to run this system check before starting the encryption process. If the system check is not run and a problem is encountered when the operating system attempts to start, the user will need to provide the recovery key to start Windows.
|
||||||
|
|
||||||
After completing the system check (if selected), the BitLocker Drive Encryption Wizard will restart the computer to begin encryption. Upon reboot, users are required to enter the password chosen to boot into the operating system volume. Users can check encryption status by checking the system notification area or the BitLocker control panel.
|
After completing the system check (if selected), the BitLocker Drive Encryption Wizard will restart the computer to begin encryption. Upon reboot, users are required to enter the password chosen to boot into the operating system volume. Users can check encryption status by checking the system notification area or the BitLocker control panel.
|
||||||
@ -143,52 +110,20 @@ The following table shows the compatibility matrix for systems that have been Bi
|
|||||||
|
|
||||||
Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes
|
Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Windows 7 encrypted volumes
|
||||||
|
|
||||||
<table>
|
|||||
|
||||||
<colgroup>
|
|--- |--- |--- |--- |
|
||||||
<col width="25%" />
|
|Encryption Type|Windows 10 and Windows 8.1|Windows 8|Windows 7|
|
||||||
<col width="25%" />
|
|Fully encrypted on Windows 8|Presents as fully encrypted|N/A|Presented as fully encrypted|
|
||||||
<col width="25%" />
|
|Used Disk Space Only encrypted on Windows 8|Presents as encrypt on write|N/A|Presented as fully encrypted|
|
||||||
<col width="25%" />
|
|Fully encrypted volume from Windows 7|Presents as fully encrypted|Presented as fully encrypted|N/A|
|
||||||
</colgroup>
|
|Partially encrypted volume from Windows 7|Windows 10 and Windows 8.1 will complete encryption regardless of policy|Windows 8 will complete encryption regardless of policy|N/A|
|
||||||
<tbody>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Encryption Type</p></td>
|
|
||||||
<td align="left"><p>Windows 10 and Windows 8.1</p></td>
|
|
||||||
<td align="left"><p>Windows 8</p></td>
|
|
||||||
<td align="left"><p>Windows 7</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Fully encrypted on Windows 8</p></td>
|
|
||||||
<td align="left"><p>Presents as fully encrypted</p></td>
|
|
||||||
<td align="left"><p>N/A</p></td>
|
|
||||||
<td align="left"><p>Presented as fully encrypted</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Used Disk Space Only encrypted on Windows 8</p></td>
|
|
||||||
<td align="left"><p>Presents as encrypt on write</p></td>
|
|
||||||
<td align="left"><p>N/A</p></td>
|
|
||||||
<td align="left"><p>Presented as fully encrypted</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="even">
|
|
||||||
<td align="left"><p>Fully encrypted volume from Windows 7</p></td>
|
|
||||||
<td align="left"><p>Presents as fully encrypted</p></td>
|
|
||||||
<td align="left"><p>Presented as fully encrypted</p></td>
|
|
||||||
<td align="left"><p>N/A</p></td>
|
|
||||||
</tr>
|
|
||||||
<tr class="odd">
|
|
||||||
<td align="left"><p>Partially encrypted volume from Windows 7</p></td>
|
|
||||||
<td align="left"><p>Windows 10 and Windows 8.1 will complete encryption regardless of policy</p></td>
|
|
||||||
<td align="left"><p>Windows 8 will complete encryption regardless of policy</p></td>
|
|
||||||
<td align="left"><p>N/A</p></td>
|
|
||||||
</tr>
|
|
||||||
</tbody>
|
|
||||||
</table>
|
|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-dep3"></a>Encrypting volumes using the manage-bde command line interface
|
## <a href="" id="bkmk-dep3"></a>Encrypting volumes using the manage-bde command line interface
|
||||||
|
|
||||||
Manage-bde is a command-line utility that can be used for scripting BitLocker operations. Manage-bde offers additional options not displayed in the BitLocker control panel. For a complete list of the options, see [Manage-bde](https://technet.microsoft.com/library/ff829849.aspx).
|
Manage-bde is a command-line utility that can be used for scripting BitLocker operations. Manage-bde offers additional options not displayed in the BitLocker control panel. For a complete list of the options, see [Manage-bde](/windows-server/administration/windows-commands/manage-bde).
|
||||||
|
|
||||||
Manage-bde offers a multitude of wider options for configuring BitLocker. This means that using the command syntax may require care and possibly later customization by the user. For example, using just the `manage-bde -on` command on a data volume will fully encrypt the volume without any authenticating protectors. A volume encrypted in this manner still requires user interaction to turn on BitLocker protection, even though the command successfully completed because an authentication method needs to be added to the volume for it to be fully protected.
|
Manage-bde offers a multitude of wider options for configuring BitLocker. This means that using the command syntax may require care and possibly later customization by the user. For example, using just the `manage-bde -on` command on a data volume will fully encrypt the volume without any authenticating protectors. A volume encrypted in this manner still requires user interaction to turn on BitLocker protection, even though the command successfully completed because an authentication method needs to be added to the volume for it to be fully protected.
|
||||||
|
|
||||||
Command line users need to determine the appropriate syntax for a given situation. The following section covers general encryption for operating system volumes and data volumes.
|
Command line users need to determine the appropriate syntax for a given situation. The following section covers general encryption for operating system volumes and data volumes.
|
||||||
|
|
||||||
### Operating system volume
|
### Operating system volume
|
||||||
@ -246,6 +181,7 @@ manage-bde -on C:
|
|||||||
## <a href="" id="bkmk-dep4"></a>Encrypting volumes using the BitLocker Windows PowerShell cmdlets
|
## <a href="" id="bkmk-dep4"></a>Encrypting volumes using the BitLocker Windows PowerShell cmdlets
|
||||||
|
|
||||||
Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Using Windows PowerShell's scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets.
|
Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Using Windows PowerShell's scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
<col width="50%" />
|
<col width="50%" />
|
||||||
@ -253,11 +189,11 @@ Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Us
|
|||||||
</colgroup>
|
</colgroup>
|
||||||
<tbody>
|
<tbody>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Name</b></p></td>
|
<td align="left"><p><strong>Name</strong></p></td>
|
||||||
<td align="left"><p><b>Parameters</b></p></td>
|
<td align="left"><p><strong>Parameters</strong></p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Add-BitLockerKeyProtector</b></p></td>
|
<td align="left"><p><strong>Add-BitLockerKeyProtector</strong></p></td>
|
||||||
<td align="left"><p>-ADAccountOrGroup</p>
|
<td align="left"><p>-ADAccountOrGroup</p>
|
||||||
<p>-ADAccountOrGroupProtector</p>
|
<p>-ADAccountOrGroupProtector</p>
|
||||||
<p>-Confirm</p>
|
<p>-Confirm</p>
|
||||||
@ -279,26 +215,26 @@ Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Us
|
|||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Backup-BitLockerKeyProtector</b></p></td>
|
<td align="left"><p><strong>Backup-BitLockerKeyProtector</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-KeyProtectorId</p>
|
<p>-KeyProtectorId</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Disable-BitLocker</b></p></td>
|
<td align="left"><p><strong>Disable-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Disable-BitLockerAutoUnlock</b></p></td>
|
<td align="left"><p><strong>Disable-BitLockerAutoUnlock</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Enable-BitLocker</b></p></td>
|
<td align="left"><p><strong>Enable-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-AdAccountOrGroup</p>
|
<td align="left"><p>-AdAccountOrGroup</p>
|
||||||
<p>-AdAccountOrGroupProtector</p>
|
<p>-AdAccountOrGroupProtector</p>
|
||||||
<p>-Confirm</p>
|
<p>-Confirm</p>
|
||||||
@ -323,44 +259,44 @@ Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Us
|
|||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Enable-BitLockerAutoUnlock</b></p></td>
|
<td align="left"><p><strong>Enable-BitLockerAutoUnlock</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Get-BitLockerVolume</b></p></td>
|
<td align="left"><p><strong>Get-BitLockerVolume</strong></p></td>
|
||||||
<td align="left"><p>-MountPoint</p></td>
|
<td align="left"><p>-MountPoint</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Lock-BitLocker</b></p></td>
|
<td align="left"><p><strong>Lock-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-ForceDismount</p>
|
<p>-ForceDismount</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Remove-BitLockerKeyProtector</b></p></td>
|
<td align="left"><p><strong>Remove-BitLockerKeyProtector</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-KeyProtectorId</p>
|
<p>-KeyProtectorId</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Resume-BitLocker</b></p></td>
|
<td align="left"><p><strong>Resume-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td align="left"><p><b>Suspend-BitLocker</b></p></td>
|
<td align="left"><p><strong>Suspend-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-Confirm</p>
|
<td align="left"><p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
<p>-RebootCount</p>
|
<p>-RebootCount</p>
|
||||||
<p>-WhatIf</p></td>
|
<p>-WhatIf</p></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left"><p><b>Unlock-BitLocker</b></p></td>
|
<td align="left"><p><strong>Unlock-BitLocker</strong></p></td>
|
||||||
<td align="left"><p>-AdAccountOrGroup</p>
|
<td align="left"><p>-AdAccountOrGroup</p>
|
||||||
<p>-Confirm</p>
|
<p>-Confirm</p>
|
||||||
<p>-MountPoint</p>
|
<p>-MountPoint</p>
|
||||||
@ -372,28 +308,38 @@ Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Us
|
|||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they are encrypting prior to running Windows PowerShell cmdlets.
|
|
||||||
A good initial step is to determine the current state of the volume(s) on the computer. You can do this using the <code>Get-BitLocker</code> volume cmdlet. The output from this cmdlet displays information on the volume type, protectors, protection status, and other useful information.
|
|
||||||
Occasionally, all protectors may not be shown when using <b>Get-BitLockerVolume</b> due to lack of space in the output display. If you do not see all of the protectors for a volume, you can use the Windows PowerShell pipe command (|) to format a listing of the protectors.
|
|
||||||
|
|
||||||
> **Note:** In the event that there are more than four protectors for a volume, the pipe command may run out of display space. For volumes with more than four protectors, use the method described in the section below to generate a listing of all protectors with protector ID.
|
Similar to manage-bde, the Windows PowerShell cmdlets allow configuration beyond the options offered in the control panel. As with manage-bde, users need to consider the specific needs of the volume they are encrypting prior to running Windows PowerShell cmdlets.
|
||||||
|
|
||||||
`Get-BitLockerVolume C: | fl`
|
A good initial step is to determine the current state of the volume(s) on the computer. You can do this using the `Get-BitLocker` volume cmdlet. The output from this cmdlet displays information on the volume type, protectors, protection status, and other useful information.
|
||||||
|
|
||||||
|
Occasionally, all protectors may not be shown when using **Get-BitLockerVolume** due to lack of space in the output display. If you do not see all of the protectors for a volume, you can use the Windows PowerShell pipe command (|) to format a listing of the protectors.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> In the event that there are more than four protectors for a volume, the pipe command may run out of display space. For volumes with more than four protectors, use the method described in the section below to generate a listing of all protectors with protector ID.
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
Get-BitLockerVolume C: | fl
|
||||||
|
```
|
||||||
|
|
||||||
If you wanted to remove the existing protectors prior to provisioning BitLocker on the volume, you can utilize the `Remove-BitLockerKeyProtector` cmdlet. Accomplishing this requires the GUID associated with the protector to be removed.
|
If you wanted to remove the existing protectors prior to provisioning BitLocker on the volume, you can utilize the `Remove-BitLockerKeyProtector` cmdlet. Accomplishing this requires the GUID associated with the protector to be removed.
|
||||||
A simple script can pipe the values of each **Get-BitLockerVolume** return out to another variable as seen below:
|
A simple script can pipe the values of each **Get-BitLockerVolume** return out to another variable as seen below:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
$vol = Get-BitLockerVolume
|
$vol = Get-BitLockerVolume
|
||||||
$keyprotectors = $vol.KeyProtector
|
$keyprotectors = $vol.KeyProtector
|
||||||
```
|
```
|
||||||
|
|
||||||
Using this, we can display the information in the **$keyprotectors** variable to determine the GUID for each protector.
|
Using this, we can display the information in the **$keyprotectors** variable to determine the GUID for each protector.
|
||||||
Using this information, we can then remove the key protector for a specific volume using the command:
|
Using this information, we can then remove the key protector for a specific volume using the command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Remove-BitLockerKeyProtector <volume>: -KeyProtectorID "{GUID}"
|
Remove-BitLockerKeyProtector <volume>: -KeyProtectorID "{GUID}"
|
||||||
```
|
```
|
||||||
> **Note:** The BitLocker cmdlet requires the key protector GUID enclosed in quotation marks to execute. Ensure the entire GUID, with braces, is included in the command.
|
|
||||||
|
> [!NOTE]
|
||||||
|
> The BitLocker cmdlet requires the key protector GUID enclosed in quotation marks to execute. Ensure the entire GUID, with braces, is included in the command.
|
||||||
|
|
||||||
### Operating system volume
|
### Operating system volume
|
||||||
|
|
||||||
Using the BitLocker Windows PowerShell cmdlets is similar to working with the manage-bde tool for encrypting operating system volumes. Windows PowerShell offers users a lot of flexibility. For example, users can add the desired protector as part command for encrypting the volume. Below are examples of common user scenarios and steps to accomplish them using the BitLocker cmdlets for Windows PowerShell.
|
Using the BitLocker Windows PowerShell cmdlets is similar to working with the manage-bde tool for encrypting operating system volumes. Windows PowerShell offers users a lot of flexibility. For example, users can add the desired protector as part command for encrypting the volume. Below are examples of common user scenarios and steps to accomplish them using the BitLocker cmdlets for Windows PowerShell.
|
||||||
@ -402,11 +348,13 @@ To enable BitLocker with just the TPM protector. This can be done using the comm
|
|||||||
```powershell
|
```powershell
|
||||||
Enable-BitLocker C:
|
Enable-BitLocker C:
|
||||||
```
|
```
|
||||||
|
|
||||||
The example below adds one additional protector, the StartupKey protectors, and chooses to skip the BitLocker hardware test. In this example, encryption starts immediately without the need for a reboot.
|
The example below adds one additional protector, the StartupKey protectors, and chooses to skip the BitLocker hardware test. In this example, encryption starts immediately without the need for a reboot.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Enable-BitLocker C: -StartupKeyProtector -StartupKeyPath <path> -SkipHardwareTest
|
Enable-BitLocker C: -StartupKeyProtector -StartupKeyPath <path> -SkipHardwareTest
|
||||||
```
|
```
|
||||||
|
|
||||||
### Data volume
|
### Data volume
|
||||||
|
|
||||||
Data volume encryption using Windows PowerShell is the same as for operating system volumes. You should add the desired protectors prior to encrypting the volume. The following example adds a password protector to the E: volume using the variable $pw as the password. The $pw variable is held as a SecureString value to store the user defined password. Last, encryption begins.
|
Data volume encryption using Windows PowerShell is the same as for operating system volumes. You should add the desired protectors prior to encrypting the volume. The following example adds a password protector to the E: volume using the variable $pw as the password. The $pw variable is held as a SecureString value to store the user defined password. Last, encryption begins.
|
||||||
@ -416,33 +364,40 @@ $pw = Read-Host -AsSecureString
|
|||||||
<user inputs password>
|
<user inputs password>
|
||||||
Enable-BitLockerKeyProtector E: -PasswordProtector -Password $pw
|
Enable-BitLockerKeyProtector E: -PasswordProtector -Password $pw
|
||||||
```
|
```
|
||||||
|
|
||||||
### Using a SID based protector in Windows PowerShell
|
### Using a SID based protector in Windows PowerShell
|
||||||
|
|
||||||
The ADAccountOrGroup protector is an Active Directory SID-based protector. This protector can be added to both operating system and data volumes, although it does not unlock operating system volumes in the pre-boot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a cluster-aware disk by adding a SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover and be unlocked to any member computer of the cluster.
|
The ADAccountOrGroup protector is an Active Directory SID-based protector. This protector can be added to both operating system and data volumes, although it does not unlock operating system volumes in the pre-boot environment. The protector requires the SID for the domain account or group to link with the protector. BitLocker can protect a cluster-aware disk by adding a SID-based protector for the Cluster Name Object (CNO) that lets the disk properly failover and be unlocked to any member computer of the cluster.
|
||||||
|
|
||||||
>**Warning:** The SID-based protector requires the use of an additional protector (such as TPM, PIN, recovery key, etc.) when used on operating system volumes.
|
> [!WARNING]
|
||||||
|
> The SID-based protector requires the use of an additional protector (such as TPM, PIN, recovery key, etc.) when used on operating system volumes.
|
||||||
|
|
||||||
To add an ADAccountOrGroup protector to a volume requires either the actual domain SID or the group name preceded by the domain and a backslash. In the example below, the CONTOSO\\Administrator account is added as a protector to the data volume G.
|
To add an ADAccountOrGroup protector to a volume requires either the actual domain SID or the group name preceded by the domain and a backslash. In the example below, the CONTOSO\\Administrator account is added as a protector to the data volume G.
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Enable-BitLocker G: -AdAccountOrGroupProtector -AdAccountOrGroup CONTOSO\Administrator
|
Enable-BitLocker G: -AdAccountOrGroupProtector -AdAccountOrGroup CONTOSO\Administrator
|
||||||
```
|
```
|
||||||
|
|
||||||
For users who wish to use the SID for the account or group, the first step is to determine the SID associated with the account. To get the specific SID for a user account in Windows PowerShell, use the following command:
|
For users who wish to use the SID for the account or group, the first step is to determine the SID associated with the account. To get the specific SID for a user account in Windows PowerShell, use the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
get-aduser -filter {samaccountname -eq "administrator"}
|
Get-ADUser -filter {samaccountname -eq "administrator"}
|
||||||
```
|
```
|
||||||
> **Note:** Use of this command requires the RSAT-AD-PowerShell feature.
|
|
||||||
>
|
> [!NOTE]
|
||||||
|
> Use of this command requires the RSAT-AD-PowerShell feature.
|
||||||
|
>
|
||||||
> **Tip:** In addition to the Windows PowerShell command above, information about the locally logged on user and group membership can be found using: WHOAMI /ALL. This does not require the use of additional features.
|
> **Tip:** In addition to the Windows PowerShell command above, information about the locally logged on user and group membership can be found using: WHOAMI /ALL. This does not require the use of additional features.
|
||||||
|
|
||||||
In the example below, the user wishes to add a domain SID based protector to the previously encrypted operating system volume. The user knows the SID for the user account or group they wish to add and uses the following command:
|
In the example below, the user wishes to add a domain SID based protector to the previously encrypted operating system volume. The user knows the SID for the user account or group they wish to add and uses the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup "<SID>"
|
Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup "<SID>"
|
||||||
```
|
```
|
||||||
> **Note:** Active Directory-based protectors are normally used to unlock Failover Cluster enabled volumes.
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Active Directory-based protectors are normally used to unlock Failover Cluster enabled volumes.
|
||||||
|
|
||||||
## <a href="" id="bkmk-dep5"></a> Checking BitLocker status
|
## <a href="" id="bkmk-dep5"></a> Checking BitLocker status
|
||||||
|
|
||||||
To check the BitLocker status of a particular volume, administrators can look at the status of the drive in the BitLocker control panel applet, Windows Explorer, manage-bde command line tool, or Windows PowerShell cmdlets. Each option offers different levels of detail and ease of use. We will look at each of the available methods in the following section.
|
To check the BitLocker status of a particular volume, administrators can look at the status of the drive in the BitLocker control panel applet, Windows Explorer, manage-bde command line tool, or Windows PowerShell cmdlets. Each option offers different levels of detail and ease of use. We will look at each of the available methods in the following section.
|
||||||
@ -457,7 +412,7 @@ Checking BitLocker status with the control panel is the most common method used
|
|||||||
| **Off**| BitLocker is not enabled for the volume |
|
| **Off**| BitLocker is not enabled for the volume |
|
||||||
| **Suspended** | BitLocker is suspended and not actively protecting the volume |
|
| **Suspended** | BitLocker is suspended and not actively protecting the volume |
|
||||||
| **Waiting for Activation**| BitLocker is enabled with a clear protector key and requires further action to be fully protected|
|
| **Waiting for Activation**| BitLocker is enabled with a clear protector key and requires further action to be fully protected|
|
||||||
|
|
||||||
If a drive is pre-provisioned with BitLocker, a status of "Waiting for Activation" displays with a yellow exclamation icon on the volume. This status means that there was only a clear protector used when encrypting the volume. In this case, the volume is not in a protected state and needs to have a secure key added to the volume before the drive is fully protected. Administrators can use the control panel, manage-bde tool, or WMI APIs to add an appropriate key protector. Once complete, the control panel will update to reflect the new status.
|
If a drive is pre-provisioned with BitLocker, a status of "Waiting for Activation" displays with a yellow exclamation icon on the volume. This status means that there was only a clear protector used when encrypting the volume. In this case, the volume is not in a protected state and needs to have a secure key added to the volume before the drive is fully protected. Administrators can use the control panel, manage-bde tool, or WMI APIs to add an appropriate key protector. Once complete, the control panel will update to reflect the new status.
|
||||||
Using the control panel, administrators can choose **Turn on BitLocker** to start the BitLocker Drive Encryption wizard and add a protector, like PIN for an operating system volume (or password if no TPM exists), or a password or smart card protector to a data volume.
|
Using the control panel, administrators can choose **Turn on BitLocker** to start the BitLocker Drive Encryption wizard and add a protector, like PIN for an operating system volume (or password if no TPM exists), or a password or smart card protector to a data volume.
|
||||||
The drive security window displays prior to changing the volume status. Selecting **Activate BitLocker** will complete the encryption process.
|
The drive security window displays prior to changing the volume status. Selecting **Activate BitLocker** will complete the encryption process.
|
||||||
@ -473,8 +428,10 @@ To check the status of a volume using manage-bde, use the following command:
|
|||||||
```powershell
|
```powershell
|
||||||
manage-bde -status <volume>
|
manage-bde -status <volume>
|
||||||
```
|
```
|
||||||
> **Note:** If no volume letter is associated with the -status command, all volumes on the computer display their status.
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If no volume letter is associated with the -status command, all volumes on the computer display their status.
|
||||||
|
|
||||||
### Checking BitLocker status with Windows PowerShell
|
### Checking BitLocker status with Windows PowerShell
|
||||||
|
|
||||||
Windows PowerShell commands offer another way to query BitLocker status for volumes. Like manage-bde, Windows PowerShell includes the advantage of being able to check the status of a volume on a remote computer.
|
Windows PowerShell commands offer another way to query BitLocker status for volumes. Like manage-bde, Windows PowerShell includes the advantage of being able to check the status of a volume on a remote computer.
|
||||||
@ -484,6 +441,7 @@ Using the Get-BitLockerVolume cmdlet, each volume on the system will display its
|
|||||||
```powershell
|
```powershell
|
||||||
Get-BitLockerVolume <volume> -Verbose | fl
|
Get-BitLockerVolume <volume> -Verbose | fl
|
||||||
```
|
```
|
||||||
|
|
||||||
This command will display information about the encryption method, volume type, key protectors, etc.
|
This command will display information about the encryption method, volume type, key protectors, etc.
|
||||||
|
|
||||||
### Provisioning BitLocker during operating system deployment
|
### Provisioning BitLocker during operating system deployment
|
||||||
@ -510,11 +468,13 @@ Decrypting volumes using manage-bde is very straightforward. Decryption with man
|
|||||||
```powershell
|
```powershell
|
||||||
manage-bde -off C:
|
manage-bde -off C:
|
||||||
```
|
```
|
||||||
|
|
||||||
This command disables protectors while it decrypts the volume and removes all protectors when decryption is complete. If a user wishes to check the status of the decryption, they can use the following command:
|
This command disables protectors while it decrypts the volume and removes all protectors when decryption is complete. If a user wishes to check the status of the decryption, they can use the following command:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
manage-bde -status C:
|
manage-bde -status C:
|
||||||
```
|
```
|
||||||
|
|
||||||
### Decrypting volumes using the BitLocker Windows PowerShell cmdlets
|
### Decrypting volumes using the BitLocker Windows PowerShell cmdlets
|
||||||
|
|
||||||
Decryption with Windows PowerShell cmdlets is straightforward, similar to manage-bde. The additional advantage Windows PowerShell offers is the ability to decrypt multiple drives in one pass. In the example below, the user has three encrypted volumes, which they wish to decrypt.
|
Decryption with Windows PowerShell cmdlets is straightforward, similar to manage-bde. The additional advantage Windows PowerShell offers is the ability to decrypt multiple drives in one pass. In the example below, the user has three encrypted volumes, which they wish to decrypt.
|
||||||
@ -524,16 +484,16 @@ Using the Disable-BitLocker command, they can remove all protectors and encrypti
|
|||||||
```powershell
|
```powershell
|
||||||
Disable-BitLocker
|
Disable-BitLocker
|
||||||
```
|
```
|
||||||
|
|
||||||
If a user did not want to input each mount point individually, using the `-MountPoint` parameter in an array can sequence the same command into one line without requiring additional user input. An example command is:
|
If a user did not want to input each mount point individually, using the `-MountPoint` parameter in an array can sequence the same command into one line without requiring additional user input. An example command is:
|
||||||
|
|
||||||
```powershell
|
```powershell
|
||||||
Disable-BitLocker -MountPoint E:,F:,G:
|
Disable-BitLocker -MountPoint E:,F:,G:
|
||||||
```
|
```
|
||||||
|
|
||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
- [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||||
- [BitLocker recovery guide](bitlocker-recovery-guide-plan.md)
|
- [BitLocker recovery guide](bitlocker-recovery-guide-plan.md)
|
||||||
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
- [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md)
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](bitlocker-overview.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -95,7 +95,7 @@ The server side configuration to enable Network Unlock also requires provisionin
|
|||||||
|
|
||||||
The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012.
|
The following steps allow an administrator to configure Network Unlock in a domain where the Domain Functional Level is at least Windows Server 2012.
|
||||||
|
|
||||||
### <a href="" id="bkmk-installwdsrole"/>Install the WDS Server role
|
### <a href="" id="bkmk-installwdsrole"><a/>Install the WDS Server role
|
||||||
|
|
||||||
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager.
|
The BitLocker Network Unlock feature will install the WDS role if it is not already installed. If you want to install it separately before you install BitLocker Network Unlock you can use Server Manager or Windows PowerShell. To install the role using Server Manager, select the **Windows Deployment Services** role in Server Manager.
|
||||||
|
|
||||||
@ -107,7 +107,7 @@ Install-WindowsFeature WDS-Deployment
|
|||||||
|
|
||||||
You must configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. You can do using the WDS management tool, wdsmgmt.msc, which starts the Windows Deployment Services Configuration Wizard.
|
You must configure the WDS server so that it can communicate with DHCP (and optionally Active Directory Domain Services) and the client computer. You can do using the WDS management tool, wdsmgmt.msc, which starts the Windows Deployment Services Configuration Wizard.
|
||||||
|
|
||||||
### <a href="" id="bkmk-confirmwdsrunning"/>Confirm the WDS Service is running
|
### <a href="" id="bkmk-confirmwdsrunning"><a/>Confirm the WDS Service is running
|
||||||
|
|
||||||
To confirm the WDS service is running, use the Services Management Console or Windows PowerShell. To confirm the service is running in Services Management Console, open the console using **services.msc** and check the status of the Windows Deployment Services service.
|
To confirm the WDS service is running, use the Services Management Console or Windows PowerShell. To confirm the service is running in Services Management Console, open the console using **services.msc** and check the status of the Windows Deployment Services service.
|
||||||
|
|
||||||
@ -116,7 +116,7 @@ To confirm the service is running using Windows PowerShell, use the following co
|
|||||||
```powershell
|
```powershell
|
||||||
Get-Service WDSServer
|
Get-Service WDSServer
|
||||||
```
|
```
|
||||||
### <a href="" id="bkmk-installnufeature"/>Install the Network Unlock feature
|
### <a href="" id="bkmk-installnufeature"><a/>Install the Network Unlock feature
|
||||||
|
|
||||||
To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature using Server Manager, select the **BitLocker Network Unlock** feature in the Server Manager console.
|
To install the Network Unlock feature, use Server Manager or Windows PowerShell. To install the feature using Server Manager, select the **BitLocker Network Unlock** feature in the Server Manager console.
|
||||||
|
|
||||||
@ -125,7 +125,7 @@ To install the feature using Windows PowerShell, use the following command:
|
|||||||
```powershell
|
```powershell
|
||||||
Install-WindowsFeature BitLocker-NetworkUnlock
|
Install-WindowsFeature BitLocker-NetworkUnlock
|
||||||
```
|
```
|
||||||
### <a href="" id="bkmk-createcerttmpl"/>Create the certificate template for Network Unlock
|
### <a href="" id="bkmk-createcerttmpl"><a/>Create the certificate template for Network Unlock
|
||||||
|
|
||||||
A properly configured Active Directory Services Certification Authority can use this certificate template to create and issue Network Unlock certificates.
|
A properly configured Active Directory Services Certification Authority can use this certificate template to create and issue Network Unlock certificates.
|
||||||
|
|
||||||
@ -155,7 +155,7 @@ To add the Network Unlock template to the Certification Authority, open the Cert
|
|||||||
|
|
||||||
After adding the Network Unlock template to the Certification Authority, this certificate can be used to configure BitLocker Network Unlock.
|
After adding the Network Unlock template to the Certification Authority, this certificate can be used to configure BitLocker Network Unlock.
|
||||||
|
|
||||||
### <a href="" id="bkmk-createcert"/>Create the Network Unlock certificate
|
### <a href="" id="bkmk-createcert"><a/>Create the Network Unlock certificate
|
||||||
|
|
||||||
Network Unlock can use imported certificates from an existing PKI infrastructure, or you can use a self-signed certificate.
|
Network Unlock can use imported certificates from an existing PKI infrastructure, or you can use a self-signed certificate.
|
||||||
|
|
||||||
@ -218,7 +218,7 @@ Certreq example:
|
|||||||
|
|
||||||
3. Open an elevated command prompt and use the certreq tool to create a new certificate using the following command, specifying the full path to the file created previously, along with the file name:
|
3. Open an elevated command prompt and use the certreq tool to create a new certificate using the following command, specifying the full path to the file created previously, along with the file name:
|
||||||
|
|
||||||
``` syntax
|
```cmd
|
||||||
certreq -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer
|
certreq -new BitLocker-NetworkUnlock.inf BitLocker-NetworkUnlock.cer
|
||||||
```
|
```
|
||||||
|
|
||||||
@ -226,7 +226,7 @@ Certreq example:
|
|||||||
5. Launch Certificates - Local Machine by running **certlm.msc**.
|
5. Launch Certificates - Local Machine by running **certlm.msc**.
|
||||||
6. Create a .pfx file by opening the **Certificates – Local Computer\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file.
|
6. Create a .pfx file by opening the **Certificates – Local Computer\\Personal\\Certificates** path in the navigation pane, right-clicking the previously imported certificate, selecting **All Tasks**, then **Export**. Follow through the wizard to create the .pfx file.
|
||||||
|
|
||||||
### <a href="" id="bkmk-deploycert"/>Deploy the private key and certificate to the WDS server
|
### <a href="" id="bkmk-deploycert"><a/>Deploy the private key and certificate to the WDS server
|
||||||
|
|
||||||
With the certificate and key created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates, do the following:
|
With the certificate and key created, deploy them to the infrastructure to properly unlock systems. To deploy the certificates, do the following:
|
||||||
|
|
||||||
@ -281,6 +281,7 @@ SUBNET2=10.185.252.200/28
|
|||||||
SUBNET3= 2001:4898:a:2::/64 ; an IPv6 subnet
|
SUBNET3= 2001:4898:a:2::/64 ; an IPv6 subnet
|
||||||
SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more useful names, like BUILDING9-EXCEPT-RECEP.
|
SUBNET4=2001:4898:a:3::/64; in production, the admin would likely give more useful names, like BUILDING9-EXCEPT-RECEP.
|
||||||
```
|
```
|
||||||
|
|
||||||
Following the \[SUBNETS\] section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define subnets clients can be unlocked from with that certificate.
|
Following the \[SUBNETS\] section, there can be sections for each Network Unlock certificate, identified by the certificate thumbprint formatted without any spaces, which define subnets clients can be unlocked from with that certificate.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
@ -288,8 +289,9 @@ Following the \[SUBNETS\] section, there can be sections for each Network Unlock
|
|||||||
|
|
||||||
Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnet is listed in a certificate section, then only those subnets listed are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate does not have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. This means for restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section.
|
Subnet restrictions are defined within each certificate section by denoting the allowed list of permitted subnets. If any subnet is listed in a certificate section, then only those subnets listed are permitted for that certificate. If no subnet is listed in a certificate section, then all subnets are permitted for that certificate. If a certificate does not have a section in the subnet policy configuration file, then no subnet restrictions are applied for unlocking with that certificate. This means for restrictions to apply to every certificate, there must be a certificate section for every Network Unlock certificate on the server, and an explicit allowed list set for each certificate section.
|
||||||
Subnet lists are created by putting the name of a subnet from the \[SUBNETS\] section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by simply commenting it out with a prepended semi-colon.
|
Subnet lists are created by putting the name of a subnet from the \[SUBNETS\] section on its own line below the certificate section header. Then, the server will only unlock clients with this certificate on the subnet(s) specified as in the list. For troubleshooting, a subnet can be quickly excluded without deleting it from the section by simply commenting it out with a prepended semi-colon.
|
||||||
|
|
||||||
```ini
|
```ini
|
||||||
[2158a767e1c14e88e27a4c0aee111d2de2eafe60]
|
[2158a767e1c14e88e27a4c0aee111d2de2eafe60]
|
||||||
;Comments could be added here to indicate when the cert was issued, which Group Policy should get it, and so on.
|
;Comments could be added here to indicate when the cert was issued, which Group Policy should get it, and so on.
|
||||||
;This list shows this cert is only allowed to unlock clients on SUBNET1 and SUBNET3 subnets. In this example, SUBNET2 is commented out.
|
;This list shows this cert is only allowed to unlock clients on SUBNET1 and SUBNET3 subnets. In this example, SUBNET2 is commented out.
|
||||||
SUBNET1
|
SUBNET1
|
||||||
@ -299,17 +301,20 @@ SUBNET3
|
|||||||
|
|
||||||
To disallow the use of a certificate altogether, its subnet list may contain the line “DISABLED".
|
To disallow the use of a certificate altogether, its subnet list may contain the line “DISABLED".
|
||||||
|
|
||||||
## <a href="" id="bkmk-turnoffnetworkunlock"/>Turning off Network Unlock
|
## <a href="" id="bkmk-turnoffnetworkunlock"><a/>Turning off Network Unlock
|
||||||
|
|
||||||
To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain.
|
To turn off the unlock server, the PXE provider can be unregistered from the WDS server or uninstalled altogether. However, to stop clients from creating Network Unlock protectors the **Allow Network Unlock at startup** Group Policy setting should be disabled. When this policy setting is updated to disabled on client computers any Network Unlock key protectors on the computer will be deleted. Alternatively, the BitLocker Network Unlock certificate policy can be deleted on the domain controller to accomplish the same task for an entire domain.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.
|
> Removing the FVE_NKP certificate store that contains the Network Unlock certificate and key on the WDS server will also effectively disable the server’s ability to respond to unlock requests for that certificate. However, this is seen as an error condition and is not a supported or recommended method for turning off the Network Unlock server.
|
||||||
|
|
||||||
## <a href="" id="bkmk-updatecerts"/>Update Network Unlock certificates
|
## <a href="" id="bkmk-updatecerts"><a/>Update Network Unlock certificates
|
||||||
|
|
||||||
To update the certificates used by Network Unlock, administrators need to import or generate the new certificate for the server and then update the Network Unlock certificate Group Policy setting on the domain controller.
|
To update the certificates used by Network Unlock, administrators need to import or generate the new certificate for the server and then update the Network Unlock certificate Group Policy setting on the domain controller.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Machines that do not get the GPO will ask for the PIN when booting. In this case one needs to investigate and understand why the machine could not get the GPO and update the certificate.
|
||||||
|
|
||||||
## <a href="" id="bkmk-troubleshoot"></a>Troubleshoot Network Unlock
|
## <a href="" id="bkmk-troubleshoot"></a>Troubleshoot Network Unlock
|
||||||
|
|
||||||
Troubleshooting Network Unlock issues begins by verifying the environment. Many times, a small configuration issue will be the root cause of the failure. Items to verify include:
|
Troubleshooting Network Unlock issues begins by verifying the environment. Many times, a small configuration issue will be the root cause of the failure. Items to verify include:
|
||||||
@ -336,7 +341,7 @@ Files to gather when troubleshooting BitLocker Network Unlock include:
|
|||||||
|
|
||||||
1. Start an elevated command prompt and run the following command:
|
1. Start an elevated command prompt and run the following command:
|
||||||
|
|
||||||
``` syntax
|
```cmd
|
||||||
wevtutil sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true
|
wevtutil sl Microsoft-Windows-Deployment-Services-Diagnostics/Debug /e:true
|
||||||
```
|
```
|
||||||
2. Open Event Viewer on the WDS server.
|
2. Open Event Viewer on the WDS server.
|
||||||
|
@ -21,6 +21,7 @@ ms.custom: bitlocker
|
|||||||
# BitLocker recovery guide
|
# BitLocker recovery guide
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
This topic for IT professionals describes how to recover BitLocker keys from AD DS.
|
This topic for IT professionals describes how to recover BitLocker keys from AD DS.
|
||||||
@ -43,7 +44,7 @@ BitLocker recovery is the process by which you can restore access to a BitLocker
|
|||||||
|
|
||||||
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
||||||
|
|
||||||
- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](https://technet.microsoft.com/library/aa998357.aspx) (also configurable through [Windows Intune](https://technet.microsoft.com/library/jj733621.aspx)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](/Exchange/clients/exchange-activesync/exchange-activesync) (also configurable through [Microsoft Intune](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/microsoft-intune)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
||||||
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
||||||
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
||||||
- Failing to boot from a network drive before booting from the hard drive.
|
- Failing to boot from a network drive before booting from the hard drive.
|
||||||
@ -84,14 +85,14 @@ The following list provides examples of specific events that will cause BitLocke
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components.
|
> Before you begin recovery, we recommend that you determine what caused recovery. This might help prevent the problem from occurring again in the future. For instance, if you determine that an attacker has modified your computer by obtaining physical access, you can create new security policies for tracking who has physical presence. After the recovery password has been used to recover access to the PC, BitLocker will reseal the encryption key to the current values of the measured components.
|
||||||
|
|
||||||
For planned scenarios, such as a known hardware or firmware upgrades, you can avoid initiating recovery by temporarily suspending BitLocker protection. Because suspending BitLocker leaves the drive fully encrypted, the administrator can quickly resume BitLocker protection after the planned task has been completed. Using suspend and resume also reseals the encryption key without requiring the entry of the recovery key.
|
For planned scenarios, such as a known hardware or firmware upgrades, you can avoid initiating recovery by temporarily suspending BitLocker protection. Because suspending BitLocker leaves the drive fully encrypted, the administrator can quickly resume BitLocker protection after the planned task has been completed. Using suspend and resume also reseals the encryption key without requiring the entry of the recovery key.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If suspended BitLocker will automatically resume protection when the PC is rebooted, unless a reboot count is specified using the manage-bde command line tool.
|
> If suspended BitLocker will automatically resume protection when the PC is rebooted, unless a reboot count is specified using the manage-bde command line tool.
|
||||||
|
|
||||||
If software maintenance requires the computer be restarted and you are using two-factor authentication, you can enable BitLocker Network Unlock to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method.
|
If software maintenance requires the computer be restarted and you are using two-factor authentication, you can enable BitLocker Network Unlock to provide the secondary authentication factor when the computers do not have an on-premises user to provide the additional authentication method.
|
||||||
|
|
||||||
Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user.
|
Recovery has been described within the context of unplanned or undesired behavior, but you can also cause recovery as an intended production scenario, in order to manage access control. For example, when you redeploy desktop or laptop computers to other departments or employees in your enterprise, you can force BitLocker into recovery before the computer is given to a new user.
|
||||||
|
|
||||||
## <a href="" id="bkmk-testingrecovery"></a>Testing recovery
|
## <a href="" id="bkmk-testingrecovery"></a>Testing recovery
|
||||||
@ -109,17 +110,16 @@ Before you create a thorough BitLocker recovery process, we recommend that you t
|
|||||||
|
|
||||||
1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**.
|
1. On the Start screen, type **cmd.exe**, and then click **Run as administrator**.
|
||||||
2. At the command prompt, type the following command and then press ENTER:
|
2. At the command prompt, type the following command and then press ENTER:
|
||||||
`manage-bde. -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>`
|
`manage-bde -ComputerName <RemoteComputerName> -forcerecovery <BitLockerVolume>`
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because BitLocker will have to be unlocked and disabled manually from the WinRE environment before the OS can boot up again. For more information, see [BitLocker Troubleshooting: Continuous reboot loop with BitLocker recovery on a slate device](https://social.technet.microsoft.com/wiki/contents/articles/18671.bitlocker-troubleshooting-continuous-reboot-loop-with-bitlocker-recovery-on-a-slate-device.aspx).
|
> Recovery triggered by `-forcerecovery` persists for multiple restarts until a TPM protector is added or protection is suspended by the user. When using Modern Standby devices (such as Surface devices), the `-forcerecovery` option is not recommended because BitLocker will have to be unlocked and disabled manually from the WinRE environment before the OS can boot up again. For more information, see [BitLocker Troubleshooting: Continuous reboot loop with BitLocker recovery on a slate device](https://social.technet.microsoft.com/wiki/contents/articles/18671.bitlocker-troubleshooting-continuous-reboot-loop-with-bitlocker-recovery-on-a-slate-device.aspx).
|
||||||
|
|
||||||
## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process
|
## <a href="" id="bkmk-planningrecovery"></a>Planning your recovery process
|
||||||
|
|
||||||
When planning the BitLocker recovery process, first consult your organization's current best practices for recovering sensitive information. For example: How does your enterprise handle lost Windows passwords? How does your organization perform smart card PIN resets? You can use these best practices and related resources (people and tools) to help formulate a BitLocker recovery model.
|
When planning the BitLocker recovery process, first consult your organization's current best practices for recovering sensitive information. For example: How does your enterprise handle lost Windows passwords? How does your organization perform smart card PIN resets? You can use these best practices and related resources (people and tools) to help formulate a BitLocker recovery model.
|
||||||
|
|
||||||
Organizations that rely on BitLocker Drive Encryption and BitLocker To Go to protect data on a large number of computers and removable drives running the Windows 10, Windows 8, or Windows 7 operating systems and Windows to Go should consider using the Microsoft BitLocker Administration and Monitoring (MBAM) Tool version 2.0, which is included in the Microsoft Desktop Optimization Pack (MDOP) for Microsoft Software Assurance. MBAM makes BitLocker implementations easier to deploy and manage and allows administrators to provision and monitor encryption for operating system and fixed drives. MBAM prompts the user before encrypting fixed drives. MBAM also manages recovery keys for fixed and removable drives, making recovery easier to manage. MBAM can be used as part of a Microsoft System Center deployment or as a stand-alone solution. For more info, see [Microsoft BitLocker
|
Organizations that rely on BitLocker Drive Encryption and BitLocker To Go to protect data on a large number of computers and removable drives running the Windows 10, Windows 8, or Windows 7 operating systems and Windows to Go should consider using the Microsoft BitLocker Administration and Monitoring (MBAM) Tool version 2.0, which is included in the Microsoft Desktop Optimization Pack (MDOP) for Microsoft Software Assurance. MBAM makes BitLocker implementations easier to deploy and manage and allows administrators to provision and monitor encryption for operating system and fixed drives. MBAM prompts the user before encrypting fixed drives. MBAM also manages recovery keys for fixed and removable drives, making recovery easier to manage. MBAM can be used as part of a Microsoft System Center deployment or as a stand-alone solution. For more info, see [Microsoft BitLocker Administration and Monitoring](/microsoft-desktop-optimization-pack/mbam-v25/).
|
||||||
Administration and Monitoring](https://technet.microsoft.com/windows/hh826072.aspx).
|
|
||||||
|
|
||||||
After a BitLocker recovery has been initiated, users can use a recovery password to unlock access to encrypted data. You must consider both self-recovery and recovery password retrieval methods for your organization.
|
After a BitLocker recovery has been initiated, users can use a recovery password to unlock access to encrypted data. You must consider both self-recovery and recovery password retrieval methods for your organization.
|
||||||
|
|
||||||
@ -150,7 +150,7 @@ DS** check box if you want to prevent users from enabling BitLocker unless the c
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If the PCs are part of a workgroup, users should be advised to save their BitLocker recovery password with their Microsoft Account online. Having an online copy of your BitLocker recovery password is recommended to help ensure that you do not lose access to your data in the event that recovery is required.
|
> If the PCs are part of a workgroup, users should be advised to save their BitLocker recovery password with their Microsoft Account online. Having an online copy of your BitLocker recovery password is recommended to help ensure that you do not lose access to your data in the event that recovery is required.
|
||||||
|
|
||||||
The BitLocker Recovery Password Viewer for Active Directory Users and Computers tool allows domain administrators to view BitLocker recovery passwords for specific computer objects in Active Directory.
|
The BitLocker Recovery Password Viewer for Active Directory Users and Computers tool allows domain administrators to view BitLocker recovery passwords for specific computer objects in Active Directory.
|
||||||
|
|
||||||
You can use the following list as a template for creating your own recovery process for recovery password retrieval. This sample process uses the BitLocker Recovery Password Viewer for Active Directory Users and Computers tool.
|
You can use the following list as a template for creating your own recovery process for recovery password retrieval. This sample process uses the BitLocker Recovery Password Viewer for Active Directory Users and Computers tool.
|
||||||
@ -191,7 +191,7 @@ Because the recovery password is 48 digits long the user may need to record the
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors.
|
> Because the 48-digit recovery password is long and contains a combination of digits, the user might mishear or mistype the password. The boot-time recovery console uses built-in checksum numbers to detect input errors in each 6-digit block of the 48-digit recovery password, and offers the user the opportunity to correct such errors.
|
||||||
|
|
||||||
### <a href="" id="bkmk-planningpostrecovery"></a>Post-recovery analysis
|
### <a href="" id="bkmk-planningpostrecovery"></a>Post-recovery analysis
|
||||||
|
|
||||||
When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption
|
When a volume is unlocked using a recovery password, an event is written to the event log and the platform validation measurements are reset in the TPM to match the current configuration. Unlocking the volume means that the encryption key has been released and is ready for on-the-fly encryption
|
||||||
@ -227,7 +227,7 @@ The details of this reset can vary according to the root cause of the recovery.
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can perform a BitLocker validation profile reset by suspending and resuming BitLocker.
|
> You can perform a BitLocker validation profile reset by suspending and resuming BitLocker.
|
||||||
|
|
||||||
- [Unknown PIN](#bkmk-unknownpin)
|
- [Unknown PIN](#bkmk-unknownpin)
|
||||||
- [Lost startup key](#bkmk-loststartup)
|
- [Lost startup key](#bkmk-loststartup)
|
||||||
- [Changes to boot files](#bkmk-changebootknown)
|
- [Changes to boot files](#bkmk-changebootknown)
|
||||||
@ -262,19 +262,18 @@ This error might occur if you updated the firmware. As a best practice you shoul
|
|||||||
|
|
||||||
Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
||||||
|
|
||||||
|
|
||||||
## BitLocker recovery screen
|
## BitLocker recovery screen
|
||||||
|
|
||||||
During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery.
|
During BitLocker recovery, Windows can display a custom recovery message and hints that identify where a key can be retrieved from. These improvements can help a user during BitLocker recovery.
|
||||||
|
|
||||||
### Custom recovery message
|
### Custom recovery message
|
||||||
|
|
||||||
BitLocker Group Policy settings in Windows 10, version 1511, let you confiure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support.
|
BitLocker Group Policy settings in Windows 10, version 1511, let you configure a custom recovery message and URL on the BitLocker recovery screen, which can include the address of the BitLocker self-service recovery portal, the IT internal website, or a phone number for support.
|
||||||
|
|
||||||
This policy can be configured using GPO under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Configure pre-boot recovery message and URL**.
|
This policy can be configured using GPO under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **BitLocker Drive Encryption** > **Operating System Drives** > **Configure pre-boot recovery message and URL**.
|
||||||
|
|
||||||
It can also be configured using Intune mobile device management (MDM) in the BitLocker CSP:
|
It can also be configured using Intune mobile device management (MDM) in the BitLocker CSP:
|
||||||
*<LocURI>./Device/Vendor/MSFT/BitLocker/SystemDrivesRecoveryMessage</LocURI>*
|
*\<LocURI>./Device/Vendor/MSFT/BitLocker/SystemDrivesRecoveryMessage\</LocURI>*
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -282,30 +281,26 @@ Example of customized recovery screen:
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### BitLocker recovery key hints
|
### BitLocker recovery key hints
|
||||||
|
|
||||||
BitLocker metadata has been enhanced in Windows 10, version 1903 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume’s recovery key. Hints are displayed on the recovery screen and refer to the location where key has been saved. Hints are displayed in both the modern (blue) and legacy (black) recovery screen. This applies to both the bootmanager recovery screen and the WinRE unlock screen.
|
BitLocker metadata has been enhanced in Windows 10, version 1903 to include information about when and where the BitLocker recovery key was backed up. This information is not exposed through the UI or any public API. It is used solely by the BitLocker recovery screen in the form of hints to help a user locate a volume's recovery key. Hints are displayed on the recovery screen and refer to the location where key has been saved. Hints are displayed in both the modern (blue) and legacy (black) recovery screen. This applies to both the bootmanager recovery screen and the WinRE unlock screen.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> We don't recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure Active Directory (Azure AD) and Microsoft Account.
|
> We don't recommend printing recovery keys or saving them to a file. Instead, use Active Directory backup or a cloud-based backup. Cloud-based backup includes Azure Active Directory (Azure AD) and Microsoft Account.
|
||||||
|
|
||||||
|
|
||||||
There are rules governing which hint is shown during the recovery (in order of processing):
|
There are rules governing which hint is shown during the recovery (in order of processing):
|
||||||
|
|
||||||
1. Always display custom recovery message if it has been configured (using GPO or MDM).
|
1. Always display custom recovery message if it has been configured (using GPO or MDM).
|
||||||
2. Always display generic hint: "For more information, go to https://aka.ms/recoverykeyfaq."
|
2. Always display generic hint: "For more information, go to <https://aka.ms/recoverykeyfaq>".
|
||||||
3. If multiple recovery keys exist on the volume, prioritize the last created (and successfully backed up) recovery key.
|
3. If multiple recovery keys exist on the volume, prioritize the last created (and successfully backed up) recovery key.
|
||||||
4. Prioritize keys with successful backup over keys that have never been backed up.
|
4. Prioritize keys with successful backup over keys that have never been backed up.
|
||||||
5. Prioritize backup hints in the following order for remote backup locations: **Microsoft Account > Azure AD > Active Directory**.
|
5. Prioritize backup hints in the following order for remote backup locations: **Microsoft Account > Azure AD > Active Directory**.
|
||||||
6. If a key has been printed and saved to file, display a combined hint, “Look for a printout or a text file with the key,” instead of two separate hints.
|
6. If a key has been printed and saved to file, display a combined hint, "Look for a printout or a text file with the key," instead of two separate hints.
|
||||||
7. If multiple backups of the same type (remove vs. local) have been performed for the same recovery key, prioritize backup info with latest backed up date.
|
7. If multiple backups of the same type (remove vs. local) have been performed for the same recovery key, prioritize backup info with latest backed up date.
|
||||||
8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, “Contact your organization’s help desk,” will be displayed.
|
8. There is no specific hint for keys saved to an on-premises Active Directory. In this case, a custom message (if configured) or a generic message, "Contact your organization's help desk," will be displayed.
|
||||||
9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system will ask for a key that has been backed up, even if another key is newer.
|
9. If two recovery keys are present on the disk, but only one has been successfully backed up, the system will ask for a key that has been backed up, even if another key is newer.
|
||||||
|
|
||||||
|
|
||||||
#### Example 1 (single recovery key with single backup)
|
#### Example 1 (single recovery key with single backup)
|
||||||
|
|
||||||
@ -378,7 +373,6 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
#### Example 5 (multiple recovery passwords)
|
#### Example 5 (multiple recovery passwords)
|
||||||
|
|
||||||
| Custom URL | No |
|
| Custom URL | No |
|
||||||
@ -408,7 +402,6 @@ There are rules governing which hint is shown during the recovery (in order of p
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
||||||
|
|
||||||
Besides the 48-digit BitLocker recovery password, other types of recovery information are stored in Active Directory. This section describes how this additional information can be used.
|
Besides the 48-digit BitLocker recovery password, other types of recovery information are stored in Active Directory. This section describes how this additional information can be used.
|
||||||
@ -419,7 +412,7 @@ If the recovery methods discussed earlier in this document do not unlock the vol
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You must use the BitLocker Repair tool **repair-bde** to use the BitLocker key package.
|
> You must use the BitLocker Repair tool **repair-bde** to use the BitLocker key package.
|
||||||
|
|
||||||
The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS you must select the **Backup recovery password and key package** option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc).
|
The BitLocker key package is not saved by default. To save the package along with the recovery password in AD DS you must select the **Backup recovery password and key package** option in the Group Policy settings that control the recovery method. You can also export the key package from a working volume. For more details on how to export key packages, see [Retrieving the BitLocker Key Package](#bkmk-appendixc).
|
||||||
|
|
||||||
## <a href="" id="bkmk-appendixb"></a>Resetting recovery passwords
|
## <a href="" id="bkmk-appendixb"></a>Resetting recovery passwords
|
||||||
@ -456,6 +449,7 @@ You can reset the recovery password in two ways:
|
|||||||
```powershell
|
```powershell
|
||||||
Manage-bde –protectors –adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692}
|
Manage-bde –protectors –adbackup C: -id {EXAMPLE6-5507-4924-AA9E-AFB2EB003692}
|
||||||
```
|
```
|
||||||
|
|
||||||
> [!WARNING]
|
> [!WARNING]
|
||||||
> You must include the braces in the ID string.
|
> You must include the braces in the ID string.
|
||||||
|
|
||||||
@ -471,7 +465,7 @@ You can reset the recovery password in two ways:
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> To manage a remote computer, you can specify the remote computer name rather than the local computer name.
|
> To manage a remote computer, you can specify the remote computer name rather than the local computer name.
|
||||||
|
|
||||||
You can use the following sample script to create a VBScript file to reset the recovery passwords.
|
You can use the following sample script to create a VBScript file to reset the recovery passwords.
|
||||||
|
|
||||||
```vb
|
```vb
|
||||||
@ -891,5 +885,3 @@ End Function
|
|||||||
## See also
|
## See also
|
||||||
|
|
||||||
- [BitLocker overview](bitlocker-overview.md)
|
- [BitLocker overview](bitlocker-overview.md)
|
||||||
|
|
||||||
|
|
||||||
|
@ -25,10 +25,10 @@ This article addresses common issues in BitLocker and provides guidelines to tro
|
|||||||
Open Event Viewer and review the following logs under Applications and Services logs\\Microsoft\\Windows:
|
Open Event Viewer and review the following logs under Applications and Services logs\\Microsoft\\Windows:
|
||||||
|
|
||||||
- **BitLocker-API**. Review the Management log, the Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
- **BitLocker-API**. Review the Management log, the Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
||||||
- Microsoft-Windows-BitLocker/BitLocker Operational
|
- Microsoft-Windows-BitLocker-API/BitLocker Operational
|
||||||
- Microsoft-Windows-BitLocker/BitLocker Management
|
- Microsoft-Windows-BitLocker-API/BitLocker Management
|
||||||
|
|
||||||
- **BitLocker-DrivePreparationTool**. Review the Admin log, the **Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
- **BitLocker-DrivePreparationTool**. Review the Admin log, the Operational log, and any other logs that are generated in this folder. The default logs have the following unique names:
|
||||||
- Microsoft-Windows-BitLocker-DrivePreparationTool/Operational
|
- Microsoft-Windows-BitLocker-DrivePreparationTool/Operational
|
||||||
- Microsoft-Windows-BitLocker-DrivePreparationTool/Admin
|
- Microsoft-Windows-BitLocker-DrivePreparationTool/Admin
|
||||||
|
|
||||||
|
@ -96,7 +96,7 @@ Because Secure Boot has protected the bootloader and Trusted Boot has protected
|
|||||||
|
|
||||||
Early Launch Anti-Malware (ELAM) can load a Microsoft or non-Microsoft anti-malware driver before all non-Microsoft boot drivers and applications, thus continuing the chain of trust established by Secure Boot and Trusted Boot. Because the operating system hasn’t started yet, and because Windows needs to boot as quickly as possible, ELAM has a simple task: examine every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it.
|
Early Launch Anti-Malware (ELAM) can load a Microsoft or non-Microsoft anti-malware driver before all non-Microsoft boot drivers and applications, thus continuing the chain of trust established by Secure Boot and Trusted Boot. Because the operating system hasn’t started yet, and because Windows needs to boot as quickly as possible, ELAM has a simple task: examine every boot driver and determine whether it is on the list of trusted drivers. If it’s not trusted, Windows won’t load it.
|
||||||
|
|
||||||
An ELAM driver isn’t a full-featured anti-malware solution; that loads later in the boot process. Windows Defender (included with Windows 10) supports ELAM, as does [Microsoft System Center 2012 Endpoint Protection](https://www.microsoft.com/server-cloud/system-center/endpoint-protection-2012.aspx) and several non-Microsoft anti-malware apps.
|
An ELAM driver isn’t a full-featured anti-malware solution; that loads later in the boot process. Windows Defender (included with Windows 10) supports ELAM, as does [Microsoft System Center 2012 Endpoint Protection](https://docs.microsoft.com/lifecycle/products/microsoft-system-center-2012-endpoint-protection) and several non-Microsoft anti-malware apps.
|
||||||
|
|
||||||
## Measured Boot
|
## Measured Boot
|
||||||
If a PC in your organization does become infected with a rootkit, you need to know about it. Enterprise anti-malware apps can report malware infections to the IT department, but that doesn’t work with rootkits that hide their presence. In other words, you can’t trust the client to tell you whether it’s healthy.
|
If a PC in your organization does become infected with a rootkit, you need to know about it. Enterprise anti-malware apps can report malware infections to the IT department, but that doesn’t work with rootkits that hide their presence. In other words, you can’t trust the client to tell you whether it’s healthy.
|
||||||
@ -129,4 +129,4 @@ Measured Boot uses the power of UEFI, TPM, and Windows 10 to give you a way to
|
|||||||
Secure Boot, Trusted Boot, and Measured Boot create an architecture that is fundamentally resistant to bootkits and rootkits. In Windows 10, these features have the potential to eliminate kernel-level malware from your network. This is the most ground-breaking anti-malware solution that Windows has ever had; it’s leaps and bounds ahead of everything else. With Windows 10, you can truly trust the integrity of your operating system.
|
Secure Boot, Trusted Boot, and Measured Boot create an architecture that is fundamentally resistant to bootkits and rootkits. In Windows 10, these features have the potential to eliminate kernel-level malware from your network. This is the most ground-breaking anti-malware solution that Windows has ever had; it’s leaps and bounds ahead of everything else. With Windows 10, you can truly trust the integrity of your operating system.
|
||||||
|
|
||||||
## Additional resources
|
## Additional resources
|
||||||
- [Windows 10 Enterprise Evaluation](https://technet.microsoft.com/evalcenter/hh699156.aspx?ocid=wc-tn-wctc)
|
- [Windows 10 Enterprise LTSC 2019 or v2004 Evaluation](https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise)
|
||||||
|
@ -18,7 +18,11 @@
|
|||||||
### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
### [Deployment phases](microsoft-defender-atp/deployment-phases.md)
|
||||||
### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md)
|
### [Phase 1: Prepare](microsoft-defender-atp/prepare-deployment.md)
|
||||||
### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md)
|
### [Phase 2: Set up](microsoft-defender-atp/production-deployment.md)
|
||||||
### [Phase 3: Onboard](microsoft-defender-atp/onboarding.md)
|
### [Phase 3: Onboard]()
|
||||||
|
#### [Onboarding overview](microsoft-defender-atp/onboarding.md)
|
||||||
|
##### [Onboarding using Microsoft Endpoint Configuration Manager](microsoft-defender-atp/onboarding-endpoint-configuration-manager.md)
|
||||||
|
##### [Onboarding using Microsoft Endpoint Manager](microsoft-defender-atp/onboarding-endpoint-manager.md)
|
||||||
|
|
||||||
|
|
||||||
## [Migration guides](microsoft-defender-atp/migration-guides.md)
|
## [Migration guides](microsoft-defender-atp/migration-guides.md)
|
||||||
### [Switch from McAfee to Microsoft Defender ATP]()
|
### [Switch from McAfee to Microsoft Defender ATP]()
|
||||||
@ -97,7 +101,7 @@
|
|||||||
#### [Network protection]()
|
#### [Network protection]()
|
||||||
##### [Protect your network](microsoft-defender-atp/network-protection.md)
|
##### [Protect your network](microsoft-defender-atp/network-protection.md)
|
||||||
##### [Evaluate network protection](microsoft-defender-atp/evaluate-network-protection.md)
|
##### [Evaluate network protection](microsoft-defender-atp/evaluate-network-protection.md)
|
||||||
##### [Turning on network protection](microsoft-defender-atp/enable-network-protection.md)
|
##### [Turn on network protection](microsoft-defender-atp/enable-network-protection.md)
|
||||||
|
|
||||||
#### [Web protection]()
|
#### [Web protection]()
|
||||||
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
||||||
|
@ -62,6 +62,17 @@ This event generates every time a new scheduled task is created.
|
|||||||
</Event>
|
</Event>
|
||||||
|
|
||||||
```
|
```
|
||||||
|
>[!NOTE]
|
||||||
|
> Windows 10 Versions 1903 and above augments the event with these additional properties:
|
||||||
|
> Event Version 1.
|
||||||
|
> ***Event XML:***
|
||||||
|
>```
|
||||||
|
> <Data Name="ClientProcessStartKey">5066549580796854</Data>
|
||||||
|
> <Data Name="ClientProcessId">3932</Data>
|
||||||
|
> <Data Name="ParentProcessId">5304</Data>
|
||||||
|
> <Data Name="RpcCallClientLocality">0</Data>
|
||||||
|
> <Data Name="FQDN">DESKTOP-Name</Data>
|
||||||
|
|
||||||
|
|
||||||
***Required Server Roles:*** None.
|
***Required Server Roles:*** None.
|
||||||
|
|
||||||
|
@ -62,6 +62,17 @@ This event generates every time a scheduled task was deleted.
|
|||||||
</Event>
|
</Event>
|
||||||
|
|
||||||
```
|
```
|
||||||
|
>[!NOTE]
|
||||||
|
> Windows 10 Versions 1903 and above augments the event with these additional properties:
|
||||||
|
> Event Version 1.
|
||||||
|
> ***Event XML:***
|
||||||
|
>```
|
||||||
|
> <Data Name="ClientProcessStartKey">5066549580796854</Data>
|
||||||
|
> <Data Name="ClientProcessId">3932</Data>
|
||||||
|
> <Data Name="ParentProcessId">5304</Data>
|
||||||
|
> <Data Name="RpcCallClientLocality">0</Data>
|
||||||
|
> <Data Name="FQDN">DESKTOP-Name</Data>
|
||||||
|
|
||||||
|
|
||||||
***Required Server Roles:*** None.
|
***Required Server Roles:*** None.
|
||||||
|
|
||||||
|
@ -62,6 +62,17 @@ This event generates every time a scheduled task is enabled.
|
|||||||
</Event>
|
</Event>
|
||||||
|
|
||||||
```
|
```
|
||||||
|
>[!NOTE]
|
||||||
|
> Windows 10 Versions 1903 and above augments the event with these additional properties:
|
||||||
|
> Event Version 1.
|
||||||
|
> ***Event XML:***
|
||||||
|
>```
|
||||||
|
> <Data Name="ClientProcessStartKey">5066549580796854</Data>
|
||||||
|
> <Data Name="ClientProcessId">3932</Data>
|
||||||
|
> <Data Name="ParentProcessId">5304</Data>
|
||||||
|
> <Data Name="RpcCallClientLocality">0</Data>
|
||||||
|
> <Data Name="FQDN">DESKTOP-Name</Data>
|
||||||
|
|
||||||
|
|
||||||
***Required Server Roles:*** None.
|
***Required Server Roles:*** None.
|
||||||
|
|
||||||
|
@ -62,6 +62,17 @@ This event generates every time a scheduled task is disabled.
|
|||||||
</Event>
|
</Event>
|
||||||
|
|
||||||
```
|
```
|
||||||
|
>[!NOTE]
|
||||||
|
> Windows 10 Versions 1903 and above augments the event with these additional properties:
|
||||||
|
> Event Version 1.
|
||||||
|
> ***Event XML:***
|
||||||
|
>```
|
||||||
|
> <Data Name="ClientProcessStartKey">5066549580796854</Data>
|
||||||
|
> <Data Name="ClientProcessId">3932</Data>
|
||||||
|
> <Data Name="ParentProcessId">5304</Data>
|
||||||
|
> <Data Name="RpcCallClientLocality">0</Data>
|
||||||
|
> <Data Name="FQDN">DESKTOP-Name</Data>
|
||||||
|
|
||||||
|
|
||||||
***Required Server Roles:*** None.
|
***Required Server Roles:*** None.
|
||||||
|
|
||||||
|
@ -62,6 +62,17 @@ This event generates every time scheduled task was updated/changed.
|
|||||||
</Event>
|
</Event>
|
||||||
|
|
||||||
```
|
```
|
||||||
|
>[!NOTE]
|
||||||
|
> Windows 10 Versions 1903 and above augments the event with these additional properties:
|
||||||
|
> Event Version 1.
|
||||||
|
> ***Event XML:***
|
||||||
|
>```
|
||||||
|
> <Data Name="ClientProcessStartKey">5066549580796854</Data>
|
||||||
|
> <Data Name="ClientProcessId">3932</Data>
|
||||||
|
> <Data Name="ParentProcessId">5304</Data>
|
||||||
|
> <Data Name="RpcCallClientLocality">0</Data>
|
||||||
|
> <Data Name="FQDN">DESKTOP-Name</Data>
|
||||||
|
|
||||||
|
|
||||||
***Required Server Roles:*** None.
|
***Required Server Roles:*** None.
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.date: 10/04/2019
|
|
||||||
ms.reviewer: dansimp
|
ms.reviewer: dansimp
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
@ -23,7 +22,7 @@ Microsoft recommends [a layered approach to securing removable media](https://ak
|
|||||||
1. [Discover plug and play connected events for peripherals in Microsoft Defender ATP advanced hunting](#discover-plug-and-play-connected-events). Identify or investigate suspicious usage activity.
|
1. [Discover plug and play connected events for peripherals in Microsoft Defender ATP advanced hunting](#discover-plug-and-play-connected-events). Identify or investigate suspicious usage activity.
|
||||||
|
|
||||||
2. Configure to allow or block only certain removable devices and prevent threats.
|
2. Configure to allow or block only certain removable devices and prevent threats.
|
||||||
1. [Allow or block removable devices](#allow-or-block-removable-devices) based on granular configuration to deny write access to removable disks and approve or deny devices by USB vendor IDs, product IDs, device IDs, or a combination. Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices.
|
1. [Allow or block removable devices](#allow-or-block-removable-devices) based on granular configuration to deny write access to removable disks and approve or deny devices by using USB device IDs. Flexible policy assignment of device installation settings based on an individual or group of Azure Active Directory (Azure AD) users and devices.
|
||||||
|
|
||||||
2. [Prevent threats from removable storage](#prevent-threats-from-removable-storage) introduced by removable storage devices by enabling:
|
2. [Prevent threats from removable storage](#prevent-threats-from-removable-storage) introduced by removable storage devices by enabling:
|
||||||
- Microsoft Defender Antivirus real-time protection (RTP) to scan removable storage for malware.
|
- Microsoft Defender Antivirus real-time protection (RTP) to scan removable storage for malware.
|
||||||
@ -98,35 +97,37 @@ In this example, the following classes needed to be added: HID, Keyboard, and {3
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
If you want to restrict to certain devices, remove the device setup class of the peripheral that you want to limit. Then add the device ID that you want to add. To find the vendor or product IDs, see [Look up device vendor ID or product ID](#look-up-device-vendor-id-or-product-id).
|
If you want to restrict to certain devices, remove the device setup class of the peripheral that you want to limit. Then add the device ID that you want to add. Device ID is based on the vendor ID and product ID values for a device. For information on device ID formats, see [Standard USB Identifiers](https://docs.microsoft.com/windows-hardware/drivers/install/standard-usb-identifiers).
|
||||||
|
|
||||||
|
To find the device IDs, see [Look up device ID](#look-up-device-id).
|
||||||
|
|
||||||
For example:
|
For example:
|
||||||
|
|
||||||
1. Remove class USBDevice from the **Allow installation of devices using drivers that match these device setup**.
|
1. Remove class USBDevice from the **Allow installation of devices using drivers that match these device setup**.
|
||||||
2. Add the vendor ID or product ID to allow in the **Allow installation of device that match any of these device IDs**.
|
2. Add the device ID to allow in the **Allow installation of device that match any of these device IDs**.
|
||||||
|
|
||||||
|
|
||||||
#### Prevent installation and usage of USB drives and other peripherals
|
#### Prevent installation and usage of USB drives and other peripherals
|
||||||
|
|
||||||
If you want to prevent the installation of a device class or certain devices, you can use the prevent device installation policies:
|
If you want to prevent the installation of a device class or certain devices, you can use the prevent device installation policies:
|
||||||
|
|
||||||
1. Enable **Prevent installation of devices that match any of these device IDs**.
|
1. Enable **Prevent installation of devices that match any of these device IDs** and add these devices to the list.
|
||||||
2. Enable **Prevent installation of devices using drivers that match these device setup classes**.
|
2. Enable **Prevent installation of devices using drivers that match these device setup classes**.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> The prevent device installation policies take precedence over the allow device installation policies.
|
> The prevent device installation policies take precedence over the allow device installation policies.
|
||||||
|
|
||||||
The **Prevent installation of devices that match any of these device IDs** policy allows you to specify a list of vendor or product IDs for devices that Windows is prevented from installing.
|
The **Prevent installation of devices that match any of these device IDs** policy allows you to specify a list of devices that Windows is prevented from installing.
|
||||||
|
|
||||||
To prevent installation of devices that match any of these device IDs:
|
To prevent installation of devices that match any of these device IDs:
|
||||||
|
|
||||||
1. [Look up device vendor ID or product ID](#look-up-device-vendor-id-or-product-id) for devices that you want Windows to prevent from installing.
|
1. [Look up device ID](#look-up-device-id) for devices that you want Windows to prevent from installing.
|
||||||

|

|
||||||
2. Enable **Prevent installation of devices that match any of these device IDs** and add the vendor or product IDs to the list.
|
2. Enable **Prevent installation of devices that match any of these device IDs** and add the vendor or product IDs to the list.
|
||||||

|

|
||||||
|
|
||||||
#### Look up device vendor ID or product ID
|
#### Look up device ID
|
||||||
You can use Device Manager to look up a device vendor or product ID.
|
You can use Device Manager to look up a device ID.
|
||||||
|
|
||||||
1. Open Device Manager.
|
1. Open Device Manager.
|
||||||
2. Click **View** and select **Devices by connection**.
|
2. Click **View** and select **Devices by connection**.
|
||||||
@ -135,11 +136,11 @@ You can use Device Manager to look up a device vendor or product ID.
|
|||||||
5. Click the **Property** drop-down list and select **Hardware Ids**.
|
5. Click the **Property** drop-down list and select **Hardware Ids**.
|
||||||
6. Right-click the top ID value and select **Copy**.
|
6. Right-click the top ID value and select **Copy**.
|
||||||
|
|
||||||
For information on vendor and product ID formats, see [Standard USB Identifiers](https://docs.microsoft.com/windows-hardware/drivers/install/standard-usb-identifiers).
|
For information about Device ID formats, see [Standard USB Identifiers](https://docs.microsoft.com/windows-hardware/drivers/install/standard-usb-identifiers).
|
||||||
|
|
||||||
For information on vendor IDs, see [USB members](https://www.usb.org/members).
|
For information on vendor IDs, see [USB members](https://www.usb.org/members).
|
||||||
|
|
||||||
The following is an example for looking up a device vendor ID or product ID using PowerShell:
|
The following is an example for looking up a device vendor ID or product ID (which is part of the device ID) using PowerShell:
|
||||||
``` PowerShell
|
``` PowerShell
|
||||||
Get-WMIObject -Class Win32_DiskDrive |
|
Get-WMIObject -Class Win32_DiskDrive |
|
||||||
Select-Object -Property *
|
Select-Object -Property *
|
||||||
|
@ -27,7 +27,7 @@ Macro malware was fairly common several years ago because macros ran automatical
|
|||||||
|
|
||||||
We've seen macro malware download threats from the following families:
|
We've seen macro malware download threats from the following families:
|
||||||
|
|
||||||
* [Ransom:MSIL/Swappa](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Ransom:MSIL/Swappa.A)
|
* [Ransom:MSIL/Swappa](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Ransom:MSIL/Swappa.A)
|
||||||
* [Ransom:Win32/Teerac](Ransom:Win32/Teerac)
|
* [Ransom:Win32/Teerac](Ransom:Win32/Teerac)
|
||||||
* [TrojanDownloader:Win32/Chanitor](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Chanitor.A)
|
* [TrojanDownloader:Win32/Chanitor](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanDownloader:Win32/Chanitor.A)
|
||||||
* [TrojanSpy:Win32/Ursnif](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanSpy:Win32/Ursnif)
|
* [TrojanSpy:Win32/Ursnif](https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=TrojanSpy:Win32/Ursnif)
|
||||||
|
@ -17,6 +17,9 @@ manager: dansimp
|
|||||||
Microsoft Baseline Security Analyzer (MBSA) is used to verify patch compliance. MBSA also performed several other security checks for Windows, IIS, and SQL Server. Unfortunately, the logic behind these additional checks had not been actively maintained since Windows XP and Windows Server 2003. Changes in the products since then rendered many of these security checks obsolete and some of their recommendations counterproductive.
|
Microsoft Baseline Security Analyzer (MBSA) is used to verify patch compliance. MBSA also performed several other security checks for Windows, IIS, and SQL Server. Unfortunately, the logic behind these additional checks had not been actively maintained since Windows XP and Windows Server 2003. Changes in the products since then rendered many of these security checks obsolete and some of their recommendations counterproductive.
|
||||||
|
|
||||||
MBSA was largely used in situations where neither Microsoft Update nor a local WSUS or Configuration Manager server was available, or as a compliance tool to ensure that all security updates were deployed to a managed environment. While MBSA version 2.3 introduced support for Windows Server 2012 R2 and Windows 8.1, it has since been deprecated and no longer developed. MBSA 2.3 is not updated to fully support Windows 10 and Windows Server 2016.
|
MBSA was largely used in situations where neither Microsoft Update nor a local WSUS or Configuration Manager server was available, or as a compliance tool to ensure that all security updates were deployed to a managed environment. While MBSA version 2.3 introduced support for Windows Server 2012 R2 and Windows 8.1, it has since been deprecated and no longer developed. MBSA 2.3 is not updated to fully support Windows 10 and Windows Server 2016.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> In accordance with our [SHA-1 deprecation initiative](https://aka.ms/sha1deprecation), the Wsusscn2.cab file is no longer dual-signed using both SHA-1 and the SHA-2 suite of hash algorithms (specifically SHA-256). This file is now signed using only SHA-256. Administrators who verify digital signatures on this file should now expect only single SHA-256 signatures. Starting with the August 2020 Wsusscn2.cab file, MBSA will return the following error "The catalog file is damaged or an invalid catalog." when attempting to scan using the offline scan file.
|
||||||
|
|
||||||
## The Solution
|
## The Solution
|
||||||
A script can help you with an alternative to MBSA’s patch-compliance checking:
|
A script can help you with an alternative to MBSA’s patch-compliance checking:
|
||||||
|
@ -13,7 +13,7 @@ ms.author: deniseb
|
|||||||
ms.custom: nextgen
|
ms.custom: nextgen
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.date: 09/07/2020
|
ms.date: 09/10/2020
|
||||||
---
|
---
|
||||||
|
|
||||||
# Manage Microsoft Defender Antivirus updates and apply baselines
|
# Manage Microsoft Defender Antivirus updates and apply baselines
|
||||||
@ -31,6 +31,10 @@ There are two types of updates related to keeping Microsoft Defender Antivirus u
|
|||||||
> Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques.
|
> Keeping Microsoft Defender Antivirus up to date is critical to assure your devices have the latest technology and features needed to protect against new malware and attack techniques.
|
||||||
> This also applies to devices where Microsoft Defender Antivirus is running in [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
> This also applies to devices where Microsoft Defender Antivirus is running in [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility).
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> You can use the below URL to find out what are the current versions:
|
||||||
|
> [https://www.microsoft.com/security/encyclopedia/adlpackages.aspx?action=info](https://www.microsoft.com/security/encyclopedia/adlpackages.aspx?action=info)
|
||||||
|
|
||||||
## Security intelligence updates
|
## Security intelligence updates
|
||||||
|
|
||||||
Microsoft Defender Antivirus uses [cloud-delivered protection](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md) (also called the Microsoft Advanced Protection Service or MAPS) and periodically downloads security intelligence updates to provide protection.
|
Microsoft Defender Antivirus uses [cloud-delivered protection](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md) (also called the Microsoft Advanced Protection Service or MAPS) and periodically downloads security intelligence updates to provide protection.
|
||||||
@ -59,7 +63,7 @@ All our updates contain:
|
|||||||
* integration improvements (Cloud, MTP)
|
* integration improvements (Cloud, MTP)
|
||||||
<br/>
|
<br/>
|
||||||
<details>
|
<details>
|
||||||
<summary> August-2020 (Platform: 4.18.2008.3 | Engine: 1.1.17400.5)</summary>
|
<summary> August-2020 (Platform: 4.18.2008.9 | Engine: 1.1.17400.5)</summary>
|
||||||
|
|
||||||
 Security intelligence update version: **1.323.9.0**
|
 Security intelligence update version: **1.323.9.0**
|
||||||
 Released: **August 27, 2020**
|
 Released: **August 27, 2020**
|
||||||
@ -72,6 +76,7 @@ All our updates contain:
|
|||||||
* Improved scan event telemetry
|
* Improved scan event telemetry
|
||||||
* Improved behavior monitoring for memory scans
|
* Improved behavior monitoring for memory scans
|
||||||
* Improved macro streams scanning
|
* Improved macro streams scanning
|
||||||
|
* Added "AMRunningMode" to Get-MpComputerStatus Powershell CmdLet
|
||||||
|
|
||||||
### Known Issues
|
### Known Issues
|
||||||
No known issues
|
No known issues
|
||||||
@ -221,7 +226,7 @@ Support phase: **Technical upgrade Support (Only)**
|
|||||||
* Support platform updates when TMP is redirected to network path
|
* Support platform updates when TMP is redirected to network path
|
||||||
* Platform and engine versions are added to [WDSI](https://www.microsoft.com/wdsi/defenderupdates)
|
* Platform and engine versions are added to [WDSI](https://www.microsoft.com/wdsi/defenderupdates)
|
||||||
* extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
* extend Emergency signature update to [passive mode](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility)
|
||||||
* Fix 4.18.1911.10 hang
|
* Fix 4.18.1911.3 hang
|
||||||
|
|
||||||
### Known Issues
|
### Known Issues
|
||||||
[**Fixed**] devices utilizing [modern standby mode](https://docs.microsoft.com/windows-hardware/design/device-experiences/modern-standby) may experience a hang with the Windows Defender filter driver that results in a gap of protection. Affected machines appear to the customer as having not updated to the latest antimalware platform.
|
[**Fixed**] devices utilizing [modern standby mode](https://docs.microsoft.com/windows-hardware/design/device-experiences/modern-standby) may experience a hang with the Windows Defender filter driver that results in a gap of protection. Affected machines appear to the customer as having not updated to the latest antimalware platform.
|
||||||
@ -229,14 +234,17 @@ Support phase: **Technical upgrade Support (Only)**
|
|||||||
> [!IMPORTANT]
|
> [!IMPORTANT]
|
||||||
> This updates is needed by RS1 devices running lower version of the platform to support SHA2. <br/>This update has reboot flag for systems that are experiencing the hang issue.<br/> the This update is re-released in April 2020 and will not be superseded by newer updates to keep future availability.
|
> This updates is needed by RS1 devices running lower version of the platform to support SHA2. <br/>This update has reboot flag for systems that are experiencing the hang issue.<br/> the This update is re-released in April 2020 and will not be superseded by newer updates to keep future availability.
|
||||||
<br/>
|
<br/>
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> This update is categorized as an "update" due to its reboot requirement and will only be offered with a [Windows Update](https://support.microsoft.com/help/4027667/windows-10-update)
|
||||||
|
<br/>
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
<details>
|
<details>
|
||||||
<summary> November-2019 (Platform: 4.18.1911.2 | Engine: 1.1.16600.7)</summary>
|
<summary> November-2019 (Platform: 4.18.1911.3 | Engine: 1.1.16600.7)</summary>
|
||||||
|
|
||||||
Security intelligence update version: **1.307.13.0**
|
Security intelligence update version: **1.307.13.0**
|
||||||
Released: **December 7, 2019**
|
Released: **December 7, 2019**
|
||||||
Platform: **4.18.1911.2**
|
Platform: **4.18.1911.3**
|
||||||
Engine: **1.1.17000.7**
|
Engine: **1.1.17000.7**
|
||||||
Support phase: **No support**
|
Support phase: **No support**
|
||||||
|
|
||||||
@ -248,7 +256,7 @@ Support phase: **No support**
|
|||||||
* add MRT logs to support files
|
* add MRT logs to support files
|
||||||
|
|
||||||
### Known Issues
|
### Known Issues
|
||||||
No known issues
|
When this update is installed, the device needs the jump package 4.10.2001.10 to be able to update to the latest platform version.
|
||||||
<br/>
|
<br/>
|
||||||
</details>
|
</details>
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ ms.pagetype: security
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: denisebmsft
|
author: denisebmsft
|
||||||
ms.author: deniseb
|
ms.author: deniseb
|
||||||
ms.date: 03/28/2019
|
ms.date: 09/07/2020
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.custom: asr
|
ms.custom: asr
|
||||||
@ -18,6 +18,7 @@ ms.custom: asr
|
|||||||
|
|
||||||
**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
**Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
|
||||||
Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete.
|
Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete.
|
||||||
|
|
||||||
## What is Application Guard and how does it work?
|
## What is Application Guard and how does it work?
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Turning on network protection
|
title: Turn on network protection
|
||||||
description: Enable Network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
|
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
|
||||||
keywords: ANetwork protection, exploits, malicious website, ip, domain, domains, enable, turn on
|
keywords: ANetwork protection, exploits, malicious website, ip, domain, domains, enable, turn on
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -14,7 +14,7 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Turning on network protection
|
# Turn on network protection
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -22,6 +22,8 @@ manager: dansimp
|
|||||||
|
|
||||||
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it.
|
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it.
|
||||||
|
|
||||||
|
[Learn more about network filtering configuration options](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#network-filtering)
|
||||||
|
|
||||||
## Check if network protection is enabled
|
## Check if network protection is enabled
|
||||||
|
|
||||||
Check if network protection has been enabled on a local device by using Registry editor.
|
Check if network protection has been enabled on a local device by using Registry editor.
|
||||||
@ -40,9 +42,8 @@ Check if network protection has been enabled on a local device by using Registry
|
|||||||
Enable network protection by using any of these methods:
|
Enable network protection by using any of these methods:
|
||||||
|
|
||||||
* [PowerShell](#powershell)
|
* [PowerShell](#powershell)
|
||||||
* [Microsoft Intune](#intune)
|
|
||||||
* [Mobile Device Management (MDM)](#mobile-device-management-mdm)
|
* [Mobile Device Management (MDM)](#mobile-device-management-mdm)
|
||||||
* [Microsoft Endpoint Configuration Manager](#microsoft-endpoint-configuration-manager)
|
* [Microsoft Endpoint Manager / Intune](#microsoft-endpoint-manager-formerly-intune)
|
||||||
* [Group Policy](#group-policy)
|
* [Group Policy](#group-policy)
|
||||||
|
|
||||||
### PowerShell
|
### PowerShell
|
||||||
@ -62,41 +63,17 @@ Enable network protection by using any of these methods:
|
|||||||
|
|
||||||
Use `Disabled` instead of `AuditMode` or `Enabled` to turn off the feature.
|
Use `Disabled` instead of `AuditMode` or `Enabled` to turn off the feature.
|
||||||
|
|
||||||
### Intune
|
### Mobile device management (MDM)
|
||||||
|
|
||||||
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
|
||||||
|
|
||||||
2. Go to **Device configuration** > **Profiles** > **Create profile**.
|
|
||||||
|
|
||||||
3. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Select **Configure** > **Windows Defender Exploit Guard** > **Network filtering** > **Enable**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Select **OK** to save each open section and **Create**.
|
|
||||||
|
|
||||||
6. Select the profile called **Assignments**, assign to **All Users & All Devices**, and **Save**.
|
|
||||||
|
|
||||||
### Mobile Device Management (MDM)
|
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
||||||
|
|
||||||
## Microsoft Endpoint Configuration Manager
|
### Microsoft Endpoint Manager (formerly Intune)
|
||||||
|
|
||||||
1. In Microsoft Endpoint Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
1. Sign into the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com)
|
||||||
|
|
||||||
2. Then go to **Home** > **Create Exploit Guard Policy**.
|
2. Create or edit an [endpoint protection configuration profile](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-configure)
|
||||||
|
|
||||||
3. Enter a name and a description, select **Network protection**, and then **Next**.
|
3. Under "Configuration Settings" in the profile flow, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit only**
|
||||||
|
|
||||||
4. Choose whether to block or audit access to suspicious domains and select **Next**.
|
|
||||||
|
|
||||||
5. Review the settings and select **Next** to create the policy.
|
|
||||||
|
|
||||||
6. After the policy is created, **Close**.
|
|
||||||
|
|
||||||
### Group Policy
|
### Group Policy
|
||||||
|
|
||||||
@ -112,6 +89,9 @@ Use the following procedure to enable network protection on domain-joined comput
|
|||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Network protection**.
|
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Network protection**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
|
||||||
|
|
||||||
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
|
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
|
||||||
* **Block** - Users can't access malicious IP addresses and domains
|
* **Block** - Users can't access malicious IP addresses and domains
|
||||||
* **Disable (Default)** - The Network protection feature won't work. Users won't be blocked from accessing malicious domains
|
* **Disable (Default)** - The Network protection feature won't work. Users won't be blocked from accessing malicious domains
|
||||||
|
After Width: | Height: | Size: 200 KiB |
After Width: | Height: | Size: 4.6 KiB |
After Width: | Height: | Size: 34 KiB |
After Width: | Height: | Size: 11 KiB |
After Width: | Height: | Size: 117 KiB |
After Width: | Height: | Size: 101 KiB |
After Width: | Height: | Size: 33 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 36 KiB |
After Width: | Height: | Size: 89 KiB |
After Width: | Height: | Size: 62 KiB |
After Width: | Height: | Size: 48 KiB |
After Width: | Height: | Size: 45 KiB |
After Width: | Height: | Size: 213 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 72 KiB |
After Width: | Height: | Size: 71 KiB |
After Width: | Height: | Size: 80 KiB |
After Width: | Height: | Size: 56 KiB |
After Width: | Height: | Size: 28 KiB |
After Width: | Height: | Size: 38 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 142 KiB |
After Width: | Height: | Size: 219 KiB |
After Width: | Height: | Size: 24 KiB |
After Width: | Height: | Size: 59 KiB |
After Width: | Height: | Size: 86 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 73 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 30 KiB |
After Width: | Height: | Size: 77 KiB |
After Width: | Height: | Size: 80 KiB |
After Width: | Height: | Size: 75 KiB |
After Width: | Height: | Size: 60 KiB |
After Width: | Height: | Size: 7.9 KiB |
After Width: | Height: | Size: 16 KiB |
After Width: | Height: | Size: 86 KiB |
After Width: | Height: | Size: 32 KiB |
After Width: | Height: | Size: 127 KiB |
After Width: | Height: | Size: 96 KiB |
After Width: | Height: | Size: 148 KiB |
After Width: | Height: | Size: 38 KiB |
After Width: | Height: | Size: 24 KiB |
After Width: | Height: | Size: 61 KiB |
@ -38,7 +38,7 @@ It's important to understand the following requirements prior to creating indica
|
|||||||
|
|
||||||
- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md).
|
- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md).
|
||||||
- The Antimalware client version must be 4.18.1901.x or later.
|
- The Antimalware client version must be 4.18.1901.x or later.
|
||||||
- Supported on machines on Windows 10, version 1703 or later.
|
- Supported on machines on Windows 10, version 1703 or later, Windows server 2016 and 2019.
|
||||||
- The virus and threat protection definitions must be up-to-date.
|
- The virus and threat protection definitions must be up-to-date.
|
||||||
- This feature currently supports entering .CER or .PEM file extensions.
|
- This feature currently supports entering .CER or .PEM file extensions.
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ It's important to understand the following prerequisites prior to creating indic
|
|||||||
|
|
||||||
- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md).
|
- This feature is available if your organization uses Windows Defender Antivirus and Cloud-based protection is enabled. For more information, see [Manage cloud-based protection](../windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md).
|
||||||
- The Antimalware client version must be 4.18.1901.x or later.
|
- The Antimalware client version must be 4.18.1901.x or later.
|
||||||
- Supported on machines on Windows 10, version 1703 or later.
|
- Supported on machines on Windows 10, version 1703 or later, Windows server 2016 and 2019.
|
||||||
- To start blocking files, you first need to [turn the **Block or allow** feature on](advanced-features.md) in Settings.
|
- To start blocking files, you first need to [turn the **Block or allow** feature on](advanced-features.md) in Settings.
|
||||||
- This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including _.exe_ and _.dll_ files. The coverage will be extended over time.
|
- This feature is designed to prevent suspected malware (or potentially malicious files) from being downloaded from the web. It currently supports portable executable (PE) files, including _.exe_ and _.dll_ files. The coverage will be extended over time.
|
||||||
|
|
||||||
@ -76,4 +76,4 @@ Files automatically blocked by an indicator won't show up in the file's Action c
|
|||||||
- [Create indicators](manage-indicators.md)
|
- [Create indicators](manage-indicators.md)
|
||||||
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
|
- [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
|
||||||
- [Create indicators based on certificates](indicator-certificates.md)
|
- [Create indicators based on certificates](indicator-certificates.md)
|
||||||
- [Manage indicators](indicator-manage.md)
|
- [Manage indicators](indicator-manage.md)
|
||||||
|
@ -0,0 +1,226 @@
|
|||||||
|
---
|
||||||
|
title: Microsoft Defender ATP for iOS Application license terms
|
||||||
|
ms.reviewer:
|
||||||
|
description: Describes the Microsoft Defender ATP for iOS license terms
|
||||||
|
keywords: microsoft, defender, atp, iOS, license, terms, application, use, installation, service, feedback, scope,
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
search.appverid: met150
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: sunasing
|
||||||
|
author: sunasing
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection: M365-security-compliance
|
||||||
|
ms.topic: conceptual
|
||||||
|
hideEdit: true
|
||||||
|
---
|
||||||
|
|
||||||
|
# Microsoft Defender ATP for iOS application license terms
|
||||||
|
|
||||||
|
## MICROSOFT APPLICATION LICENSE TERMS: MICROSOFT DEFENDER ATP
|
||||||
|
|
||||||
|
These license terms ("Terms") are an agreement between Microsoft Corporation (or
|
||||||
|
based on where you live, one of its affiliates) and you. Please read them. They
|
||||||
|
apply to the application named above. These Terms also apply to any Microsoft
|
||||||
|
|
||||||
|
- updates,
|
||||||
|
|
||||||
|
- supplements,
|
||||||
|
|
||||||
|
- Internet-based services, and
|
||||||
|
|
||||||
|
- support services
|
||||||
|
|
||||||
|
for this application, unless other terms accompany those items. If so, those
|
||||||
|
terms apply.
|
||||||
|
|
||||||
|
**BY USING THE APPLICATION, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM,
|
||||||
|
DO NOT USE THE APPLICATION.**
|
||||||
|
|
||||||
|
**If you comply with these Terms, you have the perpetual rights below.**
|
||||||
|
|
||||||
|
1. **INSTALLATION AND USE RIGHTS.**
|
||||||
|
|
||||||
|
1. **Installation and Use.** You may install and use any number of copies
|
||||||
|
of this application on iOS enabled device or devices which you own
|
||||||
|
or control. You may use this application with your company's valid
|
||||||
|
subscription of Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) or
|
||||||
|
an online service that includes MDATP functionalities.
|
||||||
|
|
||||||
|
2. **Updates.** Updates or upgrades to MDATP may be required for full
|
||||||
|
functionality. Some functionality may not be available in all countries.
|
||||||
|
|
||||||
|
3. **Third Party Programs.** The application may include third party
|
||||||
|
programs that Microsoft, not the third party, licenses to you under this
|
||||||
|
agreement. Notices, if any, for the third-party program are included for
|
||||||
|
your information only.
|
||||||
|
|
||||||
|
2. **INTERNET ACCESS MAY BE REQUIRED.** You may incur charges related to
|
||||||
|
Internet access, data transfer and other services per the terms of the data
|
||||||
|
service plan and any other agreement you have with your network operator due
|
||||||
|
to use of the application. You are solely responsible for any network
|
||||||
|
operator charges.
|
||||||
|
|
||||||
|
3. **INTERNET-BASED SERVICES.** Microsoft provides Internet-based services with
|
||||||
|
the application. It may change or cancel them at any time.
|
||||||
|
|
||||||
|
1. Consent for Internet-Based or Wireless Services. The application may
|
||||||
|
connect to Internet-based wireless services. Your use of the application
|
||||||
|
operates as your consent to the transmission of standard device
|
||||||
|
information (including but not limited to technical information about
|
||||||
|
your device, system and application software, and peripherals) for
|
||||||
|
Internet-based or wireless services. If other terms are provided in
|
||||||
|
connection with your use of the services, those terms also apply.
|
||||||
|
|
||||||
|
- Data. Some online services require, or may be enhanced by, the
|
||||||
|
installation of local software like this one. At your, or your
|
||||||
|
admin's direction, this software may send data from a device to or
|
||||||
|
from an online service.
|
||||||
|
|
||||||
|
- Usage Data. Microsoft automatically collects usage and performance
|
||||||
|
data over the internet. This data will be used to provide and
|
||||||
|
improve Microsoft products and services and enhance your experience.
|
||||||
|
You may limit or control collection of some usage and performance
|
||||||
|
data through your device settings. Doing so may disrupt your use of
|
||||||
|
certain features of the application. For additional information on
|
||||||
|
Microsoft's data collection and use, see the [Online Services
|
||||||
|
Terms](https://go.microsoft.com/fwlink/?linkid=2106777).
|
||||||
|
|
||||||
|
2. Misuse of Internet-based Services. You may not use any Internet-based
|
||||||
|
service in any way that could harm it or impair anyone else's use of it
|
||||||
|
or the wireless network. You may not use the service to try to gain
|
||||||
|
unauthorized access to any service, data, account or network by any
|
||||||
|
means.
|
||||||
|
|
||||||
|
4. **FEEDBACK.** If you give feedback about the application to Microsoft, you
|
||||||
|
give to Microsoft, without charge, the right to use, share and commercialize
|
||||||
|
your feedback in any way and for any purpose. You also give to third
|
||||||
|
parties, without charge, any patent rights needed for their products,
|
||||||
|
technologies and services to use or interface with any specific parts of a
|
||||||
|
Microsoft software or service that includes the feedback. You will not give
|
||||||
|
feedback that is subject to a license that requires Microsoft to license its
|
||||||
|
software or documentation to third parties because we include your feedback
|
||||||
|
in them. These rights survive this agreement.
|
||||||
|
|
||||||
|
5. **SCOPE OF LICENSE.** The application is licensed, not sold. This agreement
|
||||||
|
only gives you some rights to use the application. Microsoft reserves all
|
||||||
|
other rights. Unless applicable law gives you more rights despite this
|
||||||
|
limitation, you may use the application only as expressly permitted in this
|
||||||
|
agreement. In doing so, you must comply with any technical limitations in
|
||||||
|
the application that only allow you to use it in certain ways. You may not
|
||||||
|
|
||||||
|
- work around any technical limitations in the application;
|
||||||
|
|
||||||
|
- reverse engineer, decompile or disassemble the application, except and
|
||||||
|
only to the extent that applicable law expressly permits, despite this
|
||||||
|
limitation;
|
||||||
|
|
||||||
|
- make more copies of the application than specified in this agreement or
|
||||||
|
allowed by applicable law, despite this limitation;
|
||||||
|
|
||||||
|
- publish the application for others to copy;
|
||||||
|
|
||||||
|
- rent, lease or lend the application; or
|
||||||
|
|
||||||
|
- transfer the application or this agreement to any third party.
|
||||||
|
|
||||||
|
6. **EXPORT RESTRICTIONS.** The application is subject to United States export
|
||||||
|
laws and regulations. You must comply with all domestic and international
|
||||||
|
export laws and regulations that apply to the application. These laws
|
||||||
|
include restrictions on destinations, end users and end use. For additional
|
||||||
|
information,
|
||||||
|
see [www.microsoft.com/exporting](https://www.microsoft.com/exporting).
|
||||||
|
|
||||||
|
7. **SUPPORT SERVICES.** Because this application is "as is," we may not
|
||||||
|
provide support services for it. If you have any issues or questions about
|
||||||
|
your use of this application, including questions about your company's
|
||||||
|
privacy policy, please contact your company's admin. Do not contact the
|
||||||
|
application store, your network operator, device manufacturer, or Microsoft.
|
||||||
|
The application store provider has no obligation to furnish support or
|
||||||
|
maintenance with respect to the application.
|
||||||
|
|
||||||
|
8. **APPLICATION STORE.**
|
||||||
|
|
||||||
|
1. If you obtain the application through an application store (e.g., App
|
||||||
|
Store), please review the applicable application store terms to ensure
|
||||||
|
your download and use of the application complies with such terms.
|
||||||
|
Please note that these Terms are between you and Microsoft and not with
|
||||||
|
the application store.
|
||||||
|
|
||||||
|
2. The respective application store provider and its subsidiaries are third
|
||||||
|
party beneficiaries of these Terms, and upon your acceptance of these
|
||||||
|
Terms, the application store provider(s) will have the right to directly
|
||||||
|
enforce and rely upon any provision of these Terms that grants them a
|
||||||
|
benefit or rights.
|
||||||
|
|
||||||
|
9. **TRADEMARK NOTICES.** Microsoft, Microsoft Defender ATP, MDATP, and
|
||||||
|
Microsoft 365 are registered or common-law trademarks of Microsoft
|
||||||
|
Corporation in the United States and/or other countries.
|
||||||
|
|
||||||
|
10. **ENTIRE AGREEMENT.** This agreement and the terms for supplements, updates,
|
||||||
|
Internet-based services, and support services that you use are the entire
|
||||||
|
agreement for the application and support services.
|
||||||
|
|
||||||
|
11. **APPLICABLE LAW.**
|
||||||
|
|
||||||
|
1. **United States.** If you acquired the application in the United States,
|
||||||
|
Washington state law governs the interpretation of this agreement and
|
||||||
|
applies to claims for breach of it, regardless of conflict of laws
|
||||||
|
principles. The laws of the state where you live govern all other
|
||||||
|
claims, including claims under state consumer protection laws, unfair
|
||||||
|
competition laws, and in tort.
|
||||||
|
|
||||||
|
2. **Outside the United States.** If you acquired the application in any
|
||||||
|
other country, the laws of that country apply.
|
||||||
|
|
||||||
|
12. **LEGAL EFFECT.** This agreement describes certain legal rights. You may
|
||||||
|
have other rights under the laws of your country. You may also have rights
|
||||||
|
with respect to the party from whom you acquired the application. This
|
||||||
|
agreement does not change your rights under the laws of your country if the
|
||||||
|
laws of your country do not permit it to do so.
|
||||||
|
|
||||||
|
13. **DISCLAIMER OF WARRANTY. THE APPLICATION IS LICENSED "AS-IS." "WITH ALL
|
||||||
|
FAULTS," AND "AS AVAILABLE." YOU BEAR THE RISK OF USING IT. MICROSOFT AND
|
||||||
|
WIRELESS CARRIERS OVER WHOSE NETWORK THE APPLICATION IS DISTRIBUTED, AND
|
||||||
|
EACH OF OUR RESPECTIVE AFFILIATES, AND SUPPLIERS ("COVERED PARTIES") GIVE NO
|
||||||
|
EXPRESS WARRANTIES, GUARANTEES OR CONDITIONS UNDER OR IN RELATION TO THE
|
||||||
|
APPLICATION. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
|
||||||
|
APPLICATION IS WITH YOU. SHOULD THE APPLICATION BE DEFECTIVE, YOU ASSUME THE
|
||||||
|
ENTIRE COST OF ALL NECESSARY SERVICING OR REPAIR. YOU MAY HAVE ADDITIONAL
|
||||||
|
CONSUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE. TO
|
||||||
|
THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, COVERED PARTIES EXCLUDE THE
|
||||||
|
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||||
|
NON-INFRINGEMENT.**
|
||||||
|
|
||||||
|
**FOR AUSTRALIA - YOU HAVE STATUTORY GUARANTEES UNDER THE AUSTRALIAN CONSUMER LAW AND NOTHING IN THESE TERMS IS INTENDED TO AFFECT THOSE RIGHTS.**
|
||||||
|
|
||||||
|
14. **LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. TO THE EXTENT NOT
|
||||||
|
PROHIBITED BY LAW, YOU CAN RECOVER FROM MICROSOFT ONLY DIRECT DAMAGES UP TO
|
||||||
|
ONE U.S. DOLLAR (\$1.00). YOU AGREE NOT TO SEEK TO RECOVER ANY OTHER
|
||||||
|
DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR
|
||||||
|
INCIDENTAL DAMAGES FROM ANY COVERED PARTIES.**
|
||||||
|
|
||||||
|
This limitation applies to:
|
||||||
|
|
||||||
|
- anything related to the application, services, content (including code) on
|
||||||
|
third party Internet sites, or third party programs; and
|
||||||
|
|
||||||
|
- claims for breach of contract, warranty, guarantee or condition; consumer
|
||||||
|
protection; deception; unfair competition; strict liability, negligence,
|
||||||
|
misrepresentation, omission, trespass or other tort; violation of statute or
|
||||||
|
regulation; or unjust enrichment; all to the extent permitted by applicable
|
||||||
|
law.
|
||||||
|
|
||||||
|
It also applies even if:
|
||||||
|
|
||||||
|
a. Repair, replacement or refund for the application does not fully compensate
|
||||||
|
you for any losses; or
|
||||||
|
|
||||||
|
b. Covered Parties knew or should have known about the possibility of the
|
||||||
|
damages.
|
||||||
|
|
||||||
|
The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages.
|
@ -0,0 +1,355 @@
|
|||||||
|
---
|
||||||
|
title: Onboarding using Microsoft Endpoint Configuration Manager
|
||||||
|
description: Learn how to onboard to Microsoft Defender ATP using Microsoft Endpoint Configuration Manager
|
||||||
|
keywords: onboarding, configuration, deploy, deployment, endpoint configuration manager, mdatp, advanced threat protection, collection creation, endpoint detection response, next generation protection, attack surface reduction
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection:
|
||||||
|
- M365-security-compliance
|
||||||
|
- m365solution-endpointprotect
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Onboarding using Microsoft Endpoint Configuration Manager
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
## Collection creation
|
||||||
|
To onboard Windows 10 devices with Microsoft Endpoint Configuration Manager, the
|
||||||
|
deployment can target either and existing collection or a new collection can be
|
||||||
|
created for testing. The onboarding like group policy or manual method does
|
||||||
|
not install any agent on the system. Within the Configuration Manager console
|
||||||
|
the onboarding process will be configured as part of the compliance settings
|
||||||
|
within the console. Any system that receives this required configuration will
|
||||||
|
maintain that configuration for as long as the Configuration Manager client
|
||||||
|
continues to receive this policy from the management point. Follow the steps
|
||||||
|
below to onboard systems with Configuration Manager.
|
||||||
|
|
||||||
|
1. In Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Device Collections**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Right Click **Device Collection** and select **Create Device Collection**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Provide a **Name** and **Limiting Collection**, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Select **Add Rule** and choose **Query Rule**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Click **Next** on the **Direct Membership Wizard** and click on **Edit Query Statement**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Select **Criteria** and then choose the star icon.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is greater than or equal to** and value **14393** and click on **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Select **Next** and **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have a device collection with all the Windows 10 endpoints in the environment.
|
||||||
|
|
||||||
|
## Endpoint detection and response
|
||||||
|
### Windows 10
|
||||||
|
From within the Microsoft Defender Security Center it is possible to download
|
||||||
|
the '.onboarding' policy that can be used to create the policy in System Center Configuration
|
||||||
|
Manager and deploy that policy to Windows 10 devices.
|
||||||
|
|
||||||
|
1. From a Microsoft Defender Security Center Portal, select [Settings and then Onboarding](https://securitycenter.windows.com/preferences2/onboarding).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
2. Under Deployment method select the supported version of **Microsoft Endpoint Configuration Manager**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select **Download package**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Save the package to an accessible location.
|
||||||
|
5. In Microsoft Endpoint Configuration Manager, navigate to: **Assets and Compliance > Overview > Endpoint Protection > Microsoft Defender ATP Policies**.
|
||||||
|
|
||||||
|
6. Right-click **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Enter the name and description, verify **Onboarding** is selected, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Click **Browse**.
|
||||||
|
|
||||||
|
9. Navigate to the location of the downloaded file from step 4 above.
|
||||||
|
|
||||||
|
10. Click **Next**.
|
||||||
|
11. Configure the Agent with the appropriate samples (**None** or **All file types**).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
12. Select the appropriate telemetry (**Normal** or **Expedited**) then click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
14. Verify the configuration, then click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
15. Click **Close** when the Wizard completes.
|
||||||
|
|
||||||
|
16. In the Microsoft Endpoint Configuration Manager console, right-click the Microsoft Defender ATP policy you just created and select **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
17. On the right panel, select the previously created collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
### Previous versions of Windows Client (Windows 7 and Windows 8.1)
|
||||||
|
Follow the steps below to identify the Microsoft Defender ATP Workspace ID and Workspace Key, that will be required for the onboarding of previous versions of Windows.
|
||||||
|
|
||||||
|
1. From a Microsoft Defender Security Center Portal, select **Settings > Onboarding**.
|
||||||
|
|
||||||
|
2. Under operating system choose **Windows 7 SP1 and 8.1**.
|
||||||
|
|
||||||
|
3. Copy the **Workspace ID** and **Workspace Key** and save them. They will be used later in the process.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Install the Microsoft Monitoring Agent (MMA). <br>
|
||||||
|
MMA is currently (as of January 2019) supported on the following Windows Operating
|
||||||
|
Systems:
|
||||||
|
|
||||||
|
- Server SKUs: Windows Server 2008 SP1 or Newer
|
||||||
|
|
||||||
|
- Client SKUs: Windows 7 SP1 and later
|
||||||
|
|
||||||
|
The MMA agent will need to be installed on Windows devices. To install the
|
||||||
|
agent, some systems will need to download the [Update for customer experience
|
||||||
|
and diagnostic
|
||||||
|
telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)
|
||||||
|
in order to collect the data with MMA. These system versions include but may not
|
||||||
|
be limited to:
|
||||||
|
|
||||||
|
- Windows 8.1
|
||||||
|
|
||||||
|
- Windows 7
|
||||||
|
|
||||||
|
- Windows Server 2016
|
||||||
|
|
||||||
|
- Windows Server 2012 R2
|
||||||
|
|
||||||
|
- Windows Server 2008 R2
|
||||||
|
|
||||||
|
Specifically, for Windows 7 SP1, the following patches must be installed:
|
||||||
|
|
||||||
|
- Install
|
||||||
|
[KB4074598](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
|
||||||
|
|
||||||
|
- Install either [.NET Framework
|
||||||
|
4.5](https://www.microsoft.com/download/details.aspx?id=30653) (or
|
||||||
|
later) **or**
|
||||||
|
[KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework).
|
||||||
|
Do not install both on the same system.
|
||||||
|
|
||||||
|
5. If you're using a proxy to connect to the Internet see the Configure proxy settings section.
|
||||||
|
|
||||||
|
Once completed, you should see onboarded endpoints in the portal within an hour.
|
||||||
|
|
||||||
|
## Next generation protection
|
||||||
|
Microsoft Defender Antivirus is a built-in antimalware solution that provides next generation protection for desktops, portable computers, and servers.
|
||||||
|
|
||||||
|
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Antimalware Polices** and choose **Create Antimalware Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Scheduled scans**, **Scan settings**, **Default actions**, **Real-time protection**, **Exclusion settings**, **Advanced**, **Threat overrides**, **Cloud Protection Service** and **Security intelligence updates** and choose **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
In certain industries or some select enterprise customers might have specific
|
||||||
|
needs on how Antivirus is configured.
|
||||||
|
|
||||||
|
|
||||||
|
[Quick scan versus full scan and custom scan](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus#quick-scan-versus-full-scan-and-custom-scan)
|
||||||
|
|
||||||
|
For more details, see [Windows Security configuration framework](https://docs.microsoft.com/windows/security/threat-protection/windows-security-configuration-framework/windows-security-configuration-framework)
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Right-click on the newly created antimalware policy and select **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Target the new antimalware policy to your Windows 10 collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured Windows
|
||||||
|
Defender Antivirus.
|
||||||
|
|
||||||
|
## Attack surface reduction
|
||||||
|
The attack surface reduction pillar of Microsoft Defender ATP includes the feature set that is available under Exploit Guard. Attack surface reduction (ASR) rules, Controlled Folder Access, Network Protection and Exploit
|
||||||
|
Protection.
|
||||||
|
|
||||||
|
All these features provide an audit mode and a block mode. In audit mode there is no end-user impact. All it does is collect additional telemetry and make it available in the Microsoft Defender Security Center. The goal with a deployment is to step-by-step move security controls into block mode.
|
||||||
|
|
||||||
|
To set ASR rules in Audit mode:
|
||||||
|
|
||||||
|
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
2. Select **Attack Surface Reduction**.
|
||||||
|
|
||||||
|
|
||||||
|
3. Set rules to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Confirm the new Exploit Guard policy by clicking on **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
5. Once the policy is created click **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured ASR rules in audit mode.
|
||||||
|
|
||||||
|
Below are additional steps to verify whether ASR rules are correctly applied to
|
||||||
|
endpoints. (This may take few minutes)
|
||||||
|
|
||||||
|
|
||||||
|
1. From a web browser, navigate to <https://securitycenter.windows.com>.
|
||||||
|
|
||||||
|
2. Select **Configuration management** from left side menu.
|
||||||
|
|
||||||
|
3. Click **Go to attack surface management** in the Attack surface management panel.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Click **Configuration** tab in Attack surface reduction rules reports. It shows ASR rules configuration overview and ASR rules status on each devices.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Click each device shows configuration details of ASR rules.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
See [Optimize ASR rule deployment and
|
||||||
|
detections](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr) for more details.
|
||||||
|
|
||||||
|
|
||||||
|
### To set Network Protection rules in Audit mode:
|
||||||
|
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Network protection**.
|
||||||
|
|
||||||
|
3. Set the setting to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Confirm the new Exploit Guard Policy by clicking **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Once the policy is created click on **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Select the policy to the newly created Windows 10 collection and choose **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
After completing this task, you now have successfully configured Network
|
||||||
|
Protection in audit mode.
|
||||||
|
|
||||||
|
### To set Controlled Folder Access rules in Audit mode:
|
||||||
|
|
||||||
|
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select **Controlled folder access**.
|
||||||
|
|
||||||
|
3. Set the configuration to **Audit** and click **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Confirm the new Exploit Guard Policy by clicking on **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Once the policy is created click on **Close**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Right-click on the newly created policy and choose **Deploy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
You have now successfully configured Controlled folder access in audit mode.
|
||||||
|
|
||||||
|
## Related topic
|
||||||
|
- [Onboarding using Microsoft Endpoint Manager](onboarding-endpoint-manager.md)
|
@ -0,0 +1,364 @@
|
|||||||
|
---
|
||||||
|
title: Onboarding using Microsoft Endpoint Manager
|
||||||
|
description: Learn how to onboard to Microsoft Defender ATP using Microsoft Endpoint Manager
|
||||||
|
keywords: onboarding, configuration, deploy, deployment, endpoint manager, mdatp, advanced threat protection, collection creation, endpoint detection response, next generation protection, attack surface reduction
|
||||||
|
search.product: eADQiWindows 10XVcnh
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: security
|
||||||
|
ms.author: macapara
|
||||||
|
author: mjcaparas
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
manager: dansimp
|
||||||
|
audience: ITPro
|
||||||
|
ms.collection:
|
||||||
|
- M365-security-compliance
|
||||||
|
- m365solution-endpointprotect
|
||||||
|
ms.topic: article
|
||||||
|
---
|
||||||
|
|
||||||
|
# Onboarding using Microsoft Endpoint Manager
|
||||||
|
**Applies to:**
|
||||||
|
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||||
|
|
||||||
|
|
||||||
|
In this section, we will be using Microsoft Endpoint Manager (MEM) to deploy
|
||||||
|
Microsoft Defender ATP to your endpoints.
|
||||||
|
|
||||||
|
For more information about MEM, check out these resources:
|
||||||
|
- [Microsoft Endpoint Manager page](https://docs.microsoft.com/mem/)
|
||||||
|
- [Blog post on convergence of Intune and ConfigMgr](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace/)
|
||||||
|
- [Introduction video on MEM](https://www.microsoft.com/microsoft-365/blog/2019/11/04/use-the-power-of-cloud-intelligence-to-simplify-and-accelerate-it-and-the-move-to-a-modern-workplace)
|
||||||
|
|
||||||
|
|
||||||
|
This process is a multi-step process, you'll need to:
|
||||||
|
|
||||||
|
- Identify target devices or users
|
||||||
|
|
||||||
|
- Create an Azure Active Directory group (User or Device)
|
||||||
|
|
||||||
|
- Create a Configuration Profile
|
||||||
|
|
||||||
|
- In MEM, we'll guide you in creating a separate policy for each feature
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
|
||||||
|
|
||||||
|
Here are the links you'll need for the rest of the process:
|
||||||
|
|
||||||
|
- [MEM portal](https://aka.ms/memac)
|
||||||
|
|
||||||
|
- [Security Center](https://securitycenter.windows.com/)
|
||||||
|
|
||||||
|
- [Intune Security baselines](https://docs.microsoft.com/mem/intune/protect/security-baseline-settings-defender-atp#microsoft-defender)
|
||||||
|
|
||||||
|
## Identify target devices or users
|
||||||
|
In this section, we will create a test group to assign your configurations on.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Intune uses Azure Active Directory (Azure AD) groups to manage devices and
|
||||||
|
users. As an Intune admin, you can set up groups to suit your organizational
|
||||||
|
needs.<br>
|
||||||
|
> For more information, see [Add groups to organize users and devices](https://docs.microsoft.com/mem/intune/fundamentals/groups-add).
|
||||||
|
|
||||||
|
### Create a group
|
||||||
|
|
||||||
|
1. Open the MEM portal.
|
||||||
|
|
||||||
|
2. Open **Groups > New Group**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Enter details and create a new group.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Add your test user or device.
|
||||||
|
|
||||||
|
5. From the **Groups > All groups** pane, open your new group.
|
||||||
|
|
||||||
|
6. Select **Members > Add members**.
|
||||||
|
|
||||||
|
7. Find your test user or device and select it.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Your testing group now has a member to test.
|
||||||
|
|
||||||
|
## Create configuration policies
|
||||||
|
In the following section, you'll create a number of configuration policies.
|
||||||
|
First is a configuration policy to select which groups of users or devices will
|
||||||
|
be onboarded to Microsoft Defender ATP. Then you will continue by creating several
|
||||||
|
different types of Endpoint security policies.
|
||||||
|
|
||||||
|
### Endpoint detection and response
|
||||||
|
|
||||||
|
1. Open the MEM portal.
|
||||||
|
|
||||||
|
2. Navigate to **Endpoint security > Endpoint detection and response**. Click
|
||||||
|
on **Create Profile**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Under **Platform, select Windows 10 and Later, Profile - Endpoint detection
|
||||||
|
and response > Create**.
|
||||||
|
|
||||||
|
4. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Select settings as required, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>In this instance, this has been auto populated as Microsoft Defender ATP has already been integrated with Intune. For more information on the integration, see [Enable Microsoft Defender ATP in Intune](https://docs.microsoft.com/mem/intune/protect/advanced-threat-protection-configure#to-enable-microsoft-defender-atp). <br>
|
||||||
|
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Add test group by clicking on **Select groups to include** and choose your group, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Review and accept, then select **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. You can view your completed policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Next-generation protection
|
||||||
|
|
||||||
|
1. Open the MEM portal.
|
||||||
|
|
||||||
|
2. Navigate to **Endpoint security > Antivirus > Create Policy**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select **Platform - Windows 10 and Later - Windows and Profile – Microsoft
|
||||||
|
Defender Antivirus > Create**.
|
||||||
|
|
||||||
|
4. Enter name and description, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. In the **Configuration settings page**: Set the configurations you require for
|
||||||
|
Microsoft Defender Antivirus (Cloud Protection, Exclusions, Real-Time
|
||||||
|
Protection, and Remediation).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. Add scope tags if necessary, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Select groups to include, assign to your test group, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Review and create, then select **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. You'll see the configuration policy you created.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
|
1. Open the MEM portal.
|
||||||
|
|
||||||
|
2. Navigate to **Endpoint security > Attack surface reduction**.
|
||||||
|
|
||||||
|
3. Select **Create Policy**.
|
||||||
|
|
||||||
|
4. Select **Platform - Windows 10 and Later – Profile - Attack surface reduction
|
||||||
|
rules > Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
|
Attack surface reduction rules, then select **Next**.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>We will be configuring all of the Attack surface reduction rules to Audit.
|
||||||
|
|
||||||
|
For more information, see [Attack surface reduction rules](attack-surface-reduction.md).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Add Scope Tags as required, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Select groups to include and assign to test group, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Review the details, then select **Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. View the policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Attack Surface Reduction – Web Protection
|
||||||
|
|
||||||
|
1. Open the MEM portal.
|
||||||
|
|
||||||
|
2. Navigate to **Endpoint security > Attack surface reduction**.
|
||||||
|
|
||||||
|
3. Select **Create Policy**.
|
||||||
|
|
||||||
|
4. Select **Windows 10 and Later – Web protection > Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Enter a name and description, then select **Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
6. In the **Configuration settings page**: Set the configurations you require for
|
||||||
|
Web Protection, then select **Next**.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>We are configuring Web Protection to Block.
|
||||||
|
|
||||||
|
For more information, see [Web Protection](web-protection-overview.md).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
7. Add **Scope Tags as required > Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
8. Select **Assign to test group > Next**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
9. Select **Review and Create > Create**.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
10. View the policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## Validate configuration settings
|
||||||
|
|
||||||
|
|
||||||
|
### Confirm Policies have been applied
|
||||||
|
|
||||||
|
|
||||||
|
Once the Configuration policy has been assigned, it will take some time to apply.
|
||||||
|
|
||||||
|
For information on timing, see [Intune configuration information](https://docs.microsoft.com/mem/intune/configuration/device-profile-troubleshoot#how-long-does-it-take-for-devices-to-get-a-policy-profile-or-app-after-they-are-assigned).
|
||||||
|
|
||||||
|
To confirm that the configuration policy has been applied to your test device, follow the following process for each configuration policy.
|
||||||
|
|
||||||
|
1. Open the MEM portal and navigate to the relevant policy as shown in the
|
||||||
|
steps above. The following example shows the next generation protection settings.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. Select the **Configuration Policy** to view the policy status.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Select **Device Status** to see the status.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
4. Select **User Status** to see the status.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
5. Select **Per-setting status** to see the status.
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>This view is very useful to identify any settings that conflict with another policy.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Endpoint detection and response
|
||||||
|
|
||||||
|
|
||||||
|
1. Before applying the configuration, the Microsoft Defender ATP
|
||||||
|
Protection service should not be started.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. After the configuration has been applied, the Microsoft Defender ATP
|
||||||
|
Protection Service should be started.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. After the services are running on the device, the device appears in Microsoft
|
||||||
|
Defender Security Center.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Next-generation protection
|
||||||
|
|
||||||
|
1. Before applying the policy on a test device, you should be able to manually
|
||||||
|
manage the settings as shown below.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. After the policy has been applied, you should not be able to manually manage
|
||||||
|
the settings.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> In the following image **Turn on cloud-delivered protection** and
|
||||||
|
**Turn on real-time protection** are being shown as managed.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Attack Surface Reduction – Attack surface reduction rules
|
||||||
|
|
||||||
|
|
||||||
|
1. Before applying the policy on a test device, pen a PowerShell Window and type `Get-MpPreference`.
|
||||||
|
|
||||||
|
2. This should respond with the following lines with no content:
|
||||||
|
|
||||||
|
AttackSurfaceReductionOnlyExclusions:
|
||||||
|
|
||||||
|
AttackSurfaceReductionRules_Actions:
|
||||||
|
|
||||||
|
AttackSurfaceReductionRules_Ids:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. After applying the policy on a test device, open a PowerShell Windows and type `Get-MpPreference`.
|
||||||
|
|
||||||
|
4. This should respond with the following lines with content as shown below:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Attack Surface Reduction – Web Protection
|
||||||
|
|
||||||
|
1. On the test device, open a PowerShell Windows and type
|
||||||
|
`(Get-MpPreference).EnableNetworkProtection`.
|
||||||
|
|
||||||
|
2. This should respond with a 0 as shown below.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. After applying the policy, open a PowerShell Windows and type
|
||||||
|
`(Get-MpPreference).EnableNetworkProtection`.
|
||||||
|
|
||||||
|
4. This should respond with a 1 as shown below.
|
||||||
|
|
||||||
|

|
@ -51,343 +51,21 @@ You are currently in the onboarding phase.
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
To deploy Microsoft Defender ATP, you'll need to onboard devices to the service. Depending on the architecture of your environment, you'll need to use the appropriate management tool that best suites your requirements.
|
To deploy Microsoft Defender ATP, you'll need to onboard devices to the service.
|
||||||
|
|
||||||
The deployment guide uses Microsoft Endpoint Configuration Manager as the management tool to demonstrate an end-to-end deployment.
|
Depending on the architecture of your environment, you'll need to use the appropriate management tool that best suites your requirements.
|
||||||
|
|
||||||
This article will guide you on:
|
After onboarding the devices, you'll then configure the various capabilities such as endpoint detection and response, next-generation protection, and attack surface reduction.
|
||||||
- Setting up Microsoft Endpoint Configuration Manager
|
|
||||||
|
|
||||||
|
This article provides resources to guide you on:
|
||||||
|
- Using various management tools to onboard devices
|
||||||
|
- [Onboarding using Microsoft Endpoint Configuration Manager](onboarding-endpoint-configuration-manager.md)
|
||||||
|
- [Onboarding using Microsoft Endpoint Manager](onboarding-endpoint-manager.md)
|
||||||
- Endpoint detection and response configuration
|
- Endpoint detection and response configuration
|
||||||
- Next-generation protection configuration
|
- Next-generation protection configuration
|
||||||
- Attack surface reduction configuration
|
- Attack surface reduction configuration
|
||||||
|
|
||||||
## Onboarding using Microsoft Endpoint Configuration Manager
|
## Related topics
|
||||||
### Collection creation
|
- [Onboarding using Microsoft Endpoint Configuration Manager](onboarding-endpoint-configuration-manager.md)
|
||||||
To onboard Windows 10 devices with Microsoft Endpoint Configuration Manager, the
|
- [Onboarding using Microsoft Endpoint Manager](onboarding-endpoint-manager.md)
|
||||||
deployment can target either and existing collection or a new collection can be
|
|
||||||
created for testing. The onboarding like group policy or manual method does
|
|
||||||
not install any agent on the system. Within the Configuration Manager console
|
|
||||||
the onboarding process will be configured as part of the compliance settings
|
|
||||||
within the console. Any system that receives this required configuration will
|
|
||||||
maintain that configuration for as long as the Configuration Manager client
|
|
||||||
continues to receive this policy from the management point. Follow the steps
|
|
||||||
below to onboard systems with Configuration Manager.
|
|
||||||
|
|
||||||
1. In Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Device Collections**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Right Click **Device Collection** and select **Create Device Collection**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Provide a **Name** and **Limiting Collection**, then select **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Select **Add Rule** and choose **Query Rule**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Click **Next** on the **Direct Membership Wizard** and click on **Edit Query Statement**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Select **Criteria** and then choose the star icon.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is greater than or equal to** and value **14393** and click on **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. Select **Next** and **Close**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
9. Select **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After completing this task, you now have a device collection with all the Windows 10 endpoints in the environment.
|
|
||||||
|
|
||||||
## Endpoint detection and response
|
|
||||||
### Windows 10
|
|
||||||
From within the Microsoft Defender Security Center it is possible to download
|
|
||||||
the '.onboarding' policy that can be used to create the policy in System Center Configuration
|
|
||||||
Manager and deploy that policy to Windows 10 devices.
|
|
||||||
|
|
||||||
1. From a Microsoft Defender Security Center Portal, select [Settings and then Onboarding](https://securitycenter.windows.com/preferences2/onboarding).
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
2. Under Deployment method select the supported version of **Microsoft Endpoint Configuration Manager**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Select **Download package**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Save the package to an accessible location.
|
|
||||||
5. In Microsoft Endpoint Configuration Manager, navigate to: **Assets and Compliance > Overview > Endpoint Protection > Microsoft Defender ATP Policies**.
|
|
||||||
|
|
||||||
6. Right-click **Microsoft Defender ATP Policies** and select **Create Microsoft Defender ATP Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Enter the name and description, verify **Onboarding** is selected, then select **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
8. Click **Browse**.
|
|
||||||
|
|
||||||
9. Navigate to the location of the downloaded file from step 4 above.
|
|
||||||
|
|
||||||
10. Click **Next**.
|
|
||||||
11. Configure the Agent with the appropriate samples (**None** or **All file types**).
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
12. Select the appropriate telemetry (**Normal** or **Expedited**) then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
14. Verify the configuration, then click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
15. Click **Close** when the Wizard completes.
|
|
||||||
|
|
||||||
16. In the Microsoft Endpoint Configuration Manager console, right-click the Microsoft Defender ATP policy you just created and select **Deploy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
17. On the right panel, select the previously created collection and click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
### Previous versions of Windows Client (Windows 7 and Windows 8.1)
|
|
||||||
Follow the steps below to identify the Microsoft Defender ATP Workspace ID and Workspace Key, that will be required for the onboarding of previous versions of Windows.
|
|
||||||
|
|
||||||
1. From a Microsoft Defender Security Center Portal, select **Settings > Onboarding**.
|
|
||||||
|
|
||||||
2. Under operating system choose **Windows 7 SP1 and 8.1**.
|
|
||||||
|
|
||||||
3. Copy the **Workspace ID** and **Workspace Key** and save them. They will be used later in the process.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Install the Microsoft Monitoring Agent (MMA). <br>
|
|
||||||
MMA is currently (as of January 2019) supported on the following Windows Operating
|
|
||||||
Systems:
|
|
||||||
|
|
||||||
- Server SKUs: Windows Server 2008 SP1 or Newer
|
|
||||||
|
|
||||||
- Client SKUs: Windows 7 SP1 and later
|
|
||||||
|
|
||||||
The MMA agent will need to be installed on Windows devices. To install the
|
|
||||||
agent, some systems will need to download the [Update for customer experience
|
|
||||||
and diagnostic
|
|
||||||
telemetry](https://support.microsoft.com/help/3080149/update-for-customer-experience-and-diagnostic-telemetry)
|
|
||||||
in order to collect the data with MMA. These system versions include but may not
|
|
||||||
be limited to:
|
|
||||||
|
|
||||||
- Windows 8.1
|
|
||||||
|
|
||||||
- Windows 7
|
|
||||||
|
|
||||||
- Windows Server 2016
|
|
||||||
|
|
||||||
- Windows Server 2012 R2
|
|
||||||
|
|
||||||
- Windows Server 2008 R2
|
|
||||||
|
|
||||||
Specifically, for Windows 7 SP1, the following patches must be installed:
|
|
||||||
|
|
||||||
- Install
|
|
||||||
[KB4074598](https://support.microsoft.com/help/4074598/windows-7-update-kb4074598)
|
|
||||||
|
|
||||||
- Install either [.NET Framework
|
|
||||||
4.5](https://www.microsoft.com/en-us/download/details.aspx?id=30653) (or
|
|
||||||
later) **or**
|
|
||||||
[KB3154518](https://support.microsoft.com/help/3154518/support-for-tls-system-default-versions-included-in-the-net-framework).
|
|
||||||
Do not install both on the same system.
|
|
||||||
|
|
||||||
5. If you're using a proxy to connect to the Internet see the Configure proxy settings section.
|
|
||||||
|
|
||||||
Once completed, you should see onboarded endpoints in the portal within an hour.
|
|
||||||
|
|
||||||
## next-generation protection
|
|
||||||
Microsoft Defender Antivirus is a built-in antimalware solution that provides next-generation protection for desktops, portable computers, and servers.
|
|
||||||
|
|
||||||
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Antimalware Polices** and choose **Create Antimalware Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Select **Scheduled scans**, **Scan settings**, **Default actions**, **Real-time protection**, **Exclusion settings**, **Advanced**, **Threat overrides**, **Cloud Protection Service** and **Security intelligence updates** and choose **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
In certain industries or some select enterprise customers might have specific
|
|
||||||
needs on how Antivirus is configured.
|
|
||||||
|
|
||||||
|
|
||||||
[Quick scan versus full scan and custom scan](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus#quick-scan-versus-full-scan-and-custom-scan)
|
|
||||||
|
|
||||||
For more details, see [Windows Security configuration framework](https://docs.microsoft.com/windows/security/threat-protection/windows-security-configuration-framework/windows-security-configuration-framework)
|
|
||||||
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
3. Right-click on the newly created antimalware policy and select **Deploy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Target the new antimalware policy to your Windows 10 collection and click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After completing this task, you now have successfully configured Windows
|
|
||||||
Defender Antivirus.
|
|
||||||
|
|
||||||
## Attack surface reduction
|
|
||||||
The attack surface reduction pillar of Microsoft Defender ATP includes the feature set that is available under Exploit Guard. Attack surface reduction (ASR) rules, Controlled Folder Access, Network Protection and Exploit
|
|
||||||
Protection.
|
|
||||||
|
|
||||||
All these features provide an audit mode and a block mode. In audit mode there is no end-user impact. All it does is collect additional telemetry and make it available in the Microsoft Defender Security Center. The goal with a deployment is to step-by-step move security controls into block mode.
|
|
||||||
|
|
||||||
To set ASR rules in Audit mode:
|
|
||||||
|
|
||||||
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
2. Select **Attack Surface Reduction**.
|
|
||||||
|
|
||||||
|
|
||||||
3. Set rules to **Audit** and click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Confirm the new Exploit Guard policy by clicking on **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
5. Once the policy is created click **Close**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
6. Right-click on the newly created policy and choose **Deploy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After completing this task, you now have successfully configured ASR rules in audit mode.
|
|
||||||
|
|
||||||
Below are additional steps to verify whether ASR rules are correctly applied to
|
|
||||||
endpoints. (This may take few minutes)
|
|
||||||
|
|
||||||
|
|
||||||
1. From a web browser, navigate to <https://securitycenter.windows.com>.
|
|
||||||
|
|
||||||
2. Select **Configuration management** from left side menu.
|
|
||||||
|
|
||||||
3. Click **Go to attack surface management** in the Attack surface management panel.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Click **Configuration** tab in Attack surface reduction rules reports. It shows ASR rules configuration overview and ASR rules status on each devices.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Click each device shows configuration details of ASR rules.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
See [Optimize ASR rule deployment and
|
|
||||||
detections](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configure-machines-asr) for more details.
|
|
||||||
|
|
||||||
|
|
||||||
### To set Network Protection rules in Audit mode:
|
|
||||||
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Select **Network protection**.
|
|
||||||
|
|
||||||
3. Set the setting to **Audit** and click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Confirm the new Exploit Guard Policy by clicking **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Once the policy is created click on **Close**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Right-click on the newly created policy and choose **Deploy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Select the policy to the newly created Windows 10 collection and choose **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
After completing this task, you now have successfully configured Network
|
|
||||||
Protection in audit mode.
|
|
||||||
|
|
||||||
### To set Controlled Folder Access rules in Audit mode:
|
|
||||||
|
|
||||||
1. In the Microsoft Endpoint Configuration Manager console, navigate to **Assets and Compliance \> Overview \> Endpoint Protection \> Windows Defender Exploit Guard** and choose **Create Exploit Guard Policy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
2. Select **Controlled folder access**.
|
|
||||||
|
|
||||||
3. Set the configuration to **Audit** and click **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Confirm the new Exploit Guard Policy by clicking on **Next**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Once the policy is created click on **Close**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
6. Right-click on the newly created policy and choose **Deploy**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
7. Target the policy to the newly created Windows 10 collection and click **OK**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
You have now successfully configured Controlled folder access in audit mode.
|
|
||||||
|
|
||||||
|
@ -55,7 +55,7 @@ You can navigate through the portal using the menu options available in all sect
|
|||||||
Area | Description
|
Area | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
**Dashboard** | Get a high-level view of the organization exposure score, Microsoft Secure Score for Devices, device exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed device data.
|
**Dashboard** | Get a high-level view of the organization exposure score, Microsoft Secure Score for Devices, device exposure distribution, top security recommendations, top vulnerable software, top remediation activities, and top exposed device data.
|
||||||
[**Security recommendations**](tvm-remediation.md) | See the list of security recommendations, their related components, whether software or software versions in your network have reached end-of-support, insights, number or exposed devices, impact, and request for remediation. When you select an item from the list, a flyout panel opens with vulnerability details, a link to open the software page, and remediation and exception options. You can also open a ticket in Intune if your devices are joined through Azure Active Directory and you've enabled your Intune connections in Microsoft Defender ATP.
|
[**Security recommendations**](tvm-security-recommendation.md) | See the list of security recommendations, their related components, whether software or software versions in your network have reached end-of-support, insights, number or exposed devices, impact, and request for remediation. When you select an item from the list, a flyout panel opens with vulnerability details, a link to open the software page, and remediation and exception options. You can also open a ticket in Intune if your devices are joined through Azure Active Directory and you've enabled your Intune connections in Microsoft Defender ATP.
|
||||||
[**Remediation**](tvm-remediation.md) | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV, and active exceptions.
|
[**Remediation**](tvm-remediation.md) | See the remediation activity, related component, remediation type, status, due date, option to export the remediation and process data to CSV, and active exceptions.
|
||||||
[**Software inventory**](tvm-software-inventory.md) | See the list of software, versions, weaknesses, whether there's an exploit found on the software, whether the software or software version has reached end-of-support, prevalence in the organization, how many were installed, how many exposed devices there are, and the numerical value of the impact. You can select each item in the list and opt to open the software page that shows the associated vulnerabilities, misconfigurations, affected device, version distribution details, and missing KBs (security updates).
|
[**Software inventory**](tvm-software-inventory.md) | See the list of software, versions, weaknesses, whether there's an exploit found on the software, whether the software or software version has reached end-of-support, prevalence in the organization, how many were installed, how many exposed devices there are, and the numerical value of the impact. You can select each item in the list and opt to open the software page that shows the associated vulnerabilities, misconfigurations, affected device, version distribution details, and missing KBs (security updates).
|
||||||
[**Weaknesses**](tvm-weaknesses.md) | See the list of common vulnerabilities and exposures, the severity, the common vulnerability scoring system (CVSS) V3 score, related software, age, when it was published, related threat alerts, and how many exposed devices there are. You can select each item in the list to see a flyout panel with the vulnerability description and other details.
|
[**Weaknesses**](tvm-weaknesses.md) | See the list of common vulnerabilities and exposures, the severity, the common vulnerability scoring system (CVSS) V3 score, related software, age, when it was published, related threat alerts, and how many exposed devices there are. You can select each item in the list to see a flyout panel with the vulnerability description and other details.
|
||||||
|
@ -23,12 +23,13 @@ ms.topic: conceptual
|
|||||||
|
|
||||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-portaloverview-abovefoldlink)
|
||||||
|
|
||||||
[!include[Prerelease information](../../includes/prerelease.md)]
|
|
||||||
|
|
||||||
Threat and vulnerability management uses the same signals in Microsoft Defender ATP's endpoint protection to scan and detect vulnerabilities.
|
Threat and vulnerability management uses the same signals in Microsoft Defender ATP's endpoint protection to scan and detect vulnerabilities.
|
||||||
|
|
||||||
The **Weaknesses** page lists down the vulnerabilities found in the infected software running in your organization by listing the Common Vulnerabilities and Exposures (CVE) ID. You can also view the severity, Common Vulnerability Scoring System (CVSS) rating, prevalence in your organization, corresponding breach, threat insights, and more.
|
The **Weaknesses** page lists down the vulnerabilities found in the infected software running in your organization by listing the Common Vulnerabilities and Exposures (CVE) ID. You can also view the severity, Common Vulnerability Scoring System (CVSS) rating, prevalence in your organization, corresponding breach, threat insights, and more.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>If there is no official CVE-ID assigned to a vulnerability, the vulnerability name is assigned by threat and vulnerability management.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>To boost your vulnerability assessment detection rates, you can download the following mandatory security updates and deploy them in your network:
|
>To boost your vulnerability assessment detection rates, you can download the following mandatory security updates and deploy them in your network:
|
||||||
>- 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
|
>- 19H1 customers | [KB 4512941](https://support.microsoft.com/help/4512941/windows-10-update-kb4512941)
|
||||||
|
@ -76,10 +76,18 @@ To add a new policy:
|
|||||||
4. Specify the policy scope. Select the device groups to specify where to apply the policy. Only devices in the selected device groups will be prevented from accessing websites in the selected categories.
|
4. Specify the policy scope. Select the device groups to specify where to apply the policy. Only devices in the selected device groups will be prevented from accessing websites in the selected categories.
|
||||||
5. Review the summary and save the policy. The policy may take up to 15 minutes to apply to your selected devices.
|
5. Review the summary and save the policy. The policy may take up to 15 minutes to apply to your selected devices.
|
||||||
|
|
||||||
|
Tip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
|
>If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
|
||||||
|
|
||||||
>ProTip: You can deploy a policy without selecting any category on a device group. This action will create an audit only policy, to help you understand user behavior before creating a block policy.
|
### Allow specific websites
|
||||||
|
|
||||||
|
It is possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy will supersede the web content filtering policy when it is applied to the device group in question.
|
||||||
|
|
||||||
|
1. Create a custom indicator in the Microsoft Defender Security Center by going to **Settings** > **Indicators** > **URL/Domain** > **Add Item**
|
||||||
|
2. Enter the domain of the site
|
||||||
|
3. Set the policy action to **Allow**.
|
||||||
|
|
||||||
## Web content filtering cards and details
|
## Web content filtering cards and details
|
||||||
|
|
||||||
|
@ -45,11 +45,13 @@ The Security Compliance Toolkit consists of:
|
|||||||
- Microsoft 365 Apps for enterprise (Sept 2019)
|
- Microsoft 365 Apps for enterprise (Sept 2019)
|
||||||
|
|
||||||
- Microsoft Edge security baseline
|
- Microsoft Edge security baseline
|
||||||
- Version 80
|
- Version 85
|
||||||
|
|
||||||
- Tools
|
- Tools
|
||||||
- Policy Analyzer tool
|
- Policy Analyzer tool
|
||||||
- Local Group Policy Object (LGPO) tool
|
- Local Group Policy Object (LGPO) tool
|
||||||
|
- Set Object Security tool
|
||||||
|
- GPO to PolicyRules tool
|
||||||
|
|
||||||
- Scripts
|
- Scripts
|
||||||
- Baseline-ADImport.ps1
|
- Baseline-ADImport.ps1
|
||||||
@ -81,3 +83,15 @@ It can export local policy to a GPO backup.
|
|||||||
It can export the contents of a Registry Policy file to the “LGPO text” format that can then be edited, and can build a Registry Policy file from an LGPO text file.
|
It can export the contents of a Registry Policy file to the “LGPO text” format that can then be edited, and can build a Registry Policy file from an LGPO text file.
|
||||||
|
|
||||||
Documentation for the LGPO tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/lgpo-exe-local-group-policy-object-utility-v1-0/ba-p/701045) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319).
|
Documentation for the LGPO tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/lgpo-exe-local-group-policy-object-utility-v1-0/ba-p/701045) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319).
|
||||||
|
|
||||||
|
## What is the Set Object Security tool?
|
||||||
|
|
||||||
|
SetObjectSecurity.exe enables you to set the security descriptor for just about any type of Windows securable object (files, directories, registry keys, event logs, services, SMB shares, etc.). For file system and registry objects, you can choose whether to apply inheritance rules. You can also choose to output the security descriptor in a .reg-file-compatible representation of the security descriptor for a REG_BINARY registry value.
|
||||||
|
|
||||||
|
Documentation for the Set Object Security tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/new-amp-updated-security-tools/ba-p/1631613) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319).
|
||||||
|
|
||||||
|
## What is the GPO to Policy Rules tool?
|
||||||
|
|
||||||
|
Automate the conversion of GPO backups to Policy Analyzer .PolicyRules files and skip the GUI. GPO2PolicyRules is a command-line tool that is included with the Policy Analyzer download.
|
||||||
|
|
||||||
|
Documentation for the GPO to PolicyRules tool can be found on the [Microsoft Security Baselines blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/new-amp-updated-security-tools/ba-p/1631613) or by [downloading the tool](https://www.microsoft.com/download/details.aspx?id=55319).
|
||||||
|
@ -46,7 +46,7 @@ This version of Window 10 includes security improvements for threat protection,
|
|||||||
|
|
||||||
#### Windows Defender ATP
|
#### Windows Defender ATP
|
||||||
|
|
||||||
The Windows Defender Advanced Threat Protection ([Windows Defender ATP](/windows/security/threat-protection/index)) platform inludes the security pillars shown in the following diagram. In this version of Windows, Windows Defender ATP includes powerful analytics, security stack integration, and centralized management for better detection, prevention, investigation, response, and management.
|
The Windows Defender Advanced Threat Protection ([Windows Defender ATP](/windows/security/threat-protection/index)) platform includes the security pillars shown in the following diagram. In this version of Windows, Windows Defender ATP includes powerful analytics, security stack integration, and centralized management for better detection, prevention, investigation, response, and management.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -99,7 +99,7 @@ Endpoint detection and response is improved. Enterprise customers can now take a
|
|||||||
- Upgraded detections of ransomware and other advanced attacks.
|
- Upgraded detections of ransomware and other advanced attacks.
|
||||||
- Historical detection capability ensures new detection rules apply to up to six months of stored data to detect previous attacks that might not have been noticed.
|
- Historical detection capability ensures new detection rules apply to up to six months of stored data to detect previous attacks that might not have been noticed.
|
||||||
|
|
||||||
**Threat reponse** is improved when an attack is detected, enabling immediate action by security teams to contain a breach:
|
**Threat response** is improved when an attack is detected, enabling immediate action by security teams to contain a breach:
|
||||||
- [Take response actions on a machine](/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by isolating machines or collecting an investigation package.
|
- [Take response actions on a machine](/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by isolating machines or collecting an investigation package.
|
||||||
- [Take response actions on a file](/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by stopping and quarantining files or blocking a file.
|
- [Take response actions on a file](/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by stopping and quarantining files or blocking a file.
|
||||||
|
|
||||||
@ -128,7 +128,7 @@ This also means you’ll see more links to other security apps within **Windows
|
|||||||
|
|
||||||
You can read more about ransomware mitigations and detection capability at:
|
You can read more about ransomware mitigations and detection capability at:
|
||||||
- [Averting ransomware epidemics in corporate networks with Windows Defender ATP](https://blogs.technet.microsoft.com/mmpc/2017/01/30/averting-ransomware-epidemics-in-corporate-networks-with-windows-defender-atp/)
|
- [Averting ransomware epidemics in corporate networks with Windows Defender ATP](https://blogs.technet.microsoft.com/mmpc/2017/01/30/averting-ransomware-epidemics-in-corporate-networks-with-windows-defender-atp/)
|
||||||
- [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf)
|
- [Ransomware security intelligence](https://docs.microsoft.com/windows/security/threat-protection/intelligence/ransomware-malware)
|
||||||
- [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/)
|
- [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/)
|
||||||
|
|
||||||
Also see [New capabilities of Windows Defender ATP further maximizing the effectiveness and robustness of endpoint security](https://blogs.windows.com/business/2018/04/17/new-capabilities-of-windows-defender-atp-further-maximizing-the-effectiveness-and-robustness-of-endpoint-security/#62FUJ3LuMXLQidVE.97)
|
Also see [New capabilities of Windows Defender ATP further maximizing the effectiveness and robustness of endpoint security](https://blogs.windows.com/business/2018/04/17/new-capabilities-of-windows-defender-atp-further-maximizing-the-effectiveness-and-robustness-of-endpoint-security/#62FUJ3LuMXLQidVE.97)
|
||||||
@ -185,7 +185,7 @@ Improvements have been added are to Windows Hello for Business and Credential Gu
|
|||||||
|
|
||||||
New features in Windows Hello enable a better device lock experience, using multifactor unlock with new location and user proximity signals. Using Bluetooth signals, you can configure your Windows 10 device to automatically lock when you walk away from it, or to prevent others from accessing the device when you are not present.
|
New features in Windows Hello enable a better device lock experience, using multifactor unlock with new location and user proximity signals. Using Bluetooth signals, you can configure your Windows 10 device to automatically lock when you walk away from it, or to prevent others from accessing the device when you are not present.
|
||||||
|
|
||||||
New features in [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification.md) inlcude:
|
New features in [Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-identity-verification.md) include:
|
||||||
- You can now reset a forgotten PIN without deleting company managed data or apps on devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune).
|
- You can now reset a forgotten PIN without deleting company managed data or apps on devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune).
|
||||||
- For Windows Phone devices, an administrator is able to initiate a remote PIN reset through the Intune portal.
|
- For Windows Phone devices, an administrator is able to initiate a remote PIN reset through the Intune portal.
|
||||||
- For Windows desktops, users are able to reset a forgotten PIN through **Settings > Accounts > Sign-in options**. For more details, check out [What if I forget my PIN?](/windows/security/identity-protection/hello-for-business/hello-features#pin-reset).
|
- For Windows desktops, users are able to reset a forgotten PIN through **Settings > Accounts > Sign-in options**. For more details, check out [What if I forget my PIN?](/windows/security/identity-protection/hello-for-business/hello-features#pin-reset).
|
||||||
@ -208,7 +208,7 @@ Windows Defender Credential Guard has always been an optional feature, but Windo
|
|||||||
|
|
||||||
For more information, see [Credential Guard Security Considerations](/windows/access-protection/credential-guard/credential-guard-requirements#security-considerations).
|
For more information, see [Credential Guard Security Considerations](/windows/access-protection/credential-guard/credential-guard-requirements#security-considerations).
|
||||||
|
|
||||||
### Other security improvments
|
### Other security improvements
|
||||||
|
|
||||||
#### Windows security baselines
|
#### Windows security baselines
|
||||||
|
|
||||||
@ -259,17 +259,6 @@ Using Intune, Autopilot now enables locking the device during provisioning durin
|
|||||||
|
|
||||||
You can also apply an Autopilot deployment profile to your devices using Microsoft Store for Business. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the Autopilot deployment profile you applied to the device. For more information, see [Manage Windows device deployment with Windows Autopilot Deployment](https://docs.microsoft.com/microsoft-store/add-profile-to-devices).
|
You can also apply an Autopilot deployment profile to your devices using Microsoft Store for Business. When people in your organization run the out-of-box experience on the device, the profile configures Windows based on the Autopilot deployment profile you applied to the device. For more information, see [Manage Windows device deployment with Windows Autopilot Deployment](https://docs.microsoft.com/microsoft-store/add-profile-to-devices).
|
||||||
|
|
||||||
#### Windows Autopilot self-deploying mode
|
|
||||||
|
|
||||||
Windows Autopilot self-deploying mode enables a zero touch device provisioning experience. Simply power on the device, plug it into the Ethernet, and the device is fully configured automatically by Windows Autopilot.
|
|
||||||
|
|
||||||
This self-deploying capability removes the current need to have an end user interact by pressing the “Next” button during the deployment process.
|
|
||||||
|
|
||||||
You can utilize Windows Autopilot self-deploying mode to register the device to an AAD tenant, enroll in your organization’s MDM provider, and provision policies and applications, all with no user authentication or user interaction required.
|
|
||||||
|
|
||||||
To learn more about Autopilot self-deploying mode and to see step-by-step instructions to perform such a deployment, [Windows Autopilot self-deploying mode](https://docs.microsoft.com/windows/deployment/windows-autopilot/self-deploying).
|
|
||||||
|
|
||||||
|
|
||||||
#### Autopilot Reset
|
#### Autopilot Reset
|
||||||
|
|
||||||
IT Pros can use Autopilot Reset to quickly remove personal files, apps, and settings. A custom login screen is available from the lock screen that enables you to apply original settings and management enrollment (Azure Active Directory and device management) so that devices are returned to a fully configured, known, IT-approved state and ready to use. For more information, see [Reset devices with Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset).
|
IT Pros can use Autopilot Reset to quickly remove personal files, apps, and settings. A custom login screen is available from the lock screen that enables you to apply original settings and management enrollment (Azure Active Directory and device management) so that devices are returned to a fully configured, known, IT-approved state and ready to use. For more information, see [Reset devices with Autopilot Reset](https://docs.microsoft.com/education/windows/autopilot-reset).
|
||||||
@ -413,7 +402,7 @@ If you wish to take advantage of [Kiosk capabilities in Edge](https://docs.micro
|
|||||||
|
|
||||||
### Co-management
|
### Co-management
|
||||||
|
|
||||||
Intune and Microsoft Endpoint Configuration Manager policies have been added to enable hyrid Azure AD-joined authentication. Mobile Device Management (MDM) has added over 150 new policies and settings in this release, including the [MDMWinsOverGP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy, to enable easier transition to cloud-based management.
|
Intune and Microsoft Endpoint Configuration Manager policies have been added to enable hybrid Azure AD-joined authentication. Mobile Device Management (MDM) has added over 150 new policies and settings in this release, including the [MDMWinsOverGP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-controlpolicyconflict) policy, to enable easier transition to cloud-based management.
|
||||||
|
|
||||||
For more information, see [What's New in MDM enrollment and management](https://docs.microsoft.com/windows/client-management/mdm/new-in-windows-mdm-enrollment-management#whatsnew1803)
|
For more information, see [What's New in MDM enrollment and management](https://docs.microsoft.com/windows/client-management/mdm/new-in-windows-mdm-enrollment-management#whatsnew1803)
|
||||||
|
|
||||||
@ -456,7 +445,7 @@ Windows Update for Business now provides greater control over updates, with the
|
|||||||
The pause feature has been changed, and now requires a start date to set up. Users are now able to pause through **Settings > Update & security > Windows Update > Advanced options** in case a policy has not been configured. We have also increased the pause limit on quality updates to 35 days. You can find more information on pause in [Pause Feature Updates](/windows/deployment/update/waas-configure-wufb#pause-feature-updates) and [Pause Quality Updates](/windows/deployment/update/waas-configure-wufb#pause-quality-updates).
|
The pause feature has been changed, and now requires a start date to set up. Users are now able to pause through **Settings > Update & security > Windows Update > Advanced options** in case a policy has not been configured. We have also increased the pause limit on quality updates to 35 days. You can find more information on pause in [Pause Feature Updates](/windows/deployment/update/waas-configure-wufb#pause-feature-updates) and [Pause Quality Updates](/windows/deployment/update/waas-configure-wufb#pause-quality-updates).
|
||||||
|
|
||||||
|
|
||||||
Windows Update for Business managed devices are now able to defer feature update installation by up to 365 days (it used to be 180 days). In settings, users are able to select their branch readiness level and update deferal periods. See [Configure devices for Current Branch (CB) or Current Branch for Business (CBB)](/windows/deployment/update/waas-configure-wufb#configure-devices-for-current-branch-or-current-branch-for-business), [Configure when devices receive Feature Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-feature-updates) and [Configure when devices receive Quality Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-quality-updates) for details.
|
Windows Update for Business managed devices are now able to defer feature update installation by up to 365 days (it used to be 180 days). In settings, users are able to select their branch readiness level and update deferral periods. See [Configure devices for Current Branch (CB) or Current Branch for Business (CBB)](/windows/deployment/update/waas-configure-wufb#configure-devices-for-current-branch-or-current-branch-for-business), [Configure when devices receive Feature Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-feature-updates) and [Configure when devices receive Quality Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-quality-updates) for details.
|
||||||
|
|
||||||
WUfB now has additional controls available to manage Windows Insider Program enrollment through policies. For more information, see [Manage Windows Insider Program flights](https://docs.microsoft.com/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-windows-insider-preview-builds).
|
WUfB now has additional controls available to manage Windows Insider Program enrollment through policies. For more information, see [Manage Windows Insider Program flights](https://docs.microsoft.com/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-windows-insider-preview-builds).
|
||||||
|
|
||||||
@ -465,7 +454,7 @@ Windows Update for Business now provides greater control over updates, with the
|
|||||||
The pause feature has been changed, and now requires a start date to set up. Users are now able to pause through **Settings > Update & security > Windows Update > Advanced options** in case a policy has not been configured. We have also increased the pause limit on quality updates to 35 days. You can find more information on pause in [Pause Feature Updates](/windows/deployment/update/waas-configure-wufb#pause-feature-updates) and [Pause Quality Updates](/windows/deployment/update/waas-configure-wufb#pause-quality-updates).
|
The pause feature has been changed, and now requires a start date to set up. Users are now able to pause through **Settings > Update & security > Windows Update > Advanced options** in case a policy has not been configured. We have also increased the pause limit on quality updates to 35 days. You can find more information on pause in [Pause Feature Updates](/windows/deployment/update/waas-configure-wufb#pause-feature-updates) and [Pause Quality Updates](/windows/deployment/update/waas-configure-wufb#pause-quality-updates).
|
||||||
|
|
||||||
|
|
||||||
Windows Update for Business managed devices are now able to defer feature update installation by up to 365 days (it used to be 180 days). In settings, users are able to select their branch readiness level and update deferal periods. See [Configure devices for Current Branch (CB) or Current Branch for Business (CBB)](/windows/deployment/update/waas-configure-wufb#configure-devices-for-current-branch-or-current-branch-for-business), [Configure when devices receive Feature Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-feature-updates) and [Configure when devices receive Quality Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-quality-updates) for details.
|
Windows Update for Business managed devices are now able to defer feature update installation by up to 365 days (it used to be 180 days). In settings, users are able to select their branch readiness level and update deferral periods. See [Configure devices for Current Branch (CB) or Current Branch for Business (CBB)](/windows/deployment/update/waas-configure-wufb#configure-devices-for-current-branch-or-current-branch-for-business), [Configure when devices receive Feature Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-feature-updates) and [Configure when devices receive Quality Updates](/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-quality-updates) for details.
|
||||||
|
|
||||||
WUfB now has additional controls available to manage Windows Insider Program enrollment through policies. For more information, see [Manage Windows Insider Program flights](https://docs.microsoft.com/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-windows-insider-preview-builds).
|
WUfB now has additional controls available to manage Windows Insider Program enrollment through policies. For more information, see [Manage Windows Insider Program flights](https://docs.microsoft.com/windows/deployment/update/waas-configure-wufb#configure-when-devices-receive-windows-insider-preview-builds).
|
||||||
|
|
||||||
|
@ -150,7 +150,7 @@ New features for Microsoft Defender AV in Windows 10, version 1703 include:
|
|||||||
|
|
||||||
In Windows 10, version 1607, we [invested heavily in helping to protect against ransomware](https://blogs.windows.com/business/2016/11/11/defending-against-ransomware-with-windows-10-anniversary-update/#UJlHc6SZ2Zm44jCt.97), and we continue that investment in version 1703 with [updated behavior monitoring and always-on real-time protection](/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
In Windows 10, version 1607, we [invested heavily in helping to protect against ransomware](https://blogs.windows.com/business/2016/11/11/defending-against-ransomware-with-windows-10-anniversary-update/#UJlHc6SZ2Zm44jCt.97), and we continue that investment in version 1703 with [updated behavior monitoring and always-on real-time protection](/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus).
|
||||||
|
|
||||||
You can read more about ransomware mitigations and detection capability in Microsoft Defender AV in the [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/).
|
You can read more about ransomware mitigations and detection capability in Microsoft Defender AV in the [ransomware information topic](https://docs.microsoft.com/windows/security/threat-protection/intelligence/ransomware-malware) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/).
|
||||||
|
|
||||||
### Device Guard and Credential Guard
|
### Device Guard and Credential Guard
|
||||||
|
|
||||||
|