mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
updated the changes
This commit is contained in:
parent
4bb9653fa4
commit
a8697dba12
@ -67,8 +67,8 @@ If your organization restricts computers on your network from connecting to the
|
||||
- \*.wns.windows.com
|
||||
- \*.microsoft.com
|
||||
- \*.s-microsoft.com
|
||||
- www.msftncsi.com (prior to Windows 10, version 1607)
|
||||
- `www.msftconnecttest.com/connecttest.txt` (replaces www.msftncsi.com
|
||||
- `www.msftncsi.com` (prior to Windows 10, version 1607)
|
||||
- `www.msftconnecttest.com/connecttest.txt` (replaces `www.msftncsi.com`
|
||||
starting with Windows 10, version 1607)
|
||||
|
||||
Store for Business requires Microsoft Windows HTTP Services (WinHTTP) to install, or update apps.
|
||||
|
@ -82,7 +82,7 @@ Restart on Idle Time | Specify when Kiosk Browser should restart in a fresh stat
|
||||
>
|
||||
> 1. Create the provisioning package. When ready to export, close the project in Windows Configuration Designer.
|
||||
> 2. Open the customizations.xml file in the project folder (e.g C:\Users\name\Documents\Windows Imaging and Configuration Designer (WICD)\Project_18).
|
||||
> 3. Insert the null character string in between each URL (e.g www.bing.com` www.contoso.com)`.
|
||||
> 3. Insert the null character string in between each URL (e.g `www.bing.com,` `www.contoso.com`).
|
||||
> 4. Save the XML file.
|
||||
> 5. Open the project again in Windows Configuration Designer.
|
||||
> 6. Export the package. Ensure you do not revisit the created policies under Kiosk Browser or else the null character will be removed.
|
||||
|
@ -27,4 +27,4 @@ Set to **True** or **False**.
|
||||
|
||||
## Related topics
|
||||
|
||||
- For more information, see [AllJoyn – Wikipedia](https://wikipedia.org/wiki/AllJoyn).
|
||||
- [AllJoyn – Wikipedia](https://wikipedia.org/wiki/AllJoyn)
|
||||
|
@ -193,7 +193,7 @@ The web server is ready to host the CRL distribution point. Now, configure the
|
||||
1. On the issuing certificate authority, sign-in as a local administrator. Start the **Certificate Authority** console from **Administrative Tools**.
|
||||
2. In the navigation pane, right-click the name of the certificate authority and click **Properties**
|
||||
3. Click **Extensions**. On the **Extensions** tab, select **CRL Distribution Point (CDP)** from the **Select extension** list.
|
||||
4. On the **Extensions** tab, click **Add**. Type <b>http://crl.[domainname]/cdp/</b> in **location**. For example, `<http://crl.corp.contoso.com/cdp/>` or `<http://crl.contoso.com/cdp/> (do not forget the trailing forward slash). `
|
||||
4. On the **Extensions** tab, click **Add**. Type <b>http://crl.[domainname]/cdp/</b> in **location**. For example, `<http://crl.corp.contoso.com/cdp/>` or `<http://crl.contoso.com/cdp/>` (do not forget the trailing forward slash).
|
||||

|
||||
5. Select **\<CaName>** from the **Variable** list and click **Insert**. Select **\<CRLNameSuffix>** from the **Variable** list and click **Insert**. Select **\<DeltaCRLAllowed>** from the **Variable** list and click **Insert**.
|
||||
6. Type **.crl** at the end of the text in **Location**. Click **OK**.
|
||||
|
Loading…
x
Reference in New Issue
Block a user