From 222ecc99839b3624deb23dd19da9d0d8a6a94db2 Mon Sep 17 00:00:00 2001 From: jdeckerMS Date: Mon, 14 Nov 2016 10:38:11 -0800 Subject: [PATCH 001/623] Juergen feedback --- .../online-deployment-surface-hub-device-accounts.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md index 853813a012..1e2ad29d87 100644 --- a/devices/surface-hub/online-deployment-surface-hub-device-accounts.md +++ b/devices/surface-hub/online-deployment-surface-hub-device-accounts.md @@ -25,7 +25,7 @@ If you have a pure, online (O365) deployment, then you can [use the provided Pow ```PowerShell Set-ExecutionPolicy Unrestricted $org='contoso.microsoft.com' - $cred=Get-Credential $admin@$org + $cred=Get-Credential admin@$org $sess= New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic -AllowRedirection Import-PSSession $sess ``` @@ -51,7 +51,7 @@ If you have a pure, online (O365) deployment, then you can [use the provided Pow If you haven’t created a compatible policy yet, use the following cmdlet—this one creates a policy called "Surface Hubs". Once it’s created, you can apply the same policy to other device accounts. ```PowerShell - $easPolicy = New-MobileDeviceMailboxPolicy -Name “SurfaceHubs” -PasswordEnabled $false + $easPolicy = New-MobileDeviceMailboxPolicy -Name "SurfaceHubs" -PasswordEnabled $false -AllowNonProvisionableDevices $True ``` Once you have a compatible policy, then you will need to apply the policy to the device account. However, policies can only be applied to user accounts and not resource mailboxes. You need to convert the mailbox into a user type, apply the policy, and then convert it back into a mailbox—you may need to re-enable it and set the password again too. @@ -125,7 +125,7 @@ If you have a pure, online (O365) deployment, then you can [use the provided Pow If you aren't sure what value to use for the `RegistrarPool` parameter in your environment, you can get the value from an existing Skype for Business user using this cmdlet: ```PowerShell - Get-CsOnlineUser -Identity ‘alice@contoso.com’| fl *registrarpool* + Get-CsOnlineUser -Identity 'alice@contoso.com'| fl *registrarpool* ``` 9. Assign Skype for Business license to your Surface Hub account. From cb98ff206169e22c4593f28d123a19f165445b8d Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 14:06:04 -0800 Subject: [PATCH 002/623] testing video --- windows/keep-secure/windows-defender-block-at-first-sight.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index a31f43f6ee..58e4816bea 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -128,3 +128,6 @@ You may choose to disable the Block at First Sight feature if you want to retain - [Windows Defender in Windows 10](windows-defender-in-windows-10.md) +​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 + + \ No newline at end of file From 4bf12fdc27d4f90f718f6aa9bd5ebb2aa7b61619 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 14:06:44 -0800 Subject: [PATCH 003/623] testing video --- .../keep-secure/windows-defender-block-at-first-sight.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index 58e4816bea..3fae1c1015 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -26,6 +26,10 @@ Block at First Sight is a feature of Windows Defender cloud protection that prov It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. +​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 + + + ## How it works When a Windows Defender client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean. @@ -128,6 +132,3 @@ You may choose to disable the Block at First Sight feature if you want to retain - [Windows Defender in Windows 10](windows-defender-in-windows-10.md) -​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 - - \ No newline at end of file From 6e0e81cf54afd8da85f9b8ef4f5df43744c83a0b Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 14:15:18 -0800 Subject: [PATCH 004/623] test video --- windows/keep-secure/windows-defender-block-at-first-sight.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index 3fae1c1015..b94ccea328 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -26,6 +26,8 @@ Block at First Sight is a feature of Windows Defender cloud protection that prov It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. +test + ​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 From 83040f6e1145d709c681e4b867d6bcbb8cb3b2b0 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 14:28:57 -0800 Subject: [PATCH 005/623] test video --- .../windows-defender-block-at-first-sight.md | 20 ++++++++++++++++++- 1 file changed, 19 insertions(+), 1 deletion(-) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index b94ccea328..99cae55858 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -30,7 +30,25 @@ test ​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 - + + + + + +
+ + +
## How it works From bdb36ab5a15c183e70759b42a9770c458c6c00fb Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 14:38:54 -0800 Subject: [PATCH 006/623] test video --- .../windows-defender-block-at-first-sight.md | 24 +++++++++++-------- 1 file changed, 14 insertions(+), 10 deletions(-) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index 99cae55858..9766340060 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -26,30 +26,34 @@ Block at First Sight is a feature of Windows Defender cloud protection that prov It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. -test + ​https://www.microsoft.com/showcase/video.aspx?uuid=df196dbe-ae57-44f3-aba8-539568434331 - + - + + +
+ + -
- +
+ ## How it works When a Windows Defender client encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend will apply heuristics, machine learning, and automated analysis of the file to determine the files as malicious or clean. From 3b55b02981b518442e9263866ac1eed297117961 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Tue, 3 Jan 2017 15:24:15 -0800 Subject: [PATCH 007/623] Update windows-defender-block-at-first-sight.md --- .../windows-defender-block-at-first-sight.md | 38 +++++++++---------- 1 file changed, 19 insertions(+), 19 deletions(-) diff --git a/windows/keep-secure/windows-defender-block-at-first-sight.md b/windows/keep-secure/windows-defender-block-at-first-sight.md index 9766340060..82f915b8ff 100644 --- a/windows/keep-secure/windows-defender-block-at-first-sight.md +++ b/windows/keep-secure/windows-defender-block-at-first-sight.md @@ -26,31 +26,31 @@ Block at First Sight is a feature of Windows Defender cloud protection that prov It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. -