diff --git a/.openpublishing.redirection.windows-configuration.json b/.openpublishing.redirection.windows-configuration.json index e77d10c05e..60a9cc42b7 100644 --- a/.openpublishing.redirection.windows-configuration.json +++ b/.openpublishing.redirection.windows-configuration.json @@ -804,6 +804,11 @@ "source_path": "windows/configuration/kiosk/guidelines-for-assigned-access-app.md", "redirect_url": "/windows/configuration/assigned-access/overview", "redirect_document_id": false + }, + { + "source_path": "windows/configuration/kiosk/kiosk-prepare.md", + "redirect_url": "/windows/configuration/assigned-access/recommendations", + "redirect_document_id": false } ] } \ No newline at end of file diff --git a/windows/configuration/assigned-access/configuration-file.md b/windows/configuration/assigned-access/configuration-file.md index 629bbaf26b..5b08cbb1fd 100644 --- a/windows/configuration/assigned-access/configuration-file.md +++ b/windows/configuration/assigned-access/configuration-file.md @@ -358,7 +358,7 @@ This sample demonstrates that both UWP and Win32 apps can be configured to autom Under `Configs`, define one or more user accounts and their association with a profile. -When the user account signs in on the device, the associated Assigned Access profile is enforced along with policy settings that are part of the restricted user experience. +When the user account signs in, the associated Assigned Access profile is enforced along with policy settings that are part of the restricted user experience. You can assign: diff --git a/windows/configuration/assigned-access/index.md b/windows/configuration/assigned-access/index.md index 0af47ab03d..c1560b3726 100644 --- a/windows/configuration/assigned-access/index.md +++ b/windows/configuration/assigned-access/index.md @@ -109,4 +109,5 @@ HKLM\SOFTWARE\Microsoft\Windows\AssignedAccessCsp These locations contain the latest "evaluated" configuration for each sign-in user: "HKCU\SOFTWARE\Microsoft\Windows\AssignedAccessConfiguration" (If it doesn't exist, it means no Assigned Access to be enforced for this user.) + --> \ No newline at end of file diff --git a/windows/configuration/assigned-access/shell-launcher/configuration-file.md b/windows/configuration/assigned-access/shell-launcher/configuration-file.md index 60d237f7c1..9d8395b146 100644 --- a/windows/configuration/assigned-access/shell-launcher/configuration-file.md +++ b/windows/configuration/assigned-access/shell-launcher/configuration-file.md @@ -1,217 +1,179 @@ --- -title: Create an Shell Launcher configuration file +title: Create a Shell Launcher configuration file description: Learn how to create an XML file to configure a device with Shell Launcher. ms.date: 02/12/2024 ms.topic: how-to --- -# Create an Shell Launcher configuration file +# Create a Shell Launcher configuration file -This article provides practical examples of Shell Launcher XML configuration files. +To configure Shell Launcher, you must create and apply a configuration XML file to your devices. The configuration file must conform to a schema, as defined in [Shell Launcher XML Schema Definition (XSD)](xsd.md). -Let's start by looking at the basic structure of the XML file. +This article describes how to configure a Shell Launcher configuration file, including practical examples. -- A configuration xml can define one or multiple `Profiles` - - Each profile has a unique `Profile Id` and defines a `Shell` elemnt, which is the application that executes when the user signs in - - A profile can define a default action to be taken when the application exits and may define actions to be taken when the application exits with a specific return code - - A profile must be associated to a user account to have an effect - - You can define a `Default profile` that is used when no other profile is associated to a user account -- A configuration xml can define one or multiple `configs` - - Each config associates a user account to a `profile Id` - - A profile has no effect if it's not associated to a user account +Let's start by looking at the basic structure of the XML file. A Shell Launcher configuration file contains: -You can start your file by pasting the following XML code into a text editor, and saving the file with an xml extension. For example, `kiosk.xml`. +- One or multiple `profiles`. Each `profile` defines: + - the application that replaces the standard Windows shell (`Explorer.exe`), which is executed when a user signs in + - default action to be taken when the application exits, and actions to be taken when the application exits with a specific return code +- One or multiple `configs`. Each `config` associates a user account to a `profile` + +> [!NOTE] +> A profile has no effect if it's not associated to a user account. + +Here's a basic example of a Shell Launcher configuration file, with one profile and one config: ```xml - - - - - - - -``` - -## Profiles node - -If you want to define a default profile, you can use the `DefaultProfile` element: - -```xml - - - - - -``` - -Each profile is identified by a unique identifier `Profile Id`, for example: - -```xml - - - + xmlns="http://schemas.microsoft.com/ShellLauncher/2018/Configuration" + xmlns:V2="http://schemas.microsoft.com/ShellLauncher/2019/Configuration"> + + + - -``` - -### Shell node - -The `Shell` node defines the application that executes when the user signs in: - -- The `Shell` attribute is the path to the application -- The `V2:AppType` attribute defines the type of application -- The `V2:AllAppsFullScreen` attribute is a boolean value that defines if all applications are executed in full screen - -```xml - - - - - - -``` - - -```xml - - - - - - - - - - - - - - - - - - - - - + + + + + + ``` -## Default action, custom action, exit code +## Profiles + +A configuration file can contain one or more profiles. Each profile is identified by a unique identified `Profile Id` and, optionally, a `Name`. For example: + +```xml + + + + + +``` + +> [!TIP] +> The `Profile Id` must be unique within the XML file. You can generate a GUID with the PowerShell cmdlet `New-Guid`. + +You can define a `Defaultprofile` that is used when no other profile is associated to a user account. This ensures that every user using the device uses the same application. Example: + +```xml + + + + + +``` + +### Shell + +Each profile defines a `Shell` element, which contains details about the application to execute. The `Shell` element has the following properties: + +| Property| Description | Details | +|-|-|-| +|`Shell`| Path to the application. || +|`V2:AppType`| Defines the type of application. |Allowed values are `Desktop` and `UWP`.| +|`V2:AllAppsFullScreen` | Boolean value that defines if all applications are executed in full screen. |- When set to `True`, Shell Launcher will runs every app in full screen, or maximized for desktop apps
- When set to `False` or not set, only the custom shell app runs in full screen; other apps launched by the user run in windowed mode.| + +Example: + +```xml + + + + + +``` + +#### ReturnCodeActions Shell Launcher defines four actions to handle app exits. You can customize Shell Launcher and use the actions based on different exit code. | Value | Description | |--|--| -| 0 | Restart the shell | -| 1 | Restart the device | -| 2 | Shut down the device | -| 3 | Do nothing | +| `0` | Restart the shell | +| `1` | Restart the device | +| `2` | Shut down the device | +| `3` | Do nothing | -These actions can be used as default action, or can be mapped to a specific exit code. Refer to [Shell Launcher](/windows-hardware/customize/enterprise/wesl-usersettingsetcustomshell) to see how these codes with Shell Launcher WMI. +These actions can be used as default action, or can be mapped to a specific exit code. Refer to [Shell Launcher](/windows-hardware/customize/enterprise/wesl-usersettingsetcustomshell) to see how use these codes with Shell Launcher WMI. To configure these actions with Shell Launcher CSP, use below syntax in the Shell Launcher configuration xml. You can specify at most four custom actions mapping to four exit codes, and one default action for all other exit codes. When app exits and if the exit code is not found in the custom action mapping, or there is no default action defined, it will be no-op, i.e. nothing happens. So it's recommended to at least define DefaultAction. [Get XML examples for different Shell Launcher v2 configurations.](https://github.com/Microsoft/Windows-iotcore-samples/tree/develop/Samples/ShellLauncherV2) -``` xml - - - - - - - +Example: + +```xml + + + + + + + + + + + ``` -## AllAppsFullScreen - -In the XML for Shell Launcher v2, note the **AllAppsFullScreen** attribute. When set to **True**, Shell Launcher will run every app in full screen, or maximized for desktop apps. When this attribute is set to **False** or not set, only the custom shell app runs in full screen; other apps launched by the user will run in windowed mode. - ### AppType -Allowed values are `Desktop` and `UWP`. -`AllAppsFullScreen` is a boolean value. If true, all applications are executed in full screen. If false... +**Desktop application** -:::row::: - :::column span="1"::: - **Scenario** - :::column-end::: - :::column span="3"::: - **Sample Xml** - :::column-end::: -:::row-end::: -:::row::: - :::column span="1"::: - **Desktop application** - :::column-end::: - :::column span="3"::: - In this example, Microsoft Edge is executed in full screen, opening a website. The website is reloaded after 2 minutes of inactivity. - ```xml - - - - - - - - - - - ``` - :::column-end::: -:::row-end::: -:::row::: - :::column span="1"::: - **UWP application** - In this example, the Weather app is executed in full screen. - :::column-end::: - :::column span="3"::: - ```xml - - - - - - - - - - - - ``` - :::column-end::: -:::row-end::: +In this example, Microsoft Edge is executed in full screen, opening a website. The website is reloaded after 2 minutes of inactivity. -## Kiosk example +```xml + + + + + + + + + + +``` + + +**UWP application** + +In this example, the Weather app is executed in full screen. + +```xml + + + + + + + + + + + +``` + +## Configs + +Under `Configs`, define one or more user accounts and their association with a profile. + +You can specify a name, SID or AutologonAccount + +When the user account signs in, the associated Shell Launcher profile is applied, loading the application specified in the profile. + +```xml + + + + + + +``` + +## Example [!INCLUDE [quickstart-xml](includes/quickstart-xml.md)] - - - - diff --git a/windows/security/includes/sections/operating-system-security.md b/windows/security/includes/sections/operating-system-security.md index 673576f501..4fa55308cf 100644 --- a/windows/security/includes/sections/operating-system-security.md +++ b/windows/security/includes/sections/operating-system-security.md @@ -13,7 +13,7 @@ ms.topic: include | **[Measured boot](/windows/compatibility/measured-boot)** | Measured Boot measures all important code and configuration settings during the boot of Windows. This includes: the firmware, boot manager, hypervisor, kernel, secure kernel and operating system. Measured Boot stores the measurements in the TPM on the machine, and makes them available in a log that can be tested remotely to verify the boot state of the client.

The Measured Boot feature provides anti-malware software with a trusted (resistant to spoofing and tampering) log of all boot components that started before it. The anti-malware software can use the log to determine whether components that ran before it are trustworthy, or if they're infected with malware. The anti-malware software on the local machine can send the log to a remote server for evaluation. The remote server may initiate remediation actions, either by interacting with software on the client, or through out-of-band mechanisms, as appropriate. | | **[Device health attestation service](/windows/security/operating-system-security/system-security/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices)** | The Windows device health attestation process supports a zero-trust paradigm that shifts the focus from static, network-based perimeters, to users, assets, and resources. The attestation process confirms the device, firmware, and boot process are in a good state and haven't been tampered with before they can access corporate resources. The determinations are made with data stored in the TPM, which provides a secure root of trust. The information is sent to an attestation service, such as Azure Attestation, to verify the device is in a trusted state. Then, an MDM tool like Microsoft Intune reviews device health and connects this information with Microsoft Entra ID for conditional access. | | **[Windows security policy settings and auditing](/windows/security/threat-protection/security-policy-settings/security-policy-settings)** | Microsoft provides a robust set of security settings policies that IT administrators can use to protect Windows devices and other resources in their organization. | -| **[Assigned Access](/windows/configuration/assigned-access/overview)** | Some desktop devices in an enterprise serve a special purpose. For example, a PC in the lobby that customers use to see your product catalog. Or, a PC displaying visual content as a digital sign. Windows client offers two different locked-down experiences for public or specialized use: A single-app kiosk that runs a single Universal Windows Platform (UWP) app in full screen above the lock screen, or A multi-app kiosk that runs one or more apps from the desktop.

Kiosk configurations are based on Assigned Access, a feature in Windows that allows an administrator to manage the user's experience by limiting the application entry points exposed to the user. | +| **[Assigned Access](/windows/configuration/)** | Some desktop devices in an enterprise serve a special purpose. For example, a PC in the lobby that customers use to see your product catalog. Or, a PC displaying visual content as a digital sign. Windows client offers two different locked-down experiences for public or specialized use: A single-app kiosk that runs a single Universal Windows Platform (UWP) app in full screen above the lock screen, or A multi-app kiosk that runs one or more apps from the desktop.

Kiosk configurations are based on Assigned Access, a feature in Windows that allows an administrator to manage the user's experience by limiting the application entry points exposed to the user. | ## Virus and threat protection