diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index e9921d6795..6aac2cbd12 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3252,6 +3252,17 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po +Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a signed-in user or the device is on battery power, providing there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60-minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. + +The following rules are followed regarding battery power: +- Above 70% - allowed to start work; +- Above 40% - allowed to reboot; +- Above 20% - allowed to continue work. + +This setting overrides the install deferral behaviour of [AllowAutoUpdate](#allowautoupdate). + +These settings are designed for education devices that remain in carts overnight that are left in sleep mode. It is not designed for 1:1 devices. + diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md index 7acb0c4301..54c82d24ae 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md @@ -73,7 +73,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- ```xml - 10.0.25290.0 + 10.0.25310.0 {2E07F7E4-194C-4D20-B7C9-6F44A6C5A234} @@ -354,6 +354,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -366,6 +502,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + @@ -631,6 +779,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -801,6 +953,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -861,7 +1042,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + @@ -872,7 +1055,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - @@ -891,6 +1073,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1036,6 +1219,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1047,6 +1231,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1461,6 +1646,66 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1570,6 +1815,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -1584,6 +1833,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + @@ -1619,6 +1871,11 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + @@ -1921,6 +2178,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1933,6 +2326,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + @@ -2004,6 +2409,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -2198,6 +2604,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -2368,6 +2778,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -2407,7 +2846,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - @@ -2433,7 +2871,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - 10.0.25290.0 + 10.0.25310.0