From f5c12f68a33c200e94df189aaf709d3ef8be7948 Mon Sep 17 00:00:00 2001 From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com> Date: Wed, 8 Mar 2023 06:59:44 +1000 Subject: [PATCH 1/7] Update policy-csp-update.md Including more details regarding setEduRestart --- windows/client-management/mdm/policy-csp-update.md | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index e9921d6795..eda03968c6 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3251,7 +3251,17 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po - +Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a logged on user or device is on battery power as long as there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#ActiveHoursEnd) time with a 60 minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. + +The following rules are followed regarding battery power: +- Above 70% - allowed to start work; +- Above 40% - allowed to reboot; +- Above 20% - allowed to continue work. + +This setting overrides the install deferral behaviour of [AllowAutoUpdate](#AllowAutoUpdate). + +These settings are designed for education devices that remain in carts overnight that are left in sleep mode. It is not designed for 1:1 devices. + From 996c9a5f2e12de59268ca26b62976f89e53e0d50 Mon Sep 17 00:00:00 2001 From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com> Date: Wed, 8 Mar 2023 07:12:18 +1000 Subject: [PATCH 2/7] Update policy-csp-update.md --- windows/client-management/mdm/policy-csp-update.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index eda03968c6..fcaf7a1d8b 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3251,14 +3251,14 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po -Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a logged on user or device is on battery power as long as there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#ActiveHoursEnd) time with a 60 minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. +Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a logged on user or device is on battery power as long as there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60 minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. The following rules are followed regarding battery power: - Above 70% - allowed to start work; - Above 40% - allowed to reboot; - Above 20% - allowed to continue work. -This setting overrides the install deferral behaviour of [AllowAutoUpdate](#AllowAutoUpdate). +This setting overrides the install deferral behaviour of [AllowAutoUpdate](#allowautoupdate). These settings are designed for education devices that remain in carts overnight that are left in sleep mode. It is not designed for 1:1 devices. From 9786d7316f8b35f0ffb9cd9fed0f731d3821e1d9 Mon Sep 17 00:00:00 2001 From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com> Date: Wed, 8 Mar 2023 07:26:07 +1000 Subject: [PATCH 3/7] Update policy-csp-update.md --- windows/client-management/mdm/policy-csp-update.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index fcaf7a1d8b..e328539f7b 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3251,6 +3251,7 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po + Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a logged on user or device is on battery power as long as there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60 minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. The following rules are followed regarding battery power: From 09c05afac5931721d25b9ee2adc027c2194b92e7 Mon Sep 17 00:00:00 2001 From: Jordan Geurten Date: Tue, 7 Mar 2023 17:50:47 -0500 Subject: [PATCH 4/7] Recommended blocks - 25310 + RTCore64 blocks --- ...icrosoft-recommended-driver-block-rules.md | 446 +++++++++++++++++- 1 file changed, 442 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md index 7acb0c4301..54c82d24ae 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules.md @@ -73,7 +73,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- ```xml - 10.0.25290.0 + 10.0.25310.0 {2E07F7E4-194C-4D20-B7C9-6F44A6C5A234} @@ -354,6 +354,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -366,6 +502,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + @@ -631,6 +779,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -801,6 +953,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -861,7 +1042,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + @@ -872,7 +1055,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - @@ -891,6 +1073,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1036,6 +1219,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1047,6 +1231,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -1461,6 +1646,66 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1570,6 +1815,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -1584,6 +1833,9 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + @@ -1619,6 +1871,11 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + @@ -1921,6 +2178,142 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1933,6 +2326,18 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + @@ -2004,6 +2409,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + @@ -2198,6 +2604,10 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + @@ -2368,6 +2778,35 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -2407,7 +2846,6 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - @@ -2433,7 +2871,7 @@ Microsoft recommends enabling [HVCI](/windows/security/threat-protection/device- - 10.0.25290.0 + 10.0.25310.0 From d0c0be01b2468a558f6baea691744b5fe3ec9603 Mon Sep 17 00:00:00 2001 From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com> Date: Wed, 8 Mar 2023 16:27:48 +1000 Subject: [PATCH 5/7] Update windows/client-management/mdm/policy-csp-update.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/mdm/policy-csp-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index e328539f7b..6aac2cbd12 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -3252,7 +3252,7 @@ Enabling this policy for EDU devices that remain on Carts overnight will skip po -Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a logged on user or device is on battery power as long as there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60 minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. +Enabling this policy will restrict updates to download and install outside of Active Hours. Updates will be allowed to start even if there is a signed-in user or the device is on battery power, providing there is more than 70% battery capacity. Windows will schedule the device to wake from sleep 1 hour after the [ActiveHoursEnd](#activehoursend) time with a 60-minute random delay. Devices will reboot immediately after the updates are installed. If there are still pending updates, the device will continue to retry every hour for 4 hours. The following rules are followed regarding battery power: - Above 70% - allowed to start work; From 242f13a1850617e68606b352cfa16aa94f0b63a9 Mon Sep 17 00:00:00 2001 From: Tiara Quan <95256667+tiaraquan@users.noreply.github.com> Date: Wed, 8 Mar 2023 07:55:35 -0800 Subject: [PATCH 6/7] Update windows-autopatch-windows-update.md --- .../operate/windows-autopatch-windows-update.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-update.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-update.md index f90a1e1894..b0b5b1557f 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-update.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-update.md @@ -1,7 +1,7 @@ --- title: Customize Windows Update settings description: This article explains how to customize Windows Updates in Windows Autopatch -ms.date: 03/07/2023 +ms.date: 03/08/2023 ms.prod: windows-client ms.technology: itpro-updates ms.topic: how-to From a93fcff616b3322a63b2b00424a1e389aa90ee08 Mon Sep 17 00:00:00 2001 From: Tiara Quan <95256667+tiaraquan@users.noreply.github.com> Date: Wed, 8 Mar 2023 07:55:50 -0800 Subject: [PATCH 7/7] Update windows-autopatch-roles-responsibilities.md --- .../overview/windows-autopatch-roles-responsibilities.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/windows-autopatch/overview/windows-autopatch-roles-responsibilities.md b/windows/deployment/windows-autopatch/overview/windows-autopatch-roles-responsibilities.md index d8a057ab8f..9092acc2af 100644 --- a/windows/deployment/windows-autopatch/overview/windows-autopatch-roles-responsibilities.md +++ b/windows/deployment/windows-autopatch/overview/windows-autopatch-roles-responsibilities.md @@ -1,7 +1,7 @@ --- title: Roles and responsibilities description: This article describes the roles and responsibilities provided by Windows Autopatch and what the customer must do -ms.date: 03/07/2023 +ms.date: 03/08/2023 ms.prod: windows-client ms.technology: itpro-updates ms.topic: conceptual