Merged PR 12038: 10/11 AM Publish

This commit is contained in:
Huaping Yu (Beyondsoft Consulting Inc) 2018-10-11 17:29:34 +00:00
commit b02dc03b90
29 changed files with 61 additions and 54 deletions

View File

@ -2745,11 +2745,13 @@ The following list shows the configuration service providers supported in Window
- [DMClient CSP](dmclient-csp.md) - [DMClient CSP](dmclient-csp.md)
- [EnterpriseAppManagement CSP](enterpriseappmanagement-csp.md) - [EnterpriseAppManagement CSP](enterpriseappmanagement-csp.md)
- [HealthAttestation CSP](healthattestation-csp.md) - [HealthAttestation CSP](healthattestation-csp.md)
- [NetworkProxy CSP](networkproxy-csp.md)
- [Policy CSP](policy-configuration-service-provider.md) - [Policy CSP](policy-configuration-service-provider.md)
- [Provisioning CSP (Provisioning only)](provisioning-csp.md) - [Provisioning CSP (Provisioning only)](provisioning-csp.md)
- [Reboot CSP](reboot-csp.md) - [Reboot CSP](reboot-csp.md)
- [RemoteWipe CSP](remotewipe-csp.md) 1 - [RemoteWipe CSP](remotewipe-csp.md) 1
- [RootCATrustedCertificates CSP](rootcacertificates-csp.md) - [RootCATrustedCertificates CSP](rootcacertificates-csp.md)
- [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
- [Update CSP](update-csp.md) - [Update CSP](update-csp.md)
- [VPNv2 CSP](vpnv2-csp.md) - [VPNv2 CSP](vpnv2-csp.md)
- [WiFi CSP](wifi-csp.md) - [WiFi CSP](wifi-csp.md)

View File

@ -332,11 +332,11 @@ Sample syncxml to provision the firewall settings to evaluate
<p style="margin-left: 20px">Value type is bool. Supported operations are Add, Get, Replace, and Delete.</p> <p style="margin-left: 20px">Value type is bool. Supported operations are Add, Get, Replace, and Delete.</p>
<a href="" id="localuserauthorizedlist"></a>**FirewallRules/_FirewallRuleName_/LocalUserAuthorizationList** <a href="" id="localuserauthorizedlist"></a>**FirewallRules/_FirewallRuleName_/LocalUserAuthorizationList**
<p style="margin-left: 20px">Specifies the list of authorized local users for the app container. This is a string in Security Descriptor Definition Language (SDDL) format.</p> <p style="margin-left: 20px">Specifies the list of authorized local users for this rule. This is a string in Security Descriptor Definition Language (SDDL) format.</p>
<p style="margin-left: 20px">Value type is string. Supported operations are Add, Get, Replace, and Delete.</p> <p style="margin-left: 20px">Value type is string. Supported operations are Add, Get, Replace, and Delete.</p>
<a href="" id="status"></a>**FirewallRules/_FirewallRuleName_/Status** <a href="" id="status"></a>**FirewallRules/_FirewallRuleName_/Status**
<p style="margin-left: 20px">Provides information about the specific verrsion of the rule in deployment for monitoring purposes.</p> <p style="margin-left: 20px">Provides information about the specific version of the rule in deployment for monitoring purposes.</p>
<p style="margin-left: 20px">Value type is string. Supported operation is Get.</p> <p style="margin-left: 20px">Value type is string. Supported operation is Get.</p>
<a href="" id="name"></a>**FirewallRules/_FirewallRuleName_/Name** <a href="" id="name"></a>**FirewallRules/_FirewallRuleName_/Name**

View File

@ -6,7 +6,7 @@ keywords: ["group policy", "start menu", "start screen"]
ms.prod: w10 ms.prod: w10
ms.mktglfcycl: manage ms.mktglfcycl: manage
ms.sitesec: library ms.sitesec: library
author: coreyp author: coreyp-at-msft
ms.author: coreyp ms.author: coreyp
ms.topic: article ms.topic: article
ms.localizationpriority: medium ms.localizationpriority: medium

View File

@ -25,6 +25,9 @@ ms.date: 4/16/2018
IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store. IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store.
> [!Important]
> All executable code including Microsoft Store applications should have an update and maintenance plan. Organizations that use Microsoft Store applications should ensure that the applications can be updated through the Microsoft Store over the internet, through the [Private Store](/microsoft-store/distribute-apps-from-your-private-store), or [distributed offline](/microsoft-store/distribute-offline-apps) to keep the applications up to date.
## Options to configure access to Microsoft Store ## Options to configure access to Microsoft Store
@ -80,8 +83,7 @@ You can also use Group Policy to manage access to Microsoft Store.
4. On the **Turn off Store application** setting page, click **Enabled**, and then click **OK**. 4. On the **Turn off Store application** setting page, click **Enabled**, and then click **OK**.
> [!Important] > [!Important]
> Enabling **Turn off Store application** policy turns off app updates from Microsoft Store. > Enabling **Turn off Store application** policy turns off app updates from Microsoft Store.
## <a href="" id="block-store-mdm"></a>Block Microsoft Store using management tool ## <a href="" id="block-store-mdm"></a>Block Microsoft Store using management tool

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/18 ms.date: 06/01/18
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/18 ms.date: 06/01/18
--- ---

View File

@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: greg-lindsay ms.author: greg-lindsay
ms.date: 07/13/18 ms.date: 07/13/18
--- ---

View File

@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: ms.pagetype:
ms.localizationpriority: medium ms.localizationpriority: medium
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/18 ms.date: 06/01/18
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: low ms.localizationpriority: low
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: ms.pagetype:
ms.localizationpriority: medium ms.localizationpriority: medium
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: low ms.localizationpriority: low
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: low ms.localizationpriority: low
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 08/22/2018 ms.date: 08/22/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: ms.pagetype:
ms.localizationpriority: medium ms.localizationpriority: medium
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: ms.pagetype:
ms.localizationpriority: medium ms.localizationpriority: medium
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
ms.sitesec: library ms.sitesec: library
ms.pagetype: ms.pagetype:
ms.localizationpriority: medium ms.localizationpriority: medium
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: medium ms.localizationpriority: medium
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
ms.localizationpriority: high ms.localizationpriority: high
ms.sitesec: library ms.sitesec: library
ms.pagetype: deploy ms.pagetype: deploy
author: coreyp-at-msft author: greg-lindsay
ms.author: coreyp ms.author: greglin
ms.date: 06/01/2018 ms.date: 06/01/2018
--- ---

View File

@ -71,10 +71,12 @@ The Windows 10 operating system introduces a new way to build, deploy, and servi
These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time. These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time.
- [Read more about Windows as a Service](/windows/deployment/update/waas-overview) - [Read more about Windows as a Service](/windows/deployment/update/waas-overview)
- [Read how much space does Windows 10 take](https://www.microsoft.com/en-us/windows/windows-10-specifications)
## Related topics ## Related topics
[Windows 10 TechCenter](https://go.microsoft.com/fwlink/?LinkId=620009) [Windows 10 TechCenter](https://go.microsoft.com/fwlink/?LinkId=620009)
   

View File

@ -9,7 +9,7 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: justinha author: justinha
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 10/05/2018 ms.date: 10/11/2018
--- ---
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP) # List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
@ -32,7 +32,7 @@ Apps can be enlightened or unenlightened:
- Windows **Save As** experiences only allow you to save your files as enterprise. - Windows **Save As** experiences only allow you to save your files as enterprise.
- **WIP-work only apps** are unenlightened line-of-business apps that have been tested and deemed safe for use in an enterprise with WIP and Mobile App Management (MAM) solutions. - **WIP-work only apps** are unenlightened line-of-business apps that have been tested and deemed safe for use in an enterprise with WIP and Mobile App Management (MAM) solutions without device enrollment. Unenlightened apps that are targeted by WIP without enrollment run under personal mode.
## List of enlightened Microsoft apps ## List of enlightened Microsoft apps
Microsoft has made a concerted effort to enlighten several of our more popular apps, including the following: Microsoft has made a concerted effort to enlighten several of our more popular apps, including the following:

View File

@ -8,7 +8,7 @@ ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: justinha author: justinha
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 10/04/2018 ms.date: 10/10/2018
--- ---
# How Windows Information Protection protects files with a sensitivity label # How Windows Information Protection protects files with a sensitivity label
@ -29,7 +29,7 @@ Microsoft information protection technologies include:
- [Windows Information Protection (WIP)](protect-enterprise-data-using-wip.md) is built in to Windows 10 and protects data at rest on endpoint devices, and manages apps to protect data in use. - [Windows Information Protection (WIP)](protect-enterprise-data-using-wip.md) is built in to Windows 10 and protects data at rest on endpoint devices, and manages apps to protect data in use.
- [Office 365 Information Protection](https://docs.microsoft.com/office365/securitycompliance/office-365-info-protection-for-gdpr-overview) is a solution to classify, protect, and monitor personal data in Office 365 and other Software-as-a-Service (SaaS) apps. - [Office 365 Information Protection](https://docs.microsoft.com/office365/securitycompliance/office-365-info-protection-for-gdpr-overview) is a solution to classify, protect, and monitor personal data in Office 365 and other first-party or third-party Software-as-a-Service (SaaS) apps.
- [Azure Information Protection](https://docs.microsoft.com/azure/information-protection/what-is-information-protection) is a cloud-based solution that can be purchased either standalone or as part of Microsoft 365 Enterprise. It helps an organization classify and protect its documents and emails by applying labels. End users can choose and apply sensitivity labels from a bar that appears below the ribbon in Office apps: - [Azure Information Protection](https://docs.microsoft.com/azure/information-protection/what-is-information-protection) is a cloud-based solution that can be purchased either standalone or as part of Microsoft 365 Enterprise. It helps an organization classify and protect its documents and emails by applying labels. End users can choose and apply sensitivity labels from a bar that appears below the ribbon in Office apps:
@ -50,7 +50,7 @@ For more information about labels, see [Overview of labels](https://docs.microso
## Use cases ## Use cases
This sections covers how WIP works with sensitivity labels in specific use cases. This section covers how WIP works with sensitivity labels in specific use cases.
### User downloads from or creates a document on a work site ### User downloads from or creates a document on a work site
@ -60,7 +60,7 @@ If the document also has a sensitivity label, which can be Office or PDF files,
### User downloads a confidential Office or PDF document from a personal site ### User downloads a confidential Office or PDF document from a personal site
Windows Defender ATP scans for any file that gets modified or created, including files that were created on a personal site. Windows Defender Advanced Threat Protection (Windows Defender ATP) scans for any file that gets modified or created, including files that were created on a personal site.
If the file has a sensitivity label, the corresponding WIP protection gets applied even though the file came from a personal site. If the file has a sensitivity label, the corresponding WIP protection gets applied even though the file came from a personal site.
For example: For example:
@ -74,7 +74,7 @@ The PDF file doesn't need any work context beyond the sensitivity label.
## Prerequisites ## Prerequisites
- Windows 10, version 1809 - Windows 10, version 1809
- [Windows Defender Advanced Threat Protection (WDATP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection - [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection
- [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center - [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center
- [WIP policy](create-wip-policy-using-intune-azure.md) needs to be applied to endpoint devices. - [WIP policy](create-wip-policy-using-intune-azure.md) needs to be applied to endpoint devices.

View File

@ -8,7 +8,8 @@ ms.prod: w10
ms.mktglfcycl: ms.mktglfcycl:
ms.sitesec: library ms.sitesec: library
ms.pagetype: security ms.pagetype: security
author: coreyp-at-msft author: justinha
ms.author: justinha
ms.localizationpriority: medium ms.localizationpriority: medium
ms.date: 08/08/2018 ms.date: 08/08/2018
--- ---