mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-20 17:27:23 +00:00
Merged PR 12038: 10/11 AM Publish
This commit is contained in:
commit
b02dc03b90
@ -2745,11 +2745,13 @@ The following list shows the configuration service providers supported in Window
|
||||
- [DMClient CSP](dmclient-csp.md)
|
||||
- [EnterpriseAppManagement CSP](enterpriseappmanagement-csp.md)
|
||||
- [HealthAttestation CSP](healthattestation-csp.md)
|
||||
- [NetworkProxy CSP](networkproxy-csp.md)
|
||||
- [Policy CSP](policy-configuration-service-provider.md)
|
||||
- [Provisioning CSP (Provisioning only)](provisioning-csp.md)
|
||||
- [Reboot CSP](reboot-csp.md)
|
||||
- [RemoteWipe CSP](remotewipe-csp.md) 1
|
||||
- [RootCATrustedCertificates CSP](rootcacertificates-csp.md)
|
||||
- [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
||||
- [Update CSP](update-csp.md)
|
||||
- [VPNv2 CSP](vpnv2-csp.md)
|
||||
- [WiFi CSP](wifi-csp.md)
|
||||
|
@ -332,11 +332,11 @@ Sample syncxml to provision the firewall settings to evaluate
|
||||
<p style="margin-left: 20px">Value type is bool. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
|
||||
<a href="" id="localuserauthorizedlist"></a>**FirewallRules/_FirewallRuleName_/LocalUserAuthorizationList**
|
||||
<p style="margin-left: 20px">Specifies the list of authorized local users for the app container. This is a string in Security Descriptor Definition Language (SDDL) format.</p>
|
||||
<p style="margin-left: 20px">Specifies the list of authorized local users for this rule. This is a string in Security Descriptor Definition Language (SDDL) format.</p>
|
||||
<p style="margin-left: 20px">Value type is string. Supported operations are Add, Get, Replace, and Delete.</p>
|
||||
|
||||
<a href="" id="status"></a>**FirewallRules/_FirewallRuleName_/Status**
|
||||
<p style="margin-left: 20px">Provides information about the specific verrsion of the rule in deployment for monitoring purposes.</p>
|
||||
<p style="margin-left: 20px">Provides information about the specific version of the rule in deployment for monitoring purposes.</p>
|
||||
<p style="margin-left: 20px">Value type is string. Supported operation is Get.</p>
|
||||
|
||||
<a href="" id="name"></a>**FirewallRules/_FirewallRuleName_/Name**
|
||||
|
@ -6,7 +6,7 @@ keywords: ["group policy", "start menu", "start screen"]
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
author: coreyp
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
|
@ -25,6 +25,9 @@ ms.date: 4/16/2018
|
||||
|
||||
IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store.
|
||||
|
||||
> [!Important]
|
||||
> All executable code including Microsoft Store applications should have an update and maintenance plan. Organizations that use Microsoft Store applications should ensure that the applications can be updated through the Microsoft Store over the internet, through the [Private Store](/microsoft-store/distribute-apps-from-your-private-store), or [distributed offline](/microsoft-store/distribute-offline-apps) to keep the applications up to date.
|
||||
|
||||
## Options to configure access to Microsoft Store
|
||||
|
||||
|
||||
@ -82,7 +85,6 @@ You can also use Group Policy to manage access to Microsoft Store.
|
||||
> [!Important]
|
||||
> Enabling **Turn off Store application** policy turns off app updates from Microsoft Store.
|
||||
|
||||
|
||||
## <a href="" id="block-store-mdm"></a>Block Microsoft Store using management tool
|
||||
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/18
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/18
|
||||
---
|
||||
|
||||
|
@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
author: greg-lindsay
|
||||
ms.author: greg-lindsay
|
||||
ms.date: 07/13/18
|
||||
---
|
||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype:
|
||||
ms.localizationpriority: medium
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/18
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: low
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype:
|
||||
ms.localizationpriority: medium
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: low
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: low
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 08/22/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: high
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: high
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: high
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype:
|
||||
ms.localizationpriority: medium
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype:
|
||||
ms.localizationpriority: medium
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype:
|
||||
ms.localizationpriority: medium
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: medium
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
||||
ms.localizationpriority: high
|
||||
ms.sitesec: library
|
||||
ms.pagetype: deploy
|
||||
author: coreyp-at-msft
|
||||
ms.author: coreyp
|
||||
author: greg-lindsay
|
||||
ms.author: greglin
|
||||
ms.date: 06/01/2018
|
||||
---
|
||||
|
||||
|
@ -71,10 +71,12 @@ The Windows 10 operating system introduces a new way to build, deploy, and servi
|
||||
These improvements focus on maximizing customer involvement in Windows development, simplifying the deployment and servicing of Windows client computers, and leveling out the resources needed to deploy and maintain Windows over time.
|
||||
|
||||
- [Read more about Windows as a Service](/windows/deployment/update/waas-overview)
|
||||
- [Read how much space does Windows 10 take](https://www.microsoft.com/en-us/windows/windows-10-specifications)
|
||||
|
||||
## Related topics
|
||||
[Windows 10 TechCenter](https://go.microsoft.com/fwlink/?LinkId=620009)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: justinha
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/05/2018
|
||||
ms.date: 10/11/2018
|
||||
---
|
||||
|
||||
# List of enlightened Microsoft apps for use with Windows Information Protection (WIP)
|
||||
@ -32,7 +32,7 @@ Apps can be enlightened or unenlightened:
|
||||
|
||||
- Windows **Save As** experiences only allow you to save your files as enterprise.
|
||||
|
||||
- **WIP-work only apps** are unenlightened line-of-business apps that have been tested and deemed safe for use in an enterprise with WIP and Mobile App Management (MAM) solutions.
|
||||
- **WIP-work only apps** are unenlightened line-of-business apps that have been tested and deemed safe for use in an enterprise with WIP and Mobile App Management (MAM) solutions without device enrollment. Unenlightened apps that are targeted by WIP without enrollment run under personal mode.
|
||||
|
||||
## List of enlightened Microsoft apps
|
||||
Microsoft has made a concerted effort to enlighten several of our more popular apps, including the following:
|
||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: justinha
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 10/04/2018
|
||||
ms.date: 10/10/2018
|
||||
---
|
||||
|
||||
# How Windows Information Protection protects files with a sensitivity label
|
||||
@ -29,7 +29,7 @@ Microsoft information protection technologies include:
|
||||
|
||||
- [Windows Information Protection (WIP)](protect-enterprise-data-using-wip.md) is built in to Windows 10 and protects data at rest on endpoint devices, and manages apps to protect data in use.
|
||||
|
||||
- [Office 365 Information Protection](https://docs.microsoft.com/office365/securitycompliance/office-365-info-protection-for-gdpr-overview) is a solution to classify, protect, and monitor personal data in Office 365 and other Software-as-a-Service (SaaS) apps.
|
||||
- [Office 365 Information Protection](https://docs.microsoft.com/office365/securitycompliance/office-365-info-protection-for-gdpr-overview) is a solution to classify, protect, and monitor personal data in Office 365 and other first-party or third-party Software-as-a-Service (SaaS) apps.
|
||||
|
||||
- [Azure Information Protection](https://docs.microsoft.com/azure/information-protection/what-is-information-protection) is a cloud-based solution that can be purchased either standalone or as part of Microsoft 365 Enterprise. It helps an organization classify and protect its documents and emails by applying labels. End users can choose and apply sensitivity labels from a bar that appears below the ribbon in Office apps:
|
||||
|
||||
@ -50,7 +50,7 @@ For more information about labels, see [Overview of labels](https://docs.microso
|
||||
|
||||
## Use cases
|
||||
|
||||
This sections covers how WIP works with sensitivity labels in specific use cases.
|
||||
This section covers how WIP works with sensitivity labels in specific use cases.
|
||||
|
||||
### User downloads from or creates a document on a work site
|
||||
|
||||
@ -60,7 +60,7 @@ If the document also has a sensitivity label, which can be Office or PDF files,
|
||||
|
||||
### User downloads a confidential Office or PDF document from a personal site
|
||||
|
||||
Windows Defender ATP scans for any file that gets modified or created, including files that were created on a personal site.
|
||||
Windows Defender Advanced Threat Protection (Windows Defender ATP) scans for any file that gets modified or created, including files that were created on a personal site.
|
||||
If the file has a sensitivity label, the corresponding WIP protection gets applied even though the file came from a personal site.
|
||||
For example:
|
||||
|
||||
@ -74,7 +74,7 @@ The PDF file doesn't need any work context beyond the sensitivity label.
|
||||
## Prerequisites
|
||||
|
||||
- Windows 10, version 1809
|
||||
- [Windows Defender Advanced Threat Protection (WDATP)](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection
|
||||
- [Windows Defender ATP](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection) scans content for a label and applies corresponding WIP protection
|
||||
- [Sensitivity labels](https://docs.microsoft.com/office365/securitycompliance/labels) need to be configured in the Office 365 Security & Compliance Center
|
||||
- [WIP policy](create-wip-policy-using-intune-azure.md) needs to be applied to endpoint devices.
|
||||
|
||||
|
@ -8,7 +8,8 @@ ms.prod: w10
|
||||
ms.mktglfcycl:
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
author: coreyp-at-msft
|
||||
author: justinha
|
||||
ms.author: justinha
|
||||
ms.localizationpriority: medium
|
||||
ms.date: 08/08/2018
|
||||
---
|
||||
|
Loading…
x
Reference in New Issue
Block a user