From e5cdb04fa0a52924ae2cadf5291a35a7c5672243 Mon Sep 17 00:00:00 2001
From: Wael Jendli <33766257+wjendli@users.noreply.github.com>
Date: Wed, 17 Apr 2019 11:42:37 -0700
Subject: [PATCH 01/21] Add LTE attach purpose guid
---
windows/client-management/mdm/cm-cellularentries-csp.md | 1 +
1 file changed, 1 insertion(+)
diff --git a/windows/client-management/mdm/cm-cellularentries-csp.md b/windows/client-management/mdm/cm-cellularentries-csp.md
index adffb8bef0..32ca9ee217 100644
--- a/windows/client-management/mdm/cm-cellularentries-csp.md
+++ b/windows/client-management/mdm/cm-cellularentries-csp.md
@@ -183,6 +183,7 @@ The following diagram shows the CM\_CellularEntries configuration service provid
Required. Type: String. Specifies the purposes of the connection by a comma-separated list of GUIDs representing purpose values. The following purpose values are available:
- Internet - 3E5545D2-1137-4DC8-A198-33F1C657515F
+- LTE attach - 11A6FE68-5B47-4859-9CB6-1EAC96A8F0BD
- MMS - 53E2C5D3-D13C-4068-AA38-9C48FF2E55A8
- IMS - 474D66ED-0E4B-476B-A455-19BB1239ED13
- SUPL - 6D42669F-52A9-408E-9493-1071DCC437BD
From 684ec8e37853bcdc55e750dc2c33f0c13693a9dd Mon Sep 17 00:00:00 2001
From: Jose Ortega
Date: Fri, 17 May 2019 01:38:48 -0500
Subject: [PATCH 02/21] Fixes and notes for version not showed on the original
article #969
---
...device-automatically-using-group-policy.md | 29 +++++++++++++------
1 file changed, 20 insertions(+), 9 deletions(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index b79c6c1219..9db604b5a4 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -107,21 +107,27 @@ Requirements:
- Enterprise AD must be integrated with Azure AD.
- Ensure that PCs belong to same computer group.
-1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**.
- >[!Note]
- >If you do not see the policy, it may be caused because you don’t have the ADMX installed for Windows 10, version 1803. To fix the issue, follow these steps:
- > 1. Download [Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)
-](https://www.microsoft.com/en-us/download/details.aspx?id=56880).
- > 2. Install the package on the Primary Domain Controller.
- > 3. Navigate to the folder **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**.
- > 4. Copy policy definitions folder to **C:\Windows\SYSVOL\domain\Policies**.
- > 5. Restart the Primary Domain Controller for the policy to be available.
+>[!IMPORTANT]
+>If you do not see the policy, it may be caused because you don’t have the ADMX installed for Windows 10, version 1803 or version 1809. To fix the issue, follow these steps:
+> 1. Download :
+> 1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/en-us/download/details.aspx?id=56880) or
+> 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/en-us/download/details.aspx?id=57576)
+> 2. Install the package on the Primary Domain Controller (PDC).
+> 3. Navigate, depending on the version to the folder:
+> 1803 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**, or
+> 1809 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 October 2018 Update (1809) v2**
+> 4. Copy policy definitions folder to **C:\Windows\SYSVOL\domain\Policies**.
+> 5. Restart the Primary Domain Controller for the policy to be available.
+1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**.
2. Create a Security Group for the PCs.
3. Link the GPO.
4. Filter using Security Groups.
5. Enforce a GPO link
+>[!IMPORTANT]
+> Version 1903 (March 2019) is actually an Insider and it doesn't contains and Win 10 Adm Templates yet.
+
### Related topics
- [Group Policy Management Console](https://technet.microsoft.com/library/cc753298(v=ws.11).aspx)
@@ -129,3 +135,8 @@ Requirements:
- [Link a Group Policy Object](https://technet.microsoft.com/library/cc732979(v=ws.11).aspx)
- [Filter Using Security Groups](https://technet.microsoft.com/library/cc752992(v=ws.11).aspx)
- [Enforce a Group Policy Object Link](https://technet.microsoft.com/library/cc753909(v=ws.11).aspx)
+
+### Useful Links
+- [windows 10 Administrative Templates for Windows 10 April 2018 Update 1803](https://www.microsoft.com/download/details.aspx?id=56880)
+- [windows 10 Administrative Templates for Windows 10 October 2018 Update 1809](https://www.microsoft.com/download/details.aspx?id=57576)
+
From 0cd0c7999dd705dfada70a4a92e4060b30a03192 Mon Sep 17 00:00:00 2001
From: Jose Ortega
Date: Fri, 17 May 2019 01:41:42 -0500
Subject: [PATCH 03/21] Fixes
---
...l-a-windows-10-device-automatically-using-group-policy.md | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 9db604b5a4..168328372c 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -118,6 +118,7 @@ Requirements:
> 1809 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 October 2018 Update (1809) v2**
> 4. Copy policy definitions folder to **C:\Windows\SYSVOL\domain\Policies**.
> 5. Restart the Primary Domain Controller for the policy to be available.
+> This procedure will work for any future version as well.
1. Create a Group Policy Object (GPO) and enable the Group Policy **Computer Configuration** > **Policies** > **Administrative Templates** > **Windows Components** > **MDM** > **Enable automatic MDM enrollment using default Azure AD credentials**.
2. Create a Security Group for the PCs.
@@ -125,8 +126,8 @@ Requirements:
4. Filter using Security Groups.
5. Enforce a GPO link
->[!IMPORTANT]
-> Version 1903 (March 2019) is actually an Insider and it doesn't contains and Win 10 Adm Templates yet.
+>[!NOTE]
+> Version 1903 (March 2019) is actually on the Insider program and it doesnt contains yet a downloadable version of Templates (version 1903).
### Related topics
From 0960ba4455593b96aaa7341b87d0a4d2bd5b6775 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Fri, 17 May 2019 14:21:53 +0500
Subject: [PATCH 04/21] Update troubleshoot-microsoft-store-for-business.md
added link to the troubleshooting guide
---
.../troubleshoot-microsoft-store-for-business.md | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/store-for-business/troubleshoot-microsoft-store-for-business.md b/store-for-business/troubleshoot-microsoft-store-for-business.md
index 197eeba1a0..82e3bb1aa5 100644
--- a/store-for-business/troubleshoot-microsoft-store-for-business.md
+++ b/store-for-business/troubleshoot-microsoft-store-for-business.md
@@ -49,6 +49,10 @@ The private store for your organization is a page in Microsoft Store app that co

+## Troubleshooting Microsoft Store for Business integration with ConfigMgr
+
+In case of having problems with Microsoft Store for Business integration with ConfigMgr, use the [troubleshooting guide](https://support.microsoft.com/help/4010214/understand-and-troubleshoot-microsoft-store-for-business-integration-w).
+
## Still having trouble?
If you are still having trouble using Microsoft Store or installing an app, Admins can sign in and look for topics on our **Support** page.
@@ -56,4 +60,4 @@ If you are still having trouble using Microsoft Store or installing an app, Admi
**To view Support page**
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com)
-2. Click **Manage**, and then click **Support**.
\ No newline at end of file
+2. Click **Manage**, and then click **Support**.
From 7d05b03442d79c0adc1d5b465767916aae19436a Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:05 -0500
Subject: [PATCH 05/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 168328372c..e1ffe05ae4 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -127,7 +127,7 @@ Requirements:
5. Enforce a GPO link
>[!NOTE]
-> Version 1903 (March 2019) is actually on the Insider program and it doesnt contains yet a downloadable version of Templates (version 1903).
+> Version 1903 (March 2019) is actually on the Insider program and doesn't yet contain a downloadable version of Templates (version 1903).
### Related topics
From 1291c85515e250017bfde3e25b7198e860ef2a86 Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:12 -0500
Subject: [PATCH 06/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index e1ffe05ae4..e2aef18cc5 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -139,5 +139,5 @@ Requirements:
### Useful Links
- [windows 10 Administrative Templates for Windows 10 April 2018 Update 1803](https://www.microsoft.com/download/details.aspx?id=56880)
-- [windows 10 Administrative Templates for Windows 10 October 2018 Update 1809](https://www.microsoft.com/download/details.aspx?id=57576)
+- [Windows 10 Administrative Templates for Windows 10 October 2018 Update 1809](https://www.microsoft.com/download/details.aspx?id=57576)
From 6bca8f4a92bfa3d5243ff2ac34d28b5ba85ca7dd Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:32 -0500
Subject: [PATCH 07/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index e2aef18cc5..21663885f2 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -108,7 +108,7 @@ Requirements:
- Ensure that PCs belong to same computer group.
>[!IMPORTANT]
->If you do not see the policy, it may be caused because you don’t have the ADMX installed for Windows 10, version 1803 or version 1809. To fix the issue, follow these steps:
+>If you do not see the policy, it may be because you don’t have the ADMX installed for Windows 10, version 1803 or version 1809. To fix the issue, follow these steps:
> 1. Download :
> 1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/en-us/download/details.aspx?id=56880) or
> 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/en-us/download/details.aspx?id=57576)
From bb93c1459bb548246263e0d23f8592ddbab0296d Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:40 -0500
Subject: [PATCH 08/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 21663885f2..205a283934 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -138,6 +138,6 @@ Requirements:
- [Enforce a Group Policy Object Link](https://technet.microsoft.com/library/cc753909(v=ws.11).aspx)
### Useful Links
-- [windows 10 Administrative Templates for Windows 10 April 2018 Update 1803](https://www.microsoft.com/download/details.aspx?id=56880)
+- [Windows 10 Administrative Templates for Windows 10 April 2018 Update 1803](https://www.microsoft.com/download/details.aspx?id=56880)
- [Windows 10 Administrative Templates for Windows 10 October 2018 Update 1809](https://www.microsoft.com/download/details.aspx?id=57576)
From 00a609bb7b1bae2ce9827a22479f54e0d95efc37 Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:48 -0500
Subject: [PATCH 09/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 205a283934..50db70fa19 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -111,7 +111,7 @@ Requirements:
>If you do not see the policy, it may be because you don’t have the ADMX installed for Windows 10, version 1803 or version 1809. To fix the issue, follow these steps:
> 1. Download :
> 1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/en-us/download/details.aspx?id=56880) or
-> 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/en-us/download/details.aspx?id=57576)
+> 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/en-us/download/details.aspx?id=57576).
> 2. Install the package on the Primary Domain Controller (PDC).
> 3. Navigate, depending on the version to the folder:
> 1803 --> **C:\Program Files (x86)\Microsoft Group Policy\Windows 10 April 2018 Update (1803) v2**, or
From 2c02ddf53419e56ff186ef3a9101353124ad886f Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:22:56 -0500
Subject: [PATCH 10/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index 50db70fa19..d5f9502307 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -109,7 +109,7 @@ Requirements:
>[!IMPORTANT]
>If you do not see the policy, it may be because you don’t have the ADMX installed for Windows 10, version 1803 or version 1809. To fix the issue, follow these steps:
-> 1. Download :
+> 1. Download:
> 1803 -->[Administrative Templates (.admx) for Windows 10 April 2018 Update (1803)](https://www.microsoft.com/en-us/download/details.aspx?id=56880) or
> 1809 --> [Administrative Templates for Windows 10 October 2018 Update (1809)](https://www.microsoft.com/en-us/download/details.aspx?id=57576).
> 2. Install the package on the Primary Domain Controller (PDC).
From f2bd0b51ebea9b73dece8c027c3fac6a77062e43 Mon Sep 17 00:00:00 2001
From: Jose Gabriel Ortega Castro
Date: Fri, 17 May 2019 16:23:03 -0500
Subject: [PATCH 11/21] Update
windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
---
...roll-a-windows-10-device-automatically-using-group-policy.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
index d5f9502307..481636bb71 100644
--- a/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
+++ b/windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
@@ -124,7 +124,7 @@ Requirements:
2. Create a Security Group for the PCs.
3. Link the GPO.
4. Filter using Security Groups.
-5. Enforce a GPO link
+5. Enforce a GPO link.
>[!NOTE]
> Version 1903 (March 2019) is actually on the Insider program and doesn't yet contain a downloadable version of Templates (version 1903).
From 84ef5f264f7c905bdeef9966b3976205cf9a0468 Mon Sep 17 00:00:00 2001
From: Richard Zhang
Date: Fri, 17 May 2019 14:32:35 -0700
Subject: [PATCH 12/21] update the new SCCM 1902 support for MBAM
---
mdop/mbam-v25/mbam-25-supported-configurations.md | 8 +++++++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/mdop/mbam-v25/mbam-25-supported-configurations.md b/mdop/mbam-v25/mbam-25-supported-configurations.md
index 070552040e..e253a3f659 100644
--- a/mdop/mbam-v25/mbam-25-supported-configurations.md
+++ b/mdop/mbam-v25/mbam-25-supported-configurations.md
@@ -283,8 +283,14 @@ MBAM supports the following versions of Configuration Manager.
+
+Microsoft System Center Configuration Manager (Current Branch), versions up to 1902 |
+ |
+64-bit |
+
+
-Microsoft System Center Configuration Manager (Current Branch), versions up to 1806 |
+Microsoft System Center Configuration Manager 1806 |
|
64-bit |
From e3d84e8987ffe1da67cb8e2822b2060930624c73 Mon Sep 17 00:00:00 2001
From: Jose Ortega
Date: Mon, 20 May 2019 01:49:40 -0500
Subject: [PATCH 13/21] Solving ISsue #2062
---
windows/application-management/sideload-apps-in-windows-10.md | 3 +++
1 file changed, 3 insertions(+)
diff --git a/windows/application-management/sideload-apps-in-windows-10.md b/windows/application-management/sideload-apps-in-windows-10.md
index cd7c59e6d2..2dd9d9110b 100644
--- a/windows/application-management/sideload-apps-in-windows-10.md
+++ b/windows/application-management/sideload-apps-in-windows-10.md
@@ -52,6 +52,9 @@ You can sideload apps on managed or unmanaged devices.
- Deploy an enterprise policy.
+>[!IMPORTANT]
+> To install an application users can double click any APPX/MSIX package and get the APP installed without using the PowerShell script.
+
**To turn on sideloading for unmanaged devices**
1. Open **Settings**.
From 318fb089e894fe7ae44588a165b8b5ce3b909128 Mon Sep 17 00:00:00 2001
From: Oliver Kieselbach
Date: Mon, 20 May 2019 10:55:07 +0200
Subject: [PATCH 14/21] supported values for EnableFirstLogonAnimation
I tested this setting and the values which needs to be set are integer 0 for disabled and 1 for enabled. not boolean.
---
windows/client-management/mdm/policy-csp-windowslogon.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md
index e307f8f433..14369d49d1 100644
--- a/windows/client-management/mdm/policy-csp-windowslogon.md
+++ b/windows/client-management/mdm/policy-csp-windowslogon.md
@@ -407,8 +407,8 @@ ADMX Info:
Supported values:
-- false - disabled
-- true - enabled
+- 0 - disabled
+- 1 - enabled
@@ -556,4 +556,4 @@ Footnotes:
- 3 - Added in Windows 10, version 1709.
- 4 - Added in Windows 10, version 1803.
- 5 - Added in Windows 10, version 1809.
-- 6 - Added in Windows 10, version 1903.
\ No newline at end of file
+- 6 - Added in Windows 10, version 1903.
From 771b3b26de63602cc8a4987017527e239dc043e6 Mon Sep 17 00:00:00 2001
From: Lindsay <45809756+lindspea@users.noreply.github.com>
Date: Mon, 20 May 2019 11:51:20 +0200
Subject: [PATCH 15/21] Update manage-automation-folder-exclusions.md
Added note.
---
.../manage-automation-folder-exclusions.md | 5 ++++-
1 file changed, 4 insertions(+), 1 deletion(-)
diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md
index 217418bd99..763ad94de7 100644
--- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md
+++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md
@@ -37,7 +37,10 @@ You can control the following attributes about the folder that you'd like to be
**Folders**
-You can specify a folder and its subfolders to be skipped. You can use wild cards so that all files under the directory is skipped by the automated investigation.
+You can specify a folder and its subfolders to be skipped.
+
+> [!NOTE]
+> Wild cards are not yet supported.
**Extensions**
You can specify the extensions to exclude in a specific directory. The extensions are a way to prevent an attacker from using an excluded folder to hide an exploit. The extensions explicitly define which files to ignore.
From 936a3cdcca0c64a467bb756ebada99470e5c9380 Mon Sep 17 00:00:00 2001
From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com>
Date: Mon, 20 May 2019 15:25:56 +0500
Subject: [PATCH 16/21] update troubleshoot-microsoft-store-for-business.md
---
.../troubleshoot-microsoft-store-for-business.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/store-for-business/troubleshoot-microsoft-store-for-business.md b/store-for-business/troubleshoot-microsoft-store-for-business.md
index 82e3bb1aa5..4fa9526949 100644
--- a/store-for-business/troubleshoot-microsoft-store-for-business.md
+++ b/store-for-business/troubleshoot-microsoft-store-for-business.md
@@ -51,7 +51,7 @@ The private store for your organization is a page in Microsoft Store app that co
## Troubleshooting Microsoft Store for Business integration with ConfigMgr
-In case of having problems with Microsoft Store for Business integration with ConfigMgr, use the [troubleshooting guide](https://support.microsoft.com/help/4010214/understand-and-troubleshoot-microsoft-store-for-business-integration-w).
+If you encounter any problems when integrating Microsoft Store for Business with ConfigMgr, use the [troubleshooting guide](https://support.microsoft.com/help/4010214/understand-and-troubleshoot-microsoft-store-for-business-integration-w).
## Still having trouble?
@@ -60,4 +60,4 @@ If you are still having trouble using Microsoft Store or installing an app, Admi
**To view Support page**
1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com)
-2. Click **Manage**, and then click **Support**.
+2.Choose **Manage**> **Support**.
From 5248453e7532861df730b52a661ff87567ed8088 Mon Sep 17 00:00:00 2001
From: Steve Syfuhs
Date: Mon, 20 May 2019 08:48:33 -0700
Subject: [PATCH 17/21] Asymmetrical is not a word
---
.../hello-for-business/hello-why-pin-is-better-than-password.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md b/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md
index 388993c2d8..387b2f434b 100644
--- a/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md
+++ b/windows/security/identity-protection/hello-for-business/hello-why-pin-is-better-than-password.md
@@ -43,7 +43,7 @@ When the PIN is created, it establishes a trusted relationship with the identity
The Hello PIN is backed by a Trusted Platform Module (TPM) chip, which is a secure crypto-processor that is designed to carry out cryptographic operations. The chip includes multiple physical security mechanisms to make it tamper resistant, and malicious software is unable to tamper with the security functions of the TPM. All Windows 10 Mobile phones and many modern laptops have TPM.
-User key material is generated and available within the Trusted Platform Module (TPM) of the user device, which protects it from attackers who want to capture the key material and reuse it. Because Hello uses asymmetrical key pairs, users credentials can’t be stolen in cases where the identity provider or websites the user accesses have been compromised.
+User key material is generated and available within the Trusted Platform Module (TPM) of the user device, which protects it from attackers who want to capture the key material and reuse it. Because Hello uses asymmetric key pairs, users credentials can’t be stolen in cases where the identity provider or websites the user accesses have been compromised.
The TPM protects against a variety of known and potential attacks, including PIN brute-force attacks. After too many incorrect guesses, the device is locked.
From ac0dc64ed508986fa5b317a86203efe56a6da840 Mon Sep 17 00:00:00 2001
From: Jose Ortega
Date: Mon, 20 May 2019 11:39:50 -0500
Subject: [PATCH 18/21] Note place correction + added link.
---
.../application-management/sideload-apps-in-windows-10.md | 7 +++++--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git a/windows/application-management/sideload-apps-in-windows-10.md b/windows/application-management/sideload-apps-in-windows-10.md
index 2dd9d9110b..d696e42cec 100644
--- a/windows/application-management/sideload-apps-in-windows-10.md
+++ b/windows/application-management/sideload-apps-in-windows-10.md
@@ -48,12 +48,15 @@ And here's what you'll need to do:
## How do I sideload an app on desktop
You can sideload apps on managed or unmanaged devices.
+>[!IMPORTANT]
+> To install an application on windows 10, beside [these procedures](https://docs.microsoft.com/windows/msix/app-installer/installing-windows10-apps-web) users can double click any APPX/MSIX package.
+
+
**To turn on sideloading for managed devices**
- Deploy an enterprise policy.
->[!IMPORTANT]
-> To install an application users can double click any APPX/MSIX package and get the APP installed without using the PowerShell script.
+
**To turn on sideloading for unmanaged devices**
From 7dda22f648e11d3cf472bfeca347223106fbf881 Mon Sep 17 00:00:00 2001
From: Jose Ortega
Date: Mon, 20 May 2019 15:20:10 -0500
Subject: [PATCH 19/21] Correction of user on #2693
---
.../identity-protection/access-control/special-identities.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/access-control/special-identities.md b/windows/security/identity-protection/access-control/special-identities.md
index 86165f1bf1..16e282f16f 100644
--- a/windows/security/identity-protection/access-control/special-identities.md
+++ b/windows/security/identity-protection/access-control/special-identities.md
@@ -149,7 +149,7 @@ Any user who accesses the system through a sign-in process has the Authenticated
Default Location in Active Directory |
-cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
+cn=System,cn=WellKnown Security Principals, cn=Configuration, dc=<forestRootDomain> |
Default User Rights |
From 7784ca67e1c6e58aa3c86ac3dc193c7edf2a9e24 Mon Sep 17 00:00:00 2001
From: Liza Poggemeyer
Date: Mon, 20 May 2019 15:57:48 -0700
Subject: [PATCH 20/21] FIxed typo, clarified somewhat confusing grammar
---
windows/application-management/sideload-apps-in-windows-10.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/windows/application-management/sideload-apps-in-windows-10.md b/windows/application-management/sideload-apps-in-windows-10.md
index d696e42cec..4f8803ead5 100644
--- a/windows/application-management/sideload-apps-in-windows-10.md
+++ b/windows/application-management/sideload-apps-in-windows-10.md
@@ -7,7 +7,7 @@ ms.mktglfcycl: deploy
ms.sitesec: library
ms.pagetype: mobile
author: greg-lindsay
-ms.date: 04/19/2017
+ms.date: 05/20/2019
---
# Sideload LOB apps in Windows 10
@@ -49,7 +49,7 @@ And here's what you'll need to do:
You can sideload apps on managed or unmanaged devices.
>[!IMPORTANT]
-> To install an application on windows 10, beside [these procedures](https://docs.microsoft.com/windows/msix/app-installer/installing-windows10-apps-web) users can double click any APPX/MSIX package.
+> To install an app on Windows 10, in addition to following [these procedures](https://docs.microsoft.com/windows/msix/app-installer/installing-windows10-apps-web), users can also double-click any APPX/MSIX package.
**To turn on sideloading for managed devices**
From b38c8bf8599e839ffeaeabe10a0e378e4b506d3a Mon Sep 17 00:00:00 2001
From: Liza Poggemeyer
Date: Mon, 20 May 2019 16:05:03 -0700
Subject: [PATCH 21/21] Corrected product name
---
.../troubleshoot-microsoft-store-for-business.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/store-for-business/troubleshoot-microsoft-store-for-business.md b/store-for-business/troubleshoot-microsoft-store-for-business.md
index 4fa9526949..aea3b32045 100644
--- a/store-for-business/troubleshoot-microsoft-store-for-business.md
+++ b/store-for-business/troubleshoot-microsoft-store-for-business.md
@@ -49,9 +49,9 @@ The private store for your organization is a page in Microsoft Store app that co

-## Troubleshooting Microsoft Store for Business integration with ConfigMgr
+## Troubleshooting Microsoft Store for Business integration with System Center Configuration Manager
-If you encounter any problems when integrating Microsoft Store for Business with ConfigMgr, use the [troubleshooting guide](https://support.microsoft.com/help/4010214/understand-and-troubleshoot-microsoft-store-for-business-integration-w).
+If you encounter any problems when integrating Microsoft Store for Business with Configuration Manager, use the [troubleshooting guide](https://support.microsoft.com/help/4010214/understand-and-troubleshoot-microsoft-store-for-business-integration-w).
## Still having trouble?