Merge branch 'release-info-preview' of https://github.com/MicrosoftDocs/windows-docs-pr into release-info-preview
@ -13944,5 +13944,10 @@
|
|||||||
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics",
|
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/threat-analytics",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-atp/manage-allowed-blocked-list-windows-defender-advanced-threat-protection.md",
|
||||||
|
"redirect_url": "/windows/security/threat-protection/windows-defender-atp/manage-indicators",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -49,7 +49,7 @@ To reset your HoloLens 2, go to **Settings > Update > Reset** and select **Reset
|
|||||||
|
|
||||||
If the device is still having a problem after reset, you can use Advanced Recovery Companion to flash the device with a new image.
|
If the device is still having a problem after reset, you can use Advanced Recovery Companion to flash the device with a new image.
|
||||||
|
|
||||||
1. On your computer, get [Advanced Recovery Companion](need store link) from Microsoft Store.
|
1. On your computer, get [Advanced Recovery Companion](https://www.microsoft.com/p/advanced-recovery-companion/9p74z35sfrs8?activetab=pivot:overviewtab) from Microsoft Store.
|
||||||
2. Connect HoloLens 2 to your computer.
|
2. Connect HoloLens 2 to your computer.
|
||||||
3. Start Advanced Recovery Companion.
|
3. Start Advanced Recovery Companion.
|
||||||
4. On the **Welcome** page, select your device.
|
4. On the **Welcome** page, select your device.
|
||||||
|
@ -41,6 +41,7 @@
|
|||||||
### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md)
|
### [Miracast on existing wireless network or LAN](miracast-over-infrastructure.md)
|
||||||
### [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md)
|
### [Enable 802.1x wired authentication](enable-8021x-wired-authentication.md)
|
||||||
### [Using a room control system](use-room-control-system-with-surface-hub.md)
|
### [Using a room control system](use-room-control-system-with-surface-hub.md)
|
||||||
|
### [Implement Quality of Service on Surface Hub](surface-hub-qos.md)
|
||||||
### [Using the Surface Hub Recovery Tool](surface-hub-recovery-tool.md)
|
### [Using the Surface Hub Recovery Tool](surface-hub-recovery-tool.md)
|
||||||
### [Surface Hub SSD replacement](surface-hub-ssd-replacement.md)
|
### [Surface Hub SSD replacement](surface-hub-ssd-replacement.md)
|
||||||
## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md)
|
## [PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md)
|
||||||
|
@ -64,8 +64,11 @@ Surface Hubs use Azure AD join to:
|
|||||||
- Grant admin rights to the appropriate users in your Azure AD tenant.
|
- Grant admin rights to the appropriate users in your Azure AD tenant.
|
||||||
- Backup the device's BitLocker recovery key by storing it under the account that was used to Azure AD join the device. See [Save your BitLocker key](save-bitlocker-key-surface-hub.md) for details.
|
- Backup the device's BitLocker recovery key by storing it under the account that was used to Azure AD join the device. See [Save your BitLocker key](save-bitlocker-key-surface-hub.md) for details.
|
||||||
|
|
||||||
> [!IMPORTANT]
|
### Automatic enrollment via Azure Active Directory join
|
||||||
> Surface Hub does not currently support automatic enrollment to Microsoft Intune through Azure AD join. If your organization automatically enrolls Azure AD joined devices into Intune, you must disable this policy for Surface Hub before joining the device to Azure AD.
|
|
||||||
|
Surface Hub now supports the ability to automatically enroll in Intune by joining the device to Azure Active Directory.
|
||||||
|
|
||||||
|
For more information, see [Enable Windows 10 automatic enrollment](https://docs.microsoft.com/intune/windows-enroll#enable-windows-10-automatic-enrollment).
|
||||||
|
|
||||||
### Which should I choose?
|
### Which should I choose?
|
||||||
|
|
||||||
|
@ -22,6 +22,7 @@ New or changed topic | Description
|
|||||||
[Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec)
|
[Technical information for 55” Microsoft Surface Hub](surface-hub-technical-55.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec)
|
||||||
[Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec)
|
[Technical information for 84” Microsoft Surface Hub ](surface-hub-technical-84.md) | New; previously available for download and on [Surface Hub Tech Spec](https://support.microsoft.com/help/4483539/surface-hub-tech-spec)
|
||||||
[Surface Hub SSD replacement](surface-hub-ssd-replacement.md) | New; previously available for download only
|
[Surface Hub SSD replacement](surface-hub-ssd-replacement.md) | New; previously available for download only
|
||||||
|
[Implement Quality of Service on Surface Hub](surface-hub-qos.md) | New
|
||||||
|
|
||||||
## July 2018
|
## July 2018
|
||||||
|
|
||||||
|
BIN
devices/surface-hub/images/qos-create.png
Normal file
After Width: | Height: | Size: 14 KiB |
BIN
devices/surface-hub/images/qos-setting.png
Normal file
After Width: | Height: | Size: 34 KiB |
51
devices/surface-hub/surface-hub-qos.md
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
---
|
||||||
|
title: Implement Quality of Service on Surface Hub
|
||||||
|
description: Learn how to configure QoS on Surface Hub.
|
||||||
|
ms.prod: surface-hub
|
||||||
|
ms.sitesec: library
|
||||||
|
author: jdeckerms
|
||||||
|
ms.author: jdecker
|
||||||
|
ms.topic: article
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
---
|
||||||
|
|
||||||
|
# Implement Quality of Service (QoS) on Surface Hub
|
||||||
|
|
||||||
|
Quality of Service (QoS) is a combination of network technologies that allows the administrators to optimize the experience of real time audio/video and application sharing communications.
|
||||||
|
|
||||||
|
Configuring [QoS for Skype for Business](https://docs.microsoft.com/windows/client-management/mdm/networkqospolicy-csp) on the Surface Hub can be done using your [mobile device management (MDM) provider](manage-settings-with-mdm-for-surface-hub.md) or through a [provisioning package](provisioning-packages-for-surface-hub.md).
|
||||||
|
|
||||||
|
|
||||||
|
This procedure explains how to configure QoS for Surface Hub using Microsoft Intune.
|
||||||
|
|
||||||
|
1. In Intune, [create a custom policy](https://docs.microsoft.com/intune/custom-settings-configure).
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
2. In **Custom OMA-URI Settings**, select **Add**. For each setting that you add, you will enter a name, description (optional), data type, OMA-URI, and value.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Add the following custom OMA-URI settings:
|
||||||
|
|
||||||
|
Name | Data type | OMA-URI<br>./Device/Vendor/MSFT/NetworkQoSPolicy | Value
|
||||||
|
--- | --- | --- | ---
|
||||||
|
Audio Source Port | String | /HubAudio/SourcePortMatchCondition | Get the values from your Skype administrator
|
||||||
|
Audio DSCP | Integer | /HubAudio/DSCPAction | 46
|
||||||
|
Video Source Port | String | /HubVideo/SourcePortMatchCondition | Get the values from your Skype administrator
|
||||||
|
Video DSCP | Integer | /HubVideo/DSCPAction | 34
|
||||||
|
Audio Process Name | String | /HubAudio/AppPathNameMatchCondition | Microsoft.PPISkype.Windows.exe
|
||||||
|
Video Process Name | String | /HubVideo/AppPathNameMatchCondition | Microsoft.PPISkype.Windows.exe
|
||||||
|
|
||||||
|
>[!IMPORTANT]
|
||||||
|
>Each **OMA-URI** path begins with `./Device/Vendor/MSFT/NetworkQoSPolicy`. The full path for the audio source port setting, for example, will be `./Device/Vendor/MSFT/NetworkQoSPolicy/HubAudio/SourcePortMatchCondition`.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
4. When the policy has been created, [deploy it to the Surface Hub.](manage-settings-with-mdm-for-surface-hub.md#manage-surface-hub-settings-with-mdm)
|
||||||
|
|
||||||
|
|
||||||
|
>[!WARNING]
|
||||||
|
>Currently, you cannot configure the setting **IPProtocolMatchCondition** in the [NetworkQoSPolicy CSP](https://docs.microsoft.com/windows/client-management/mdm/networkqospolicy-csp). If this setting is configured, the policy will fail to apply.
|
||||||
|
|
1
it-client
Submodule
@ -0,0 +1 @@
|
|||||||
|
Subproject commit 61e0a21977430f3c0eef1c32e398999dc090c332
|
@ -63,9 +63,12 @@ There are several items to download or create for offline-licensed apps. The app
|
|||||||
**To download an offline-licensed app**
|
**To download an offline-licensed app**
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||||
2. Click **Manage**, and then choose **Apps & software**.
|
2. Click **Manage**.
|
||||||
3. Refine results by **License type** to show apps with offline licenses.
|
3. Under **Shopping Experience**, set **Show offline apps** to **On**.
|
||||||
4. Find the app you want to download, click the ellipses under **Actions**, and then choose **Download for offline use**.
|
4. Click **Shop for my group**. Search for the required inbox-app, select it, change the License type to **Offline**, and click **Get the app**, which will add the app to your inventory.
|
||||||
|
5. Click **Manage**. You now have access to download the appx bundle package metadata and license file.
|
||||||
|
6. Go to **Products & services**, and select **Apps & software**. (The list may be empty, but it will auto-populate after some time.)
|
||||||
|
|
||||||
- **To download app metadata**: Choose the language for the app metadata, and then click **Download**. Save the downloaded app metadata. This is optional.
|
- **To download app metadata**: Choose the language for the app metadata, and then click **Download**. Save the downloaded app metadata. This is optional.
|
||||||
- **To download app package**: Click to expand the package details information, choose the Platform and Architecture combination that you need for your organization, and then click **Download**. Save the downloaded app package. This is required.
|
- **To download app package**: Click to expand the package details information, choose the Platform and Architecture combination that you need for your organization, and then click **Download**. Save the downloaded app package. This is required.
|
||||||
- **To download an app license**: Choose either **Encoded**, or **Unencoded**, and then click **Generate license**. Save the downloaded license. This is required.
|
- **To download an app license**: Choose either **Encoded**, or **Unencoded**, and then click **Generate license**. Save the downloaded license. This is required.
|
||||||
|
@ -429,7 +429,7 @@ The following diagram shows the BitLocker configuration service provider in tree
|
|||||||
<p style="margin-left: 20px">The possible values for 'xx' are:</p>
|
<p style="margin-left: 20px">The possible values for 'xx' are:</p>
|
||||||
|
|
||||||
- 0 = Empty
|
- 0 = Empty
|
||||||
- 1 = Use default recovery message and URL.
|
- 1 = Use default recovery message and URL (in this case you don't need to specify a value for "RecoveryMessage_Input" or "RecoveryUrl_Input").
|
||||||
- 2 = Custom recovery message is set.
|
- 2 = Custom recovery message is set.
|
||||||
- 3 = Custom recovery URL is set.
|
- 3 = Custom recovery URL is set.
|
||||||
- 'yy' = string of max length 900.
|
- 'yy' = string of max length 900.
|
||||||
|
@ -338,7 +338,7 @@ Delete a provider
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-tracelevel"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/TraceLevel**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-tracelevel"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/TraceLevel**
|
||||||
Specifies the level of detail included in the trace log.
|
Specifies the level of detail included in the trace log.
|
||||||
|
|
||||||
The data type is an integer.
|
The data type is an integer.
|
||||||
@ -407,7 +407,7 @@ Set provider **TraceLevel**
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-keywords"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/Keywords**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-keywords"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/Keywords**
|
||||||
Specifies the provider keywords to be used as MatchAnyKeyword for this provider.
|
Specifies the provider keywords to be used as MatchAnyKeyword for this provider.
|
||||||
|
|
||||||
the data type is a string.
|
the data type is a string.
|
||||||
@ -461,7 +461,7 @@ Set provider **Keywords**
|
|||||||
</SyncML>
|
</SyncML>
|
||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="etwlog-collectors-collectorname-providers-provderguid-state"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProvderGUID*/State**
|
<a href="" id="etwlog-collectors-collectorname-providers-providerguid-state"></a>**EtwLog/Collectors/*CollectorName*/Providers/*ProviderGUID*/State**
|
||||||
Specifies if this provider is enabled in the trace session.
|
Specifies if this provider is enabled in the trace session.
|
||||||
|
|
||||||
The data type is a boolean.
|
The data type is a boolean.
|
||||||
|
@ -76,8 +76,8 @@ The data type is string. Supported operations are Get and Replace. Starting in W
|
|||||||
Specifies whether the proxy server should be used for local (intranet) addresses.
|
Specifies whether the proxy server should be used for local (intranet) addresses.
|
||||||
Valid values:
|
Valid values:
|
||||||
<ul>
|
<ul>
|
||||||
<li>0 (default) - Do not use proxy server for local addresses</li>
|
<li>0 (default) - Use proxy server for local addresses</li>
|
||||||
<li>1 - Use proxy server for local addresses</li>
|
<li>1 - Do not use proxy server for local addresses</li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
The data type is int. Supported operations are Get and Replace. Starting in Window 10, version 1803, the Delete operation is also supported.
|
The data type is int. Supported operations are Get and Replace. Starting in Window 10, version 1803, the Delete operation is also supported.
|
||||||
|
@ -66,6 +66,15 @@ Here are examples of data fields. The encoded 0xF000 is the standard delimiter/s
|
|||||||
```
|
```
|
||||||
<Data></Data>
|
<Data></Data>
|
||||||
```
|
```
|
||||||
|
If you use Intune custom profiles to assign UserRights policies, you must use the CDATA tag (`<![CDATA[...]]>`) to wrap the data fields. You can specify one or more user groups within the CDATA tag by using 0xF000 as the delimiter/separator.
|
||||||
|
|
||||||
|
> [!Note]
|
||||||
|
> `` is the entity encoding of 0xF000.
|
||||||
|
|
||||||
|
For example, the following syntax grants user rights to Authenticated Users and Replicator user groups:
|
||||||
|
```
|
||||||
|
<![CDATA[Authenticated UsersReplicator]]>
|
||||||
|
```
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
@ -401,7 +401,7 @@ Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
|||||||
Nodes under the PluginProfile are required when using a Microsoft Store based VPN plugin.
|
Nodes under the PluginProfile are required when using a Microsoft Store based VPN plugin.
|
||||||
|
|
||||||
<a href="" id="vpnv2-profilename-pluginprofile-serverurllist"></a>**VPNv2/***ProfileName***/PluginProfile/ServerUrlList**
|
<a href="" id="vpnv2-profilename-pluginprofile-serverurllist"></a>**VPNv2/***ProfileName***/PluginProfile/ServerUrlList**
|
||||||
Required for plug-in profiles. Comma separated list of servers in URL, hostname, or IP format.
|
Required for plug-in profiles. Semicolon-separated list of servers in URL, hostname, or IP format.
|
||||||
|
|
||||||
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
Value type is chr. Supported operations include Get, Add, Replace, and Delete.
|
||||||
|
|
||||||
|
@ -21,6 +21,7 @@ This topic lists new and updated topics in the [Configure Windows 10](index.md)
|
|||||||
New or changed topic | Description
|
New or changed topic | Description
|
||||||
--- | ---
|
--- | ---
|
||||||
[Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md) | Added information for Shell Launcher v2, coming in the next feature update to Windows 10.
|
[Use Shell Launcher to create a Windows 10 kiosk](kiosk-shelllauncher.md) | Added information for Shell Launcher v2, coming in the next feature update to Windows 10.
|
||||||
|
[Prepare a device for kiosk configuration](kiosk-prepare.md) | Added new recommendations for policies to manage updates.
|
||||||
|
|
||||||
## February 2019
|
## February 2019
|
||||||
|
|
||||||
|
@ -8,7 +8,6 @@ ms.mktglfcycl: manage
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 01/09/2019
|
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -35,8 +34,10 @@ For a more secure kiosk experience, we recommend that you make the following con
|
|||||||
|
|
||||||
Recommendation | How to
|
Recommendation | How to
|
||||||
--- | ---
|
--- | ---
|
||||||
Hide update notifications<br>(New in Windows 10, version 1809) | Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\Windows Components\\Windows Update\\Display options for update notifications**<br>-or-<br>Use the MDM setting **Update/UpdateNotificationLevel** from the [**Policy/Update** configuration service provider](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-updatenotificationlevel)<br>-or-<br>Add the following registry keys as DWORD (32-bit) type:</br>`HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\SetUpdateNotificationLevel` with a value of `1`, and `HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\UpdateNotificationLevel` with a value of `1` to hide all notifications except restart warnings, or value of `2` to hide all notifications, including restart warnings.
|
Hide update notifications<br>(New in Windows 10, version 1809) | Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\Windows Components\\Windows Update\\Display options for update notifications**<br>-or-<br>Use the MDM setting **Update/UpdateNotificationLevel** from the [**Policy/Update** configuration service provider](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-updatenotificationlevel)<br>-or-<br>Add the following registry keys as type DWORD (32-bit) in the path of **HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate**:<br>**\SetUpdateNotificationLevel** with a value of `1`, and **\UpdateNotificationLevel** with a value of `1` to hide all notifications except restart warnings, or value of `2` to hide all notifications, including restart warnings.
|
||||||
Replace "blue screen" with blank screen for OS errors | Add the following registry key as DWORD (32-bit) type with a value of `1`:</br></br>`HKLM\SYSTEM\CurrentControlSet\Control\CrashControl\DisplayDisabled`
|
Enable and schedule automatic updates | Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\Windows Components\\Windows Update\\Configure Automatic Updates**, and select `option 4 (Auto download and schedule the install)`<br>-or-<br>Use the MDM setting **Update/AllowAutoUpdate** from the [**Policy/Update** configuration service provider](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-update#update-allowautoupdate), and select `option 3 (Auto install and restart at a specified time)`<br><br>**Note:** Installations can take from between 30 minutes and 2 hours, depending on the device, so you should schedule updates to occur when a block of 3-4 hours is available.<br><br>To schedule the automatic update, configure **Schedule Install Day**, **Schedule Install Time**, and **Schedule Install Week**.
|
||||||
|
Enable automatic restart at the scheduled time | Go to **Group Policy Editor** > **Computer Configuration** > **Administrative Templates\\Windows Components\\Windows Update\\Always automatically restart at the scheduled time**
|
||||||
|
Replace "blue screen" with blank screen for OS errors | Add the following registry key as DWORD (32-bit) type with a value of `1`:</br></br>**HKLM\SYSTEM\CurrentControlSet\Control\CrashControl\DisplayDisabled**
|
||||||
Put device in **Tablet mode**. | If you want users to be able to use the touch (on screen) keyboard, go to **Settings** > **System** > **Tablet mode** and choose **On.** Do not turn on this setting if users will not interact with the kiosk, such as for a digital sign.
|
Put device in **Tablet mode**. | If you want users to be able to use the touch (on screen) keyboard, go to **Settings** > **System** > **Tablet mode** and choose **On.** Do not turn on this setting if users will not interact with the kiosk, such as for a digital sign.
|
||||||
Hide **Ease of access** feature on the sign-in screen. | See [how to disable the Ease of Access button in the registry.](https://docs.microsoft.com/windows-hardware/customize/enterprise/complementary-features-to-custom-logon#welcome-screen)
|
Hide **Ease of access** feature on the sign-in screen. | See [how to disable the Ease of Access button in the registry.](https://docs.microsoft.com/windows-hardware/customize/enterprise/complementary-features-to-custom-logon#welcome-screen)
|
||||||
Disable the hardware power button. | Go to **Power Options** > **Choose what the power button does**, change the setting to **Do nothing**, and then **Save changes**.
|
Disable the hardware power button. | Go to **Power Options** > **Choose what the power button does**, change the setting to **Do nothing**, and then **Save changes**.
|
||||||
|
@ -42,6 +42,8 @@ Method | Description
|
|||||||
|
|
||||||
>[!TIP]
|
>[!TIP]
|
||||||
>You can also configure a kiosk account and app for single-app kiosk within [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) by using a [kiosk profile](lock-down-windows-10-to-specific-apps.md#profile).
|
>You can also configure a kiosk account and app for single-app kiosk within [XML in a provisioning package](lock-down-windows-10-to-specific-apps.md) by using a [kiosk profile](lock-down-windows-10-to-specific-apps.md#profile).
|
||||||
|
>
|
||||||
|
>Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -169,8 +171,6 @@ Set-AssignedAccess -AppName <CustomApp> -UserSID <usersid>
|
|||||||
|
|
||||||
[Learn how to get the AppName](https://msdn.microsoft.com/library/windows/hardware/mt620046%28v=vs.85%29.aspx) (see **Parameters**).
|
[Learn how to get the AppName](https://msdn.microsoft.com/library/windows/hardware/mt620046%28v=vs.85%29.aspx) (see **Parameters**).
|
||||||
|
|
||||||
[Learn how to get the SID](https://go.microsoft.com/fwlink/p/?LinkId=615517).
|
|
||||||
|
|
||||||
To remove assigned access, using PowerShell, run the following cmdlet.
|
To remove assigned access, using PowerShell, run the following cmdlet.
|
||||||
|
|
||||||
```
|
```
|
||||||
|
@ -40,7 +40,8 @@ New features and improvements | In update
|
|||||||
You can configure multi-app kiosks using [Microsoft Intune](#intune) or a [provisioning package](#provision).
|
You can configure multi-app kiosks using [Microsoft Intune](#intune) or a [provisioning package](#provision).
|
||||||
|
|
||||||
|
|
||||||
|
>[!TIP]
|
||||||
|
>Be sure to check the [configuration recommendations](kiosk-prepare.md) before you set up your kiosk.
|
||||||
|
|
||||||
<span id="intune"/>
|
<span id="intune"/>
|
||||||
## Configure a kiosk in Microsoft Intune
|
## Configure a kiosk in Microsoft Intune
|
||||||
|
@ -53,7 +53,7 @@ If you've followed the steps in the [Enrolling devices in Windows Analytics](win
|
|||||||
|
|
||||||
In Log Analytics, go to **Settings > Connected sources > Windows telemetry** and verify that you are subscribed to the Windows Analytics solutions you intend to use.
|
In Log Analytics, go to **Settings > Connected sources > Windows telemetry** and verify that you are subscribed to the Windows Analytics solutions you intend to use.
|
||||||
|
|
||||||
Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices with a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://blogs.technet.microsoft.com/upgradeanalytics/2017/05/12/wheres-my-data/) on the Windows Analytics blog.
|
Even though devices can take 2-3 days after enrollment to show up due to latency in the system, you can now verify the status of your devices within a few hours of running the deployment script as described in [You can now check on the status of your computers within hours of running the deployment script](https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/You-can-now-check-on-the-status-of-your-computers-within-hours/ba-p/187213) on the Tech Community Blog.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id," go to **Settings > Connected sources > Windows telemetry** remove the Upgrade Readiness solution, and then re-add it.
|
> If you generate the status report and get an error message saying "Sorry! We’re not recognizing your Commercial Id," go to **Settings > Connected sources > Windows telemetry** remove the Upgrade Readiness solution, and then re-add it.
|
||||||
|
@ -29,7 +29,7 @@ Go to the [Azure portal](https://portal.azure.com), select **All services**, and
|
|||||||
|
|
||||||
It's important to understand the difference between Azure Active Directory and an Azure subscription:
|
It's important to understand the difference between Azure Active Directory and an Azure subscription:
|
||||||
|
|
||||||
**Azure Active Directory** is the directory that Azure uses. Azure Active Directory (AD) is a separate service which sits by itself and is used by all of Azure and also Office 365.
|
**Azure Active Directory** is the directory that Azure uses. Azure Active Directory (Azure AD) is a separate service which sits by itself and is used by all of Azure and also Office 365.
|
||||||
|
|
||||||
An **Azure subscription** is a container for billing, but also acts as a security boundary. Every Azure subscription has a trust relationship with at least one Azure AD instance. This means that a subscription trusts that directory to authenticate users, services, and devices.
|
An **Azure subscription** is a container for billing, but also acts as a security boundary. Every Azure subscription has a trust relationship with at least one Azure AD instance. This means that a subscription trusts that directory to authenticate users, services, and devices.
|
||||||
|
|
||||||
|
@ -18,14 +18,15 @@ Find the tools and resources you need to help deploy and support Windows as a se
|
|||||||
|
|
||||||
Find the latest and greatest news on Windows 10 deployment and servicing.
|
Find the latest and greatest news on Windows 10 deployment and servicing.
|
||||||
|
|
||||||
**Working to make Windows updates clear and transparent**
|
**Discovering the Windows 10 Update history pages**
|
||||||
> [!VIDEO https://www.youtube-nocookie.com/embed/u5P20y39DrA]
|
> [!VIDEO https://www.youtube-nocookie.com/embed/GADIXBf9R58]
|
||||||
|
|
||||||
Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. The Windows update history page is for anyone looking to gain an immediate, precise understanding of particular Windows update issues.
|
Everyone wins when transparency is a top priority. We want you to know when updates are available, as well as alert you to any potential issues you may encounter during or after you install an update. The Windows update history page is for anyone looking to gain an immediate, precise understanding of particular Windows update issues.
|
||||||
|
|
||||||
The latest news:
|
The latest news:
|
||||||
<ul compact style="list-style: none">
|
<ul compact style="list-style: none">
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency">Improving the Windows 10 update experience with control, quality and transparency</a> - April 4, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2019/04/04/improving-the-windows-10-update-experience-with-control-quality-and-transparency">Improving the Windows 10 update experience with control, quality and transparency</a> - April 4, 2019</li>
|
||||||
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Call-to-action-review-your-Windows-Update-for-Business-deferral/ba-p/394244">Call to action: review your Windows Update for Business deferral values</a> - April 3, 2019</li>
|
||||||
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540">Windows 10, version 1809 designated for broad deployment</a> - March 28, 2019</li>
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-version-1809-designated-for-broad-deployment/ba-p/389540">Windows 10, version 1809 designated for broad deployment</a> - March 28, 2019</li>
|
||||||
<li><a href="https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience">Data, insights and listening to improve the customer experience</a> - March 6, 2019</li>
|
<li><a href="https://blogs.windows.com/windowsexperience/2019/03/06/data-insights-and-listening-to-improve-the-customer-experience">Data, insights and listening to improve the customer experience</a> - March 6, 2019</li>
|
||||||
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Getting-to-know-the-Windows-update-history-pages/ba-p/355079">Getting to know the Windows update history pages</a> - February 21, 2019</li>
|
<li><a href="https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Getting-to-know-the-Windows-update-history-pages/ba-p/355079">Getting to know the Windows update history pages</a> - February 21, 2019</li>
|
||||||
|
@ -106,7 +106,7 @@ The following resources provide additional information about using Windows Updat
|
|||||||
- regsvr32.exe wuwebv.dll
|
- regsvr32.exe wuwebv.dll
|
||||||
7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER:
|
7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER:
|
||||||
```
|
```
|
||||||
netsh reset winsock
|
netsh winsock reset
|
||||||
```
|
```
|
||||||
8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER:
|
8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER:
|
||||||
```
|
```
|
||||||
|
@ -25,7 +25,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
- [To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain](#bkmk-migratemoveuserone)
|
- [To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain](#bkmk-migratemoveuserone)
|
||||||
|
|
||||||
## <a href="" id="bkmk-migrateall"></a>To migrate all user accounts and user settings
|
## <a href="" id="bkmk-migrateall"></a>To migrate all user accounts and user settings
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and specify the following in a **Command-Prompt** window:
|
1. Log on to the source computer as an administrator, and specify the following in a **Command-Prompt** window:
|
||||||
|
|
||||||
@ -49,7 +49,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
|
|
||||||
|
|
||||||
## <a href="" id="bkmk-migratetwo"></a>To migrate two domain accounts (User1 and User2)
|
## <a href="" id="bkmk-migratetwo"></a>To migrate two domain accounts (User1 and User2)
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and specify:
|
1. Log on to the source computer as an administrator, and specify:
|
||||||
|
|
||||||
@ -62,7 +62,7 @@ By default, all users are migrated. The only way to specify which users to inclu
|
|||||||
`loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml`
|
`loadstate \\server\share\migration\mystore /i:migdocs.xml /i:migapp.xml`
|
||||||
|
|
||||||
## <a href="" id="bkmk-migratemoveuserone"></a>To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain
|
## <a href="" id="bkmk-migratemoveuserone"></a>To migrate two domain accounts (User1 and User2) and move User1 from the Contoso domain to the Fabrikam domain
|
||||||
|
Links to detailed explanations of commands are available in the Related Topics section.
|
||||||
|
|
||||||
1. Log on to the source computer as an administrator, and type the following at the command-line prompt:
|
1. Log on to the source computer as an administrator, and type the following at the command-line prompt:
|
||||||
|
|
||||||
|
@ -155,14 +155,18 @@ The following table defines the endpoints for Connected User Experiences and Tel
|
|||||||
|
|
||||||
Windows release | Endpoint
|
Windows release | Endpoint
|
||||||
--- | ---
|
--- | ---
|
||||||
Windows 10, versions 1703 and 1709 | Diagnostics data: v10.vortex-win.data.microsoft.com/collect/v1</br></br>Functional: v20.vortex-win.data.microsoft.com/collect/v1</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com/collect/v1</br>settings-win.data.microsoft.com
|
Windows 10, versions 1703 or later, with the 2018-09 cumulative update installed| Diagnostics data: v10c.vortex-win.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
Windows 10, version 1607 | v10.vortex-win.data.microsoft.com</br></br>settings-win.data.microsoft.com
|
Windows 10, versions 1803 or later, without the 2018-09 cumulative update installed | Diagnostics data: v10.events.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
|
Windows 10, version 1709 or earlier | Diagnostics data: v10.vortex-win.data.microsoft.com</br></br>Functional: v20.vortex-win.data.microsoft.com</br>Windows Advanced Threat Protection is country specific and the prefix changes by country for example: **de**.vortex-win.data.microsoft.com</br>settings-win.data.microsoft.com
|
||||||
|
Windows 7 and Windows 8.1 | vortex-win.data.microsoft.com
|
||||||
|
|
||||||
The following table defines the endpoints for other diagnostic data services:
|
The following table defines the endpoints for other diagnostic data services:
|
||||||
|
|
||||||
| Service | Endpoint |
|
| Service | Endpoint |
|
||||||
| - | - |
|
| - | - |
|
||||||
| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
| [Windows Error Reporting](https://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com |
|
||||||
|
| | umwatsonc.events.data.microsoft.com |
|
||||||
|
| | kmwatsonc.events.data.microsoft.com |
|
||||||
| | ceuswatcab01.blob.core.windows.net |
|
| | ceuswatcab01.blob.core.windows.net |
|
||||||
| | ceuswatcab02.blob.core.windows.net |
|
| | ceuswatcab02.blob.core.windows.net |
|
||||||
| | eaus2watcab01.blob.core.windows.net |
|
| | eaus2watcab01.blob.core.windows.net |
|
||||||
@ -170,7 +174,7 @@ The following table defines the endpoints for other diagnostic data services:
|
|||||||
| | weus2watcab01.blob.core.windows.net |
|
| | weus2watcab01.blob.core.windows.net |
|
||||||
| | weus2watcab02.blob.core.windows.net |
|
| | weus2watcab02.blob.core.windows.net |
|
||||||
| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
| [Online Crash Analysis](https://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com |
|
||||||
| OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 |
|
| OneDrive app for Windows 10 | vortex.data.microsoft.com |
|
||||||
|
|
||||||
### Data use and access
|
### Data use and access
|
||||||
|
|
||||||
@ -356,9 +360,9 @@ You can turn on or turn off System Center diagnostic data gathering. The default
|
|||||||
|
|
||||||
The lowest diagnostic data setting level supported through management policies is **Security**. The lowest diagnostic data setting supported through the Settings UI is **Basic**. The default diagnostic data setting for Windows Server 2016 is **Enhanced**.
|
The lowest diagnostic data setting level supported through management policies is **Security**. The lowest diagnostic data setting supported through the Settings UI is **Basic**. The default diagnostic data setting for Windows Server 2016 is **Enhanced**.
|
||||||
|
|
||||||
### Configure the operating system diagnostic data level
|
## Configure the operating system diagnostic data level
|
||||||
|
|
||||||
You can configure your operating system diagnostic data settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your diagnostic data levels through a management policy sets the upper level for diagnostic data on the device.
|
You can configure your operating system diagnostic data settings using the management tools you’re already using, such as **Group Policy, MDM, or Windows Provisioning.** You can also manually change your settings using Registry Editor. Setting your diagnostic data levels through a management policy sets the upper level for diagnostic data on the device.
|
||||||
|
|
||||||
Use the appropriate value in the table below when you configure the management policy.
|
Use the appropriate value in the table below when you configure the management policy.
|
||||||
|
|
||||||
@ -388,7 +392,7 @@ Use the [Policy Configuration Service Provider (CSP)](https://msdn.microsoft.com
|
|||||||
|
|
||||||
### Use Registry Editor to set the diagnostic data level
|
### Use Registry Editor to set the diagnostic data level
|
||||||
|
|
||||||
Use Registry Editor to manually set the registry level on each device in your organization or you can write a script to edit the registry. If a management policy already exists, such as Group Policy or MDM, it will override this registry setting.
|
Use Registry Editor to manually set the registry level on the devices in your organization, or you can write a script to edit the registry. If a management policy already exists, such as Group Policy or MDM, the policy will replace the manually set registry level.
|
||||||
|
|
||||||
1. Open Registry Editor, and go to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DataCollection**.
|
1. Open Registry Editor, and go to **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\Windows\\DataCollection**.
|
||||||
|
|
||||||
|
@ -21,17 +21,17 @@ ms.date: 01/17/2018
|
|||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10, version 1809
|
- Windows 10, version 1809
|
||||||
- Windows 10, version 1803
|
- Windows 10, version 1803
|
||||||
|
|
||||||
## Introduction
|
## Introduction
|
||||||
The Diagnostic Data Viewer is a Windows app that lets you review the diagnostic data your device is sending to Microsoft, grouping the info into simple categories based on how it's used by Microsoft.
|
The Diagnostic Data Viewer is a Windows app that lets you review the Windows diagnostic data your device is sending to Microsoft, grouping the info into simple categories based on how it's used by Microsoft.
|
||||||
|
|
||||||
## Install and Use the Diagnostic Data Viewer
|
## Install and Use the Diagnostic Data Viewer
|
||||||
|
|
||||||
You must turn on data viewing and download the app before you can use the Diagnostic Data Viewer to review your device's diagnostic data.
|
You must download the app before you can use the Diagnostic Data Viewer to review your device's diagnostic data.
|
||||||
|
|
||||||
### Turn on data viewing
|
### Turn on data viewing
|
||||||
Before you can use this tool, you must turn on data viewing in the **Settings** panel. Turning on data viewing lets Windows store your device's diagnostic data until you turn it off. Turning off data viewing stops Windows from collecting your diagnostic data and clears the existing diagnostic data from your device.
|
Before you can use this tool for viewing Windows diagnostic data, you must turn on data viewing in the **Settings** panel. Turning on data viewing lets Windows store your device's diagnostic data until you turn it off. Turning off data viewing stops Windows from collecting your diagnostic data and clears the existing diagnostic data from your device. Note that this setting does not affect your Office data viewing or history.
|
||||||
|
|
||||||
**To turn on data viewing**
|
**To turn on data viewing**
|
||||||
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
||||||
@ -44,7 +44,7 @@ Before you can use this tool, you must turn on data viewing in the **Settings**
|
|||||||
Download the app from the [Microsoft Store Diagnostic Data Viewer](https://www.microsoft.com/en-us/store/p/diagnostic-data-viewer/9n8wtrrsq8f7?rtc=1) page.
|
Download the app from the [Microsoft Store Diagnostic Data Viewer](https://www.microsoft.com/en-us/store/p/diagnostic-data-viewer/9n8wtrrsq8f7?rtc=1) page.
|
||||||
|
|
||||||
### Start the Diagnostic Data Viewer
|
### Start the Diagnostic Data Viewer
|
||||||
You must start this app from the **Settings** panel.
|
You can start this app from the **Settings** panel.
|
||||||
|
|
||||||
**To start the Diagnostic Data Viewer**
|
**To start the Diagnostic Data Viewer**
|
||||||
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
||||||
@ -58,29 +58,25 @@ You must start this app from the **Settings** panel.
|
|||||||
3. Close the Diagnostic Data Viewer app, use your device as you normally would for a few days, and then open Diagnostic Data Viewer again to review the updated list of diagnostic data.
|
3. Close the Diagnostic Data Viewer app, use your device as you normally would for a few days, and then open Diagnostic Data Viewer again to review the updated list of diagnostic data.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>Turning on data viewing can use up to 1GB of disk space on your system drive. We strongly recommend that your turn off data viewing when you're done using the Diagnostic Data Viewer. For info about turning off data viewing, see the [Turn off data viewing](#turn-off-data-viewing) section in this article.
|
>Turning on data viewing can use up to 1GB (by default) of disk space on your system drive. We strongly recommend that you turn off data viewing when you're done using the Diagnostic Data Viewer. For info about turning off data viewing, see the [Turn off data viewing](#turn-off-data-viewing) section in this article.
|
||||||
|
|
||||||
### Use the Diagnostic Data Viewer
|
### Use the Diagnostic Data Viewer
|
||||||
The Diagnostic Data Viewer provides you with the following features to view and filter your device's diagnostic data.
|
The Diagnostic Data Viewer provides you with the following features to view and filter your device's diagnostic data.
|
||||||
|
|
||||||
- **View your diagnostic events.** In the left column, you can review your diagnostic events. These events reflect activities that occurred and were sent to Microsoft.
|
- **View your Windows diagnostic events.** In the left column, you can review your diagnostic events. These events reflect activities that occurred and were sent to Microsoft.
|
||||||
|
|
||||||
Selecting an event opens the detailed JSON view, which provides the exact details uploaded to Microsoft. Microsoft uses this info to continually improve the Windows operating system.
|
Selecting an event opens the detailed JSON view, which provides the exact details uploaded to Microsoft. Microsoft uses this info to continually improve the Windows operating system.
|
||||||
|
|
||||||
>[!Important]
|
>[!Important]
|
||||||
>Seeing an event does not necessarily mean it has been uploaded yet. It’s possible that some events are still queued and will be uploaded at a later time.
|
>Seeing an event does not necessarily mean it has been uploaded yet. It’s possible that some events are still queued and will be uploaded at a later time.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- **Search your diagnostic events.** The **Search** box at the top of the screen lets you search amongst all of the diagnostic event details. The returned search results include any diagnostic event that contains the matching text.
|
- **Search your diagnostic events.** The **Search** box at the top of the screen lets you search amongst all of the diagnostic event details. The returned search results include any diagnostic event that contains the matching text.
|
||||||
|
|
||||||
Selecting an event opens the detailed JSON view, with the matching text highlighted.
|
Selecting an event opens the detailed JSON view, with the matching text highlighted.
|
||||||
|
|
||||||
- **Filter your diagnostic event categories.** The apps Menu button opens the detailed menu. In here, you'll find a list of diagnostic event categories, which define how the events are used by Microsoft.
|
- **Filter your diagnostic event categories.** The app's **Menu** button opens the detailed menu. In here, you'll find a list of diagnostic event categories, which define how the events are used by Microsoft. Selecting a check box lets you filter between the diagnostic event categories.
|
||||||
|
|
||||||
Selecting a check box lets you filter between the diagnostic event categories.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
- **Help to make your Windows experience better.** Microsoft only needs diagnostic data from a small amount of devices to make big improvements to the Windows operating system and ultimately, your experience. If you’re a part of this small device group and you experience issues, Microsoft will collect the associated event diagnostic data, allowing your info to potentially help fix the issue for others.
|
- **Help to make your Windows experience better.** Microsoft only needs diagnostic data from a small amount of devices to make big improvements to the Windows operating system and ultimately, your experience. If you’re a part of this small device group and you experience issues, Microsoft will collect the associated event diagnostic data, allowing your info to potentially help fix the issue for others.
|
||||||
|
|
||||||
@ -93,8 +89,20 @@ The Diagnostic Data Viewer provides you with the following features to view and
|
|||||||
>[!Important]
|
>[!Important]
|
||||||
>All content in the Feedback Hub is publicly viewable. Therefore, make sure you don't put any personal info into your feedback comments.
|
>All content in the Feedback Hub is publicly viewable. Therefore, make sure you don't put any personal info into your feedback comments.
|
||||||
|
|
||||||
|
- **View a summary of the data you've shared with us over time.** Available for users on build 19H1+, 'About my data' in Diagnostic Data Viewer lets you see an overview of the Windows data you've shared with Microsoft.
|
||||||
|
|
||||||
|
Through this feature, you can checkout how much data you send on average each day, the breakdown of your data by category, the top components and services that have sent data, and more.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>This content is a reflection of the history of Windows data the app has stored. If you'd like to have extended analyses, please modify the storage capacity of Diagnostic Data Viewer.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## View Office Diagnostic Data
|
||||||
|
By default, Diagnostic Data Viewer shows you Windows data. You can also view Office diagnostic data by enabling the feature in the app settings page. To learn more about how to view Office diagnostic data, please visit this [page](https://go.microsoft.com/fwlink/?linkid=2023830).
|
||||||
|
|
||||||
## Turn off data viewing
|
## Turn off data viewing
|
||||||
When you're done reviewing your diagnostic data, you should turn of data viewing.
|
When you're done reviewing your diagnostic data, you should turn of data viewing. This will also remove your Windows data history. Note that this setting does not affect your Office data viewing or history.
|
||||||
|
|
||||||
**To turn off data viewing**
|
**To turn off data viewing**
|
||||||
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
1. Go to **Start**, select **Settings** > **Privacy** > **Diagnostics & feedback**.
|
||||||
@ -103,8 +111,24 @@ When you're done reviewing your diagnostic data, you should turn of data viewing
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
## Modifying the size of your data history
|
||||||
|
By default, Diagnostic Data Viewer shows you up to 1GB or 30 days of data (whichever comes first) for Windows diagnostic data. Once either the time or space limit is reached, the data is incrementally dropped with the oldest data points dropped first.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Note that if you have [Office diagnostic data viewing enabled](#view-office-diagnostic-data), the Office data history is fixed at 1 GB and cannot be modified.
|
||||||
|
|
||||||
|
**Modify the size of your data history**
|
||||||
|
|
||||||
|
To make changes to the size of your Windows diagnostic data history, visit the **app settings**, located at the bottom of the navigation menu. Data will be incrementally dropped with the oldest data points first once your chosen size or time limit is reached.
|
||||||
|
|
||||||
|
>[!Important]
|
||||||
|
>Decreasing the maximum amount of diagnostic data viewable through the tool will remove all data history and requires a reboot of your device. Additionally, increasing the maximum amount of diagnostic data viewable by the tool may come with performance impacts to your machine.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
## View additional diagnostic data in the View problem reports tool
|
## View additional diagnostic data in the View problem reports tool
|
||||||
Available on Windows 1809 and higher, you can review additional Windows Error Reporting diagnostic data in the **View problem reports** page within the Diagnostic Data Viewer.
|
Available on Windows 1809 and higher, you can review additional Windows Error Reporting diagnostic data in the **View problem reports** page within the Diagnostic Data Viewer.
|
||||||
|
|
||||||
This page provides you with a summary of various crash reports that are sent to Microsoft as part of Windows Error Reporting.
|
This page provides you with a summary of various crash reports that are sent to Microsoft as part of Windows Error Reporting.
|
||||||
We use this data to find and fix specific issues that are hard to replicate and to improve the Windows operating system.
|
We use this data to find and fix specific issues that are hard to replicate and to improve the Windows operating system.
|
||||||
|
|
||||||
@ -123,3 +147,4 @@ Go to **Start** and search for _Problem Reports_.
|
|||||||
The **Review problem reports** tool opens, showing you your Windows Error Reporting reports, along with a status about whether it was sent to Microsoft.
|
The **Review problem reports** tool opens, showing you your Windows Error Reporting reports, along with a status about whether it was sent to Microsoft.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
BIN
windows/privacy/images/ddv-analytics.png
Normal file
After Width: | Height: | Size: 53 KiB |
BIN
windows/privacy/images/ddv-event-view.jpg
Normal file
After Width: | Height: | Size: 337 KiB |
Before Width: | Height: | Size: 149 KiB |
Before Width: | Height: | Size: 105 KiB After Width: | Height: | Size: 108 KiB |
@ -405,52 +405,21 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download operating system patches and updates.
|
The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTP | *.windowsupdate.com |
|
| svchost | HTTP | *.windowsupdate.com |
|
||||||
| | HTTP | fg.download.windowsupdate.com.c.footprint.net |
|
| svchost | HTTP | *.dl.delivery.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoint is used by the Highwinds Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | cds.d2s7q6s2.hwcdn.net |
|
|
||||||
|
|
||||||
The following endpoints are used by the Verizon Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | HTTP | *wac.phicdn.net |
|
|
||||||
| | | *wac.edgecastcdn.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps and Windows Insider Preview builds from the Microsoft Store. Time Limited URL (TLU) is a mechanism for protecting the content. For example, it prevents someone from copying the URL and then getting access to the app that the person has not acquired).
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the updating functionality on this device is essentially in a disabled state, resulting in user unable to get apps from the Store, get latest version of Windows, and so on.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | *.tlu.dl.delivery.mp.microsoft.com.c.footprint.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps from the Microsoft Store. It's used as part of calculating the right ranges for apps.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), users of the device will not able to get apps from the Microsoft Store.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | emdl.ws.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | fe2.update.microsoft.com |
|
| svchost | HTTPS | *.update.microsoft.com |
|
||||||
| svchost | | fe3.delivery.mp.microsoft.com |
|
| svchost | HTTPS | *.delivery.mp.microsoft.com |
|
||||||
| | | fe3.delivery.dsp.mp.microsoft.com.nsatc.net |
|
|
||||||
| svchost | HTTPS | sls.update.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoint is used for content regulation.
|
The following endpoint is used for content regulation.
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
||||||
@ -459,14 +428,6 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download content.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), you will block any content from being downloaded.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | a122.dscd.akamai.net |
|
|
||||||
| | | a1621.g.akamai.net |
|
|
||||||
|
|
||||||
## Microsoft forward link redirection service (FWLink)
|
## Microsoft forward link redirection service (FWLink)
|
||||||
|
|
||||||
The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer.
|
The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer.
|
||||||
|
@ -410,53 +410,21 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download operating system patches and updates.
|
The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTP | *.windowsupdate.com |
|
| svchost | HTTP | *.windowsupdate.com |
|
||||||
| | HTTP | fg.download.windowsupdate.com.c.footprint.net |
|
| svchost | HTTP | *.dl.delivery.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoint is used by the Highwinds Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | cds.d2s7q6s2.hwcdn.net |
|
|
||||||
|
|
||||||
The following endpoints are used by the Verizon Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | HTTP | *wac.phicdn.net |
|
|
||||||
| | | *wac.edgecastcdn.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps and Windows Insider Preview builds from the Microsoft Store. Time Limited URL (TLU) is a mechanism for protecting the content. For example, it prevents someone from copying the URL and then getting access to the app that the person has not acquired).
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the updating functionality on this device is essentially in a disabled state, resulting in user unable to get apps from the Store, get latest version of Windows, and so on.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | *.tlu.dl.delivery.mp.microsoft.com.c.footprint.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps from the Microsoft Store. It's used as part of calculating the right ranges for apps.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), users of the device will not able to get apps from the Microsoft Store.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | emdl.ws.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | fe2.update.microsoft.com |
|
| svchost | HTTPS | *.update.microsoft.com |
|
||||||
| svchost | | fe3.delivery.mp.microsoft.com |
|
| svchost | HTTPS | *.delivery.mp.microsoft.com |
|
||||||
| | | fe3.delivery.dsp.mp.microsoft.com.nsatc.net |
|
|
||||||
| svchost | HTTPS | sls.update.microsoft.com |
|
|
||||||
| | HTTP | *.dl.delivery.mp.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoint is used for content regulation.
|
The following endpoint is used for content regulation.
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
||||||
@ -465,14 +433,6 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download content.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), you will block any content from being downloaded.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | a122.dscd.akamai.net |
|
|
||||||
| | | a1621.g.akamai.net |
|
|
||||||
|
|
||||||
## Microsoft forward link redirection service (FWLink)
|
## Microsoft forward link redirection service (FWLink)
|
||||||
|
|
||||||
The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer.
|
The following endpoint is used by the Microsoft forward link redirection service (FWLink) to redirect permanent web links to their actual, sometimes transitory, URL. FWlinks are similar to URL shorteners, just longer.
|
||||||
|
@ -440,53 +440,21 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
| svchost | HTTPS | *.prod.do.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download operating system patches and updates.
|
The following endpoints are used to download operating system patches, updates, and apps from Microsoft Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to download updates for the operating system.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTP | *.windowsupdate.com |
|
| svchost | HTTP | *.windowsupdate.com |
|
||||||
| | HTTP | fg.download.windowsupdate.com.c.footprint.net |
|
| svchost | HTTP | *.dl.delivery.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoint is used by the Highwinds Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | cds.d2s7q6s2.hwcdn.net |
|
|
||||||
|
|
||||||
The following endpoints are used by the Verizon Content Delivery Network to perform Windows updates.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not perform updates.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | HTTP | *wac.phicdn.net |
|
|
||||||
| | | *wac.edgecastcdn.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps and Windows Insider Preview builds from the Microsoft Store. Time Limited URL (TLU) is a mechanism for protecting the content. For example, it prevents someone from copying the URL and then getting access to the app that the person has not acquired).
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the updating functionality on this device is essentially in a disabled state, resulting in user unable to get apps from the Store, get latest version of Windows, and so on.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | *.tlu.dl.delivery.mp.microsoft.com.c.footprint.net |
|
|
||||||
|
|
||||||
The following endpoint is used to download apps from the Microsoft Store. It's used as part of calculating the right ranges for apps.
|
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), users of the device will not able to get apps from the Microsoft Store.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| svchost | | emdl.ws.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
The following endpoints enable connections to Windows Update, Microsoft Update, and the online services of the Store.
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the device will not be able to connect to Windows Update and Microsoft Update to help keep the device secure. Also, the device will not be able to acquire and update apps from the Store.
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
| Source process | Protocol | Destination |
|
||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | fe2.update.microsoft.com |
|
| svchost | HTTPS | *.update.microsoft.com |
|
||||||
| svchost | | fe3.delivery.mp.microsoft.com |
|
| svchost | HTTPS | *.delivery.mp.microsoft.com |
|
||||||
| | | fe3.delivery.dsp.mp.microsoft.com.nsatc.net |
|
|
||||||
| svchost | HTTPS | sls.update.microsoft.com |
|
|
||||||
| | HTTP | *.dl.delivery.mp.microsoft.com |
|
|
||||||
|
|
||||||
The following endpoint is used for content regulation.
|
The following endpoint is used for content regulation.
|
||||||
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), the Windows Update Agent will be unable to contact the endpoint and fallback behavior will be used. This may result in content being either incorrectly downloaded or not downloaded at all.
|
||||||
@ -495,13 +463,6 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|----------------|----------|------------|
|
|----------------|----------|------------|
|
||||||
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
| svchost | HTTPS | tsfe.trafficshaping.dsp.mp.microsoft.com |
|
||||||
|
|
||||||
The following endpoints are used to download content.
|
|
||||||
If you [turn off traffic for these endpoints](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-wu), you will block any content from being downloaded.
|
|
||||||
|
|
||||||
| Source process | Protocol | Destination |
|
|
||||||
|----------------|----------|------------|
|
|
||||||
| | | a122.dscd.akamai.net |
|
|
||||||
| | | a1621.g.akamai.net |
|
|
||||||
|
|
||||||
## Microsoft forward link redirection service (FWLink)
|
## Microsoft forward link redirection service (FWLink)
|
||||||
|
|
||||||
|
@ -40,52 +40,52 @@ We used the following methodology to derive these network endpoints:
|
|||||||
|
|
||||||
| **Destination** | **Protocol** | **Description** |
|
| **Destination** | **Protocol** | **Description** |
|
||||||
| --- | --- | --- |
|
| --- | --- | --- |
|
||||||
|*.aria.microsoft.com* | HTTPS | Office Telemetry
|
|\*.aria.microsoft.com\* | HTTPS | Office Telemetry
|
||||||
|*.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update.
|
|\*.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update.
|
||||||
|*.download.windowsupdate.com* | HTTP | Used to download operating system patches and updates.
|
|\*.download.windowsupdate.com\* | HTTP | Used to download operating system patches and updates.
|
||||||
|*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use.
|
|\*.g.akamai.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use.
|
||||||
|*.msn.com* |TLSv1.2/HTTPS | Windows Spotlight related traffic
|
|\*.msn.com\* |TLSv1.2/HTTPS | Windows Spotlight related traffic
|
||||||
|*.Skype.com | HTTP/HTTPS | Skype related traffic
|
|\*.Skype.com | HTTP/HTTPS | Skype related traffic
|
||||||
|*.smartscreen.microsoft.com* | HTTPS | Windows Defender Smartscreen related traffic
|
|\*.smartscreen.microsoft.com\* | HTTPS | Windows Defender Smartscreen related traffic
|
||||||
|*.telecommand.telemetry.microsoft.com* | HTTPS | Used by Windows Error Reporting.
|
|\*.telecommand.telemetry.microsoft.com\* | HTTPS | Used by Windows Error Reporting.
|
||||||
|*cdn.onenote.net* | HTTP | OneNote related traffic
|
|\*cdn.onenote.net* | HTTP | OneNote related traffic
|
||||||
|*displaycatalog.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
|
|\*displaycatalog.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
|
||||||
|*emdl.ws.microsoft.com* | HTTP | Windows Update related traffic
|
|\*emdl.ws.microsoft.com\* | HTTP | Windows Update related traffic
|
||||||
|*geo-prod.do.dsp.mp.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update.
|
|\*geo-prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update.
|
||||||
|*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates.
|
|\*hwcdn.net* | HTTP | Used by the Highwinds Content Delivery Network to perform Windows updates.
|
||||||
|*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps).
|
|\*img-prod-cms-rt-microsoft-com.akamaized.net* | HTTPS | Used to download image files that are called when applications run (Microsoft Store or Inbox MSN Apps).
|
||||||
|*maps.windows.com* | HTTPS | Related to Maps application.
|
|\*maps.windows.com\* | HTTPS | Related to Maps application.
|
||||||
|*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps.
|
|\*msedge.net* | HTTPS | Used by OfficeHub to get the metadata of Office apps.
|
||||||
|*nexusrules.officeapps.live.com* | HTTPS | Office Telemetry
|
|\*nexusrules.officeapps.live.com\* | HTTPS | Office Telemetry
|
||||||
|*photos.microsoft.com* | HTTPS | Photos App related traffic
|
|\*photos.microsoft.com\* | HTTPS | Photos App related traffic
|
||||||
|*prod.do.dsp.mp.microsoft.com* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates.
|
|\*prod.do.dsp.mp.microsoft.com\* |TLSv1.2/HTTPS | Used for Windows Update downloads of apps and OS updates.
|
||||||
|*wac.phicdn.net* | HTTP | Windows Update related traffic
|
|\*wac.phicdn.net* | HTTP | Windows Update related traffic
|
||||||
|*windowsupdate.com* | HTTP | Windows Update related traffic
|
|\*windowsupdate.com\* | HTTP | Windows Update related traffic
|
||||||
|*wns.windows.com* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS).
|
|\*wns.windows.com\* | HTTPS, TLSv1.2 | Used for the Windows Push Notification Services (WNS).
|
||||||
|*wpc.v0cdn.net* | | Windows Telemetry related traffic
|
|\*wpc.v0cdn.net* | | Windows Telemetry related traffic
|
||||||
|auth.gfx.ms/16.000.27934.1/OldConvergedLogin_PCore.js | | MSA related
|
|auth.gfx.ms/16.000.27934.1/OldConvergedLogin_PCore.js | | MSA related
|
||||||
|evoke-windowsservices-tas.msedge* | HTTPS | The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.
|
|evoke-windowsservices-tas.msedge* | HTTPS | The following endpoint is used by the Photos app to download configuration files, and to connect to the Office 365 portal's shared infrastructure, including Office Online. To turn off traffic for this endpoint, either uninstall the Photos app or disable the Microsoft Store. If you disable the Microsoft store, other Store apps cannot be installed or updated. Additionally, the Microsoft Store won't be able to revoke malicious Store apps and users will still be able to open them.
|
||||||
|fe2.update.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
|
|fe2.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
|
||||||
|fe3.*.mp.microsoft.com.* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
|
|fe3.\*.mp.microsoft.com.\* |TLSv1.2/HTTPS | Enables connections to Windows Update, Microsoft Update, and the online services of Microsoft Store.
|
||||||
|fs.microsoft.com | | Font Streaming (in ENT traffic)
|
|fs.microsoft.com | | Font Streaming (in ENT traffic)
|
||||||
|g.live.com* | HTTPS | Used by OneDrive
|
|g.live.com\* | HTTPS | Used by OneDrive
|
||||||
|iriscoremetadataprod.blob.core.windows.net | HTTPS | Windows Telemetry
|
|iriscoremetadataprod.blob.core.windows.net | HTTPS | Windows Telemetry
|
||||||
|mscrl.micorosoft.com | | Certificate Revocation List related traffic.
|
|mscrl.microsoft.com | | Certificate Revocation List related traffic.
|
||||||
|ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities.
|
|ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities.
|
||||||
|officeclient.microsoft.com | HTTPS | Office related traffic.
|
|officeclient.microsoft.com | HTTPS | Office related traffic.
|
||||||
|oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates.
|
|oneclient.sfx.ms* | HTTPS | Used by OneDrive for Business to download and verify app updates.
|
||||||
|purchase.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
|
|purchase.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
|
||||||
|query.prod.cms.rt.microsoft.com* | HTTPS | Used to retrieve Windows Spotlight metadata.
|
|query.prod.cms.rt.microsoft.com\* | HTTPS | Used to retrieve Windows Spotlight metadata.
|
||||||
|ris.api.iris.microsoft.com* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata.
|
|ris.api.iris.microsoft.com\* |TLSv1.2/HTTPS | Used to retrieve Windows Spotlight metadata.
|
||||||
|ris-prod-atm.trafficmanager.net | HTTPS | Azure traffic manager
|
|ris-prod-atm.trafficmanager.net | HTTPS | Azure traffic manager
|
||||||
|settings.data.microsoft.com* | HTTPS | Used for Windows apps to dynamically update their configuration.
|
|settings.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration.
|
||||||
|settings-win.data.microsoft.com* | HTTPS | Used for Windows apps to dynamically update their configuration.
|
|settings-win.data.microsoft.com\* | HTTPS | Used for Windows apps to dynamically update their configuration.
|
||||||
|sls.update.microsoft.com* |TLSv1.2/HTTPS | Enables connections to Windows Update.
|
|sls.update.microsoft.com\* |TLSv1.2/HTTPS | Enables connections to Windows Update.
|
||||||
|store*.dsx.mp.microsoft.com* | HTTPS | Used to communicate with Microsoft Store.
|
|store*.dsx.mp.microsoft.com\* | HTTPS | Used to communicate with Microsoft Store.
|
||||||
|storecatalogrevocation.storequality.microsoft.com* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store.
|
|storecatalogrevocation.storequality.microsoft.com\* | HTTPS | Used to revoke licenses for malicious apps on the Microsoft Store.
|
||||||
|store-images.s-microsoft.com* | HTTP | Used to get images that are used for Microsoft Store suggestions.
|
|store-images.s-microsoft.com\* | HTTP | Used to get images that are used for Microsoft Store suggestions.
|
||||||
|tile-service.weather.microsoft.com* | HTTP | Used to download updates to the Weather app Live Tile.
|
|tile-service.weather.microsoft.com\* | HTTP | Used to download updates to the Weather app Live Tile.
|
||||||
|tsfe.trafficshaping.dsp.mp.microsoft.com* |TLSv1.2 | Used for content regulation.
|
|tsfe.trafficshaping.dsp.mp.microsoft.com\* |TLSv1.2 | Used for content regulation.
|
||||||
|v10.events.data.microsoft.com | HTTPS | Diagnostic Data
|
|v10.events.data.microsoft.com | HTTPS | Diagnostic Data
|
||||||
|wdcp.microsoft.* |TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled.
|
|wdcp.microsoft.* |TLSv1.2 | Used for Windows Defender when Cloud-based Protection is enabled.
|
||||||
|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com | HTTPS | Windows Defender related traffic.
|
|wd-prod-cp-us-west-1-fe.westus.cloudapp.azure.com | HTTPS | Windows Defender related traffic.
|
||||||
@ -111,7 +111,7 @@ We used the following methodology to derive these network endpoints:
|
|||||||
| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. |
|
| ipv4.login.msa.akadns6.net | HTTPS | Used for Microsoft accounts to sign in. |
|
||||||
| location-inference-westus.cloudapp.net | HTTPS | Used for location data. |
|
| location-inference-westus.cloudapp.net | HTTPS | Used for location data. |
|
||||||
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
||||||
| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
|
| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
|
||||||
| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. |
|
| ris.api.iris.microsoft.com.akadns.net | HTTPS | Used to retrieve Windows Spotlight metadata. |
|
||||||
| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. |
|
| tile-service.weather.microsoft.com/* | HTTP | Used to download updates to the Weather app Live Tile. |
|
||||||
| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. |
|
| tsfe.trafficshaping.dsp.mp.microsoft.com | HTTPS | Used for content regulation. |
|
||||||
@ -127,10 +127,10 @@ We used the following methodology to derive these network endpoints:
|
|||||||
| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. |
|
| *.g.akamaiedge.net | HTTPS | Used to check for updates to maps that have been downloaded for offline use. |
|
||||||
| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. |
|
| *.s-msedge.net | HTTPS | Used by OfficeHub to get the metadata of Office apps. |
|
||||||
| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
| *.telecommand.telemetry.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
||||||
| *.tlu.dl.delivery.mp.microsoft.com* | HTTP | Enables connections to Windows Update. |
|
| *.tlu.dl.delivery.mp.microsoft.com\* | HTTP | Enables connections to Windows Update. |
|
||||||
| *.windowsupdate.com* | HTTP | Enables connections to Windows Update. |
|
| *.windowsupdate.com\* | HTTP | Enables connections to Windows Update. |
|
||||||
| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. |
|
| *geo-prod.do.dsp.mp.microsoft.com | HTTPS | Enables connections to Windows Update. |
|
||||||
| au.download.windowsupdate.com* | HTTP | Enables connections to Windows Update. |
|
| au.download.windowsupdate.com\* | HTTP | Enables connections to Windows Update. |
|
||||||
| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. |
|
| cdn.onenote.net/livetile/* | HTTPS | Used for OneNote Live Tile. |
|
||||||
| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office Online. |
|
| client-office365-tas.msedge.net/* | HTTPS | Used to connect to the Office 365 portal’s shared infrastructure, including Office Online. |
|
||||||
| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values. |
|
| config.edge.skype.com/* | HTTPS | Used to retrieve Skype configuration values. |
|
||||||
@ -151,7 +151,7 @@ We used the following methodology to derive these network endpoints:
|
|||||||
| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application |
|
| maps.windows.com/windows-app-web-link | HTTPS | Link to Maps application |
|
||||||
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
| modern.watson.data.microsoft.com.akadns.net | HTTPS | Used by Windows Error Reporting. |
|
||||||
| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. |
|
| ocos-office365-s2s.msedge.net/* | HTTPS | Used to connect to the Office 365 portal's shared infrastructure. |
|
||||||
| ocsp.digicert.com* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
|
| ocsp.digicert.com\* | HTTP | CRL and OCSP checks to the issuing certificate authorities. |
|
||||||
| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. |
|
| oneclient.sfx.ms/* | HTTPS | Used by OneDrive for Business to download and verify app updates. |
|
||||||
| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. |
|
| settings-win.data.microsoft.com/settings/* | HTTPS | Used as a way for apps to dynamically update their configuration. |
|
||||||
| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. |
|
| sls.update.microsoft.com/* | HTTPS | Enables connections to Windows Update. |
|
||||||
|
@ -43,6 +43,14 @@ You can use Group Policy to enable Windows Defender Credential Guard. This will
|
|||||||
|
|
||||||
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
To enforce processing of the group policy, you can run ```gpupdate /force```.
|
||||||
|
|
||||||
|
### Enable Windows Defender Credential Guard by using Intune
|
||||||
|
|
||||||
|
1. From **Home** click **Microsoft Intune**
|
||||||
|
2. Click **Device configuration**
|
||||||
|
3. Click **Profiles** > **Create Profile** > **Endpoint protection** > **Windows Defender Credential Guard**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> It will enable VBS and Secure Boot and you can do it with or without UEFI Lock. If you will need to disable Credential Guard remotely, enable it without UEFI lock.
|
||||||
|
|
||||||
### Enable Windows Defender Credential Guard by using the registry
|
### Enable Windows Defender Credential Guard by using the registry
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -35,9 +35,9 @@ On-premises certificate-based deployments of Windows Hello for Business needs th
|
|||||||
|
|
||||||
## Enable Windows Hello for Business Group Policy
|
## Enable Windows Hello for Business Group Policy
|
||||||
|
|
||||||
The Enable Windows Hello for Business Group Policy setting is the configuration needed for Windows to determine if a user should be attempt to enroll for Windows Hello for Business. A user will only attempt enrollment if this policy setting is configured to enabled.
|
The Group Policy setting determines whether users are allowed, and prompted, to enroll for Windows Hello for Business. It can be configured for computers or users.
|
||||||
|
|
||||||
You can configure the Enable Windows Hello for Business Group Policy setting for computer or users. Deploying this policy setting to computers results in ALL users that sign-in that computer to attempt a Windows Hello for Business enrollment. Deploying this policy setting to a user results in only that user attempting a Windows Hello for Business enrollment. Additionally, you can deploy the policy setting to a group of users so only those users attempt a Windows Hello for Business enrollment. If both user and computer policy settings are deployed, the user policy setting has precedence.
|
If you configure the Group Policy for computers, all users that sign-in to those computers will be allowed and prompted to enroll for Windows Hello for Business. If you configure the Group Policy for users, only those users will be allowed and prompted to enroll for Windows Hello for Business.
|
||||||
|
|
||||||
## Use certificate for on-premises authentication
|
## Use certificate for on-premises authentication
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -6,8 +6,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -6,8 +6,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -6,8 +6,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -6,8 +6,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -187,7 +187,7 @@ Joining a device is an extension to registering a device. This means, it provide
|
|||||||
|
|
||||||
[Return to Top](hello-how-it-works-technology.md)
|
[Return to Top](hello-how-it-works-technology.md)
|
||||||
## Key Trust
|
## Key Trust
|
||||||
The key trust model uses the user's Windows Hello for Business identity to authenticate to on-premises Active Directory. The certificate trust model is supported in hybrid and on-premises deployments and requires Windows Server 2016 domain controllers.
|
The key trust model uses the user's Windows Hello for Business identity to authenticate to on-premises Active Directory. The key trust model is supported in hybrid and on-premises deployments and requires Windows Server 2016 domain controllers.
|
||||||
|
|
||||||
### Related topics
|
### Related topics
|
||||||
[Certificate Trust](#certificate-trust), [Deployment Type](#deployment-type), [Hybrid Azure AD Joined](#hybrid-azure-ad-joined), [Hybrid Deployment](#hybrid-deployment), [On-premises Deployment](#on-premises-deployment), [Trust Type](#trust-type)
|
[Certificate Trust](#certificate-trust), [Deployment Type](#deployment-type), [Hybrid Azure AD Joined](#hybrid-azure-ad-joined), [Hybrid Deployment](#hybrid-deployment), [On-premises Deployment](#on-premises-deployment), [Trust Type](#trust-type)
|
||||||
|
@ -6,8 +6,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -82,7 +82,7 @@ Organizations using older directory synchronization technology, such as DirSync
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
## Federation ##
|
## Federation ##
|
||||||
Federating your on-premises Active Directory with Azure Active Directory ensures all identities have access to all resources regardless if they reside in cloud or on-premises. Windows Hello for Business hybrid certificate trust needs Windows Server 2016 Active Directory Federation Services. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.
|
Windows Hello for Business hybrid certificate trust requires Active Directory being federated with Azure Active Directory and needs Windows Server 2016 Active Directory Federation Services or newer. Windows Hello for Business hybrid certificate trust doesn’t support Managed Azure Active Directory using Pass-through authentication or password hash sync. All nodes in the AD FS farm must run the same version of AD FS. Additionally, you need to configure your AD FS farm to support Azure registered devices.
|
||||||
|
|
||||||
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889). If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
The AD FS farm used with Windows Hello for Business must be Windows Server 2016 with minimum update of [KB4088889 (14393.2155)](https://support.microsoft.com/help/4088889). If your AD FS farm is not running the AD FS role with updates from Windows Server 2016, then read [Upgrading to AD FS in Windows Server 2016](https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/upgrading-to-ad-fs-in-windows-server-2016)
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
---
|
---
|
||||||
title: Hybrid Windows Hello for Business Provisioning (Windows Hello for Business)
|
title: Hybrid Windows Hello for Business Provisioning (Windows Hello for Business)
|
||||||
description: Provisioning for Hybrid Windows Hello for Business Deployments
|
description: Provisioning for Hybrid Windows Hello for Business Deployments
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -18,7 +18,7 @@ ms.date: 08/19/2018
|
|||||||
# Hybrid Windows Hello for Business Provisioning
|
# Hybrid Windows Hello for Business Provisioning
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, version 1703 or later
|
- Windows 10, version 1703 or later
|
||||||
- Hybrid deployment
|
- Hybrid deployment
|
||||||
- Certificate trust
|
- Certificate trust
|
||||||
|
|
||||||
@ -65,7 +65,7 @@ After a successful key registration, Windows creates a certificate request using
|
|||||||
|
|
||||||
The AD FS registration authority verifies the key used in the certificate request matches the key that was previously registered. On a successful match, the AD FS registration authority signs the certificate request using its enrollment agent certificate and sends it to the certificate authority.
|
The AD FS registration authority verifies the key used in the certificate request matches the key that was previously registered. On a successful match, the AD FS registration authority signs the certificate request using its enrollment agent certificate and sends it to the certificate authority.
|
||||||
|
|
||||||
The certificate authority validates the certificate was signed by the registration authority. On successful validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS registration authority. The registration authority returns the certificate to Windows where it then installs the certificate in the current user’s certificate store. Once this process completes, the Windows Hello for Business provisioning workflow informs the user they can use their PIN to sign-in through the Windows Action Center.
|
The certificate authority validates the certificate was signed by the registration authority. On successful validation of the signature, it issues a certificate based on the request and returns the certificate to the AD FS registration authority. The registration authority returns the certificate to Windows where it then installs the certificate in the current user’s certificate store. Once this process completes, the Windows Hello for Business provisioning workflow informs the user they can use their PIN to sign-in through the Windows Action Center.
|
||||||
|
|
||||||
<br><br>
|
<br><br>
|
||||||
|
|
||||||
@ -77,5 +77,5 @@ The certificate authority validates the certificate was signed by the registrati
|
|||||||
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
3. [New Installation Baseline](hello-hybrid-cert-new-install.md)
|
||||||
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
4. [Configure Azure Device Registration](hello-hybrid-cert-trust-devreg.md)
|
||||||
5. [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings-policy.md)
|
5. [Configure Windows Hello for Business policy settings](hello-hybrid-cert-whfb-settings-policy.md)
|
||||||
6. Sign-in and Provision(*You are here*)
|
6. Sign-in and Provision(*You are here*)
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
---
|
---
|
||||||
title: Hybrid Windows Hello for Business key trust Provisioning (Windows Hello for Business)
|
title: Hybrid Windows Hello for Business key trust Provisioning (Windows Hello for Business)
|
||||||
description: Provisioning for Hybrid Windows Hello for Business Deployments
|
description: Provisioning for Hybrid Windows Hello for Business Deployments
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -18,7 +18,7 @@ ms.date: 08/20/2018
|
|||||||
# Hybrid Windows Hello for Business Provisioning
|
# Hybrid Windows Hello for Business Provisioning
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
- Windows 10, version 1703 or later
|
- Windows 10, version 1703 or later
|
||||||
- Hybrid deployment
|
- Hybrid deployment
|
||||||
- Key trust
|
- Key trust
|
||||||
|
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -50,7 +50,7 @@ The table shows the minimum requirements for each deployment. For key trust in a
|
|||||||
| Windows 10, version 1511 or later| **Hybrid Azure AD Joined:**<br> *Minimum:* Windows 10, version 1703<br> *Best experience:* Windows 10, version 1709 or later (supports synchronous certificate enrollment).</br>**Azure AD Joined:**<br> Windows 10, version 1511 or later| Windows 10, version 1511 or later | Windows 10, version 1511 or later |
|
| Windows 10, version 1511 or later| **Hybrid Azure AD Joined:**<br> *Minimum:* Windows 10, version 1703<br> *Best experience:* Windows 10, version 1709 or later (supports synchronous certificate enrollment).</br>**Azure AD Joined:**<br> Windows 10, version 1511 or later| Windows 10, version 1511 or later | Windows 10, version 1511 or later |
|
||||||
| Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema |
|
| Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema | Windows Server 2016 Schema |
|
||||||
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level| Windows Server 2008 R2 Domain/Forest functional level |Windows Server 2008 R2 Domain/Forest functional level |
|
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level| Windows Server 2008 R2 Domain/Forest functional level |Windows Server 2008 R2 Domain/Forest functional level |
|
||||||
| Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers | Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
| Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers | Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
||||||
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
||||||
| N/A | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) (hybrid Azure AD joined clients),<br> and</br>Windows Server 2012 or later Network Device Enrollment Service (Azure AD joined) | N/A | Windows Server 2012 or later Network Device Enrollment Service |
|
| N/A | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) (hybrid Azure AD joined clients),<br> and</br>Windows Server 2012 or later Network Device Enrollment Service (Azure AD joined) | N/A | Windows Server 2012 or later Network Device Enrollment Service |
|
||||||
| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter |
|
| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter| Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter | Azure MFA tenant, or</br>AD FS w/Azure MFA adapter, or</br>AD FS w/Azure MFA Server adapter, or</br>AD FS w/3rd Party MFA Adapter |
|
||||||
@ -67,7 +67,7 @@ The table shows the minimum requirements for each deployment.
|
|||||||
| Windows 10, version 1703 or later | Windows 10, version 1703 or later |
|
| Windows 10, version 1703 or later | Windows 10, version 1703 or later |
|
||||||
| Windows Server 2016 Schema | Windows Server 2016 Schema|
|
| Windows Server 2016 Schema | Windows Server 2016 Schema|
|
||||||
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
|
| Windows Server 2008 R2 Domain/Forest functional level | Windows Server 2008 R2 Domain/Forest functional level |
|
||||||
| Windows Server 2016 Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
| Windows Server 2016 or later Domain Controllers | Windows Server 2008 R2 or later Domain Controllers |
|
||||||
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
| Windows Server 2012 or later Certificate Authority | Windows Server 2012 or later Certificate Authority |
|
||||||
| Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) |
|
| Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) | Windows Server 2016 AD FS with [KB4088889 update](https://support.microsoft.com/help/4088889) |
|
||||||
| AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter | AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter |
|
| AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter | AD FS with Azure MFA Server, or</br>AD FS with 3rd Party MFA Adapter |
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -9,7 +9,7 @@ ms.pagetype: security, mobile
|
|||||||
author: DaniHalfin
|
author: DaniHalfin
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mikestephens-MS
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -8,8 +8,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -7,8 +7,8 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security, mobile
|
ms.pagetype: security, mobile
|
||||||
audience: ITPro
|
audience: ITPro
|
||||||
author: mikestephens-MS
|
author: mapalko
|
||||||
ms.author: mstephen
|
ms.author: mapalko
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
ms.collection: M365-identity-device-management
|
ms.collection: M365-identity-device-management
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
|
@ -89,7 +89,7 @@ To use Windows Defender Remote Credential Guard, the Remote Desktop client and r
|
|||||||
|
|
||||||
The Remote Desktop client device:
|
The Remote Desktop client device:
|
||||||
|
|
||||||
- Must be running at least Windows 10, version 1703 to be able to supply credentials.
|
- Must be running at least Windows 10, version 1703 to be able to supply credentials, which is sent to the remote device. This allows users to run as different users without having to send credentials to the remote machine.
|
||||||
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user’s signed-in credentials. This requires the user’s account be able to sign in to both the client device and the remote host.
|
- Must be running at least Windows 10, version 1607 or Windows Server 2016 to use the user’s signed-in credentials. This requires the user’s account be able to sign in to both the client device and the remote host.
|
||||||
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
- Must be running the Remote Desktop Classic Windows application. The Remote Desktop Universal Windows Platform application doesn't support Windows Defender Remote Credential Guard.
|
||||||
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
- Must use Kerberos authentication to connect to the remote host. If the client cannot connect to a domain controller, then RDP attempts to fall back to NTLM. Windows Defender Remote Credential Guard does not allow NTLM fallback because this would expose credentials to risk.
|
||||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/16/2019
|
ms.date: 04/17/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker Group Policy settings
|
# BitLocker Group Policy settings
|
||||||
@ -238,11 +238,11 @@ This policy setting is used to control which unlock options are available for op
|
|||||||
|
|
||||||
**Reference**
|
**Reference**
|
||||||
|
|
||||||
If you want to use BitLocker on a computer without a TPM, select the **Allow BitLocker without a compatible TPM** check box. In this mode, a USB drive is required for startup. Key information that is used to encrypt the drive is stored on the USB drive, which creates a USB key. When the USB key is inserted, access to the drive is authenticated and the drive is accessible. If the USB key is lost or unavailable, you need to use one of the BitLocker recovery options to access the drive.
|
If you want to use BitLocker on a computer without a TPM, select **Allow BitLocker without a compatible TPM**. In this mode, a password or USB drive is required for startup. The USB drive stores the startup key that is used to encrypt the drive. When the USB drive is inserted, the startup key is authenticated and the operating system drive is accessible. If the USB drive is lost or unavailable, BitLocker recovery is required to access the drive.
|
||||||
|
|
||||||
On a computer with a compatible TPM, four types of authentication methods can be used at startup to provide added protection for encrypted data. When the computer starts, it can use:
|
On a computer with a compatible TPM, additional authentication methods can be used at startup to improve protection for encrypted data. When the computer starts, it can use:
|
||||||
|
|
||||||
- only the TPM for authentication
|
- only the TPM
|
||||||
- insertion of a USB flash drive containing the startup key
|
- insertion of a USB flash drive containing the startup key
|
||||||
- the entry of a 4-digit to 20-digit personal identification number (PIN)
|
- the entry of a 4-digit to 20-digit personal identification number (PIN)
|
||||||
- a combination of the PIN and the USB flash drive
|
- a combination of the PIN and the USB flash drive
|
||||||
|
@ -13,7 +13,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 02/28/2019
|
ms.date: 04/24/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Prepare your organization for BitLocker: Planning and policies
|
# Prepare your organization for BitLocker: Planning and policies
|
||||||
@ -163,9 +163,9 @@ Full drive encryption means that the entire drive will be encrypted, regardless
|
|||||||
|
|
||||||
## <a href="" id="bkmk-addscons"></a>Active Directory Domain Services considerations
|
## <a href="" id="bkmk-addscons"></a>Active Directory Domain Services considerations
|
||||||
|
|
||||||
BitLocker integrates with Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Active Directory. Administrators can configure the following Group Policy setting to enable backup of BitLocker recovery information:
|
BitLocker integrates with Active Directory Domain Services (AD DS) to provide centralized key management. By default, no recovery information is backed up to Active Directory. Administrators can configure the following Group Policy setting for each drive type to enable backup of BitLocker recovery information:
|
||||||
|
|
||||||
Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\Turn on BitLocker backup to Active Directory Domain Services
|
Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption\\*drive type*\\Choose how BitLocker protected drives can be recovered.
|
||||||
|
|
||||||
By default, only Domain Admins have access to BitLocker recovery information, but [access can be delegated to others](https://blogs.technet.microsoft.com/craigf/2011/01/26/delegating-access-in-ad-to-bitlocker-recovery-information/).
|
By default, only Domain Admins have access to BitLocker recovery information, but [access can be delegated to others](https://blogs.technet.microsoft.com/craigf/2011/01/26/delegating-access-in-ad-to-bitlocker-recovery-information/).
|
||||||
|
|
||||||
@ -201,8 +201,8 @@ However, you cannot use recovery passwords generated on a system in FIPS mode fo
|
|||||||
|
|
||||||
## More information
|
## More information
|
||||||
|
|
||||||
- [Trusted Platform Module](/windows/security/hardware-protection/tpm/trusted-platform-module-overview.md)
|
- [Trusted Platform Module](https://docs.microsoft.com/windows/security/information-protection/tpm/trusted-platform-module-top-node)
|
||||||
- [TPM Group Policy settings](/windows/security/hardware-protection/tpm/trusted-platform-module-services-group-policy-settings.md)
|
- [TPM Group Policy settings](https://docs.microsoft.com/windows/security/information-protection/tpm/trusted-platform-module-services-group-policy-settings)
|
||||||
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md)
|
- [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md)
|
||||||
- [BitLocker](bitlocker-overview.md)
|
- [BitLocker](bitlocker-overview.md)
|
||||||
- [BitLocker Group Policy settings](bitlocker-group-policy-settings.md)
|
- [BitLocker Group Policy settings](bitlocker-group-policy-settings.md)
|
||||||
|
@ -11,10 +11,10 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 03/25/2019
|
ms.date: 04/17/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create a Windows Information Protection (WIP) policy with MDM using the Azure portal for Microsoft Intune
|
# Create a Windows Information Protection (WIP) policy using the Azure portal for Microsoft Intune
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -23,8 +23,17 @@ ms.date: 03/25/2019
|
|||||||
|
|
||||||
Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device.
|
Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune only manages the apps on a user's personal device.
|
||||||
|
|
||||||
>[!NOTE]
|
## Differences between MDM and MAM for WIP
|
||||||
>If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**). the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access. MAM supports only one user per device.
|
|
||||||
|
You can create an app protection policy in Intune either with device enrollment for MDM or without device enrollment for MAM. The process to create either policy is similar, but there are important differences:
|
||||||
|
|
||||||
|
- If the same user and device are targeted for both MDM and MAM, the MDM policy will be applied to devices joined to Azure AD. For personal devices that are workplace-joined (that is, added by using **Settings** > **Email & accounts** > **Add a work or school account**), the MAM-only policy will be preferred but it's possible to upgrade the device management to MDM in **Settings**. Windows Home edition only supports WIP for MAM-only; upgrading to MDM policy on Home edition will revoke WIP-protected data access.
|
||||||
|
- MAM supports only one user per device.
|
||||||
|
- MAM can only manage [enlightened apps](enlightened-microsoft-apps-and-wip.md).
|
||||||
|
- MAM has additional **Access** settings for Windows Hello for Business.
|
||||||
|
- MAM can [selectively wipe company data](https://docs.microsoft.com/intune/apps-selective-wipe) from a user's personal device.
|
||||||
|
- MAM requires an [Azure Active Direcory (Azure AD) Premium license](https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses).
|
||||||
|
- An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM.
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ manager: dansimp
|
|||||||
audience: ITPro
|
audience: ITPro
|
||||||
ms.collection: M365-security-compliance
|
ms.collection: M365-security-compliance
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
ms.date: 04/05/2019
|
ms.date: 04/22/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager
|
# Create and deploy a Windows Information Protection (WIP) policy using System Center Configuration Manager
|
||||||
@ -462,15 +462,6 @@ After you've decided where your protected apps can access enterprise data on you
|
|||||||
**To set your optional settings**
|
**To set your optional settings**
|
||||||
1. Choose to set any or all of the optional settings:
|
1. Choose to set any or all of the optional settings:
|
||||||
|
|
||||||
- **Show the Personal option in the File ownership menus of File Explorer and the Save As dialog box.** Determines whether users can see the Personal option for files within File Explorer and the **Save As** dialog box. The options are:
|
|
||||||
|
|
||||||
- **Yes, or not configured (recommended).** Employees can choose whether a file is **Work** or **Personal** in File Explorer and the **Save As** dialog box.
|
|
||||||
|
|
||||||
- **No.** Hides the **Personal** option from employees. Be aware that if you pick this option, apps that use the **Save As** dialog box might encrypt new files as corporate data unless a different file path is given during the original file creation. After this happens, decryption of work files becomes more difficult.
|
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>The **Show the Personal option in the File ownership menus of File Explorer and the Save As dialog box** option is only available for Configuration Manager versions 1610 and below.
|
|
||||||
|
|
||||||
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
- **Prevent corporate data from being accessed by apps when the device is locked. Applies only to Windows 10 Mobile**. Determines whether to encrypt enterprise data using a key that's protected by an employee's PIN code on a locked device. Apps won't be able to read corporate data when the device is locked. The options are:
|
||||||
|
|
||||||
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
- **Yes (recommended).** Turns on the feature and provides the additional protection.
|
||||||
|
Before Width: | Height: | Size: 46 KiB After Width: | Height: | Size: 10 KiB |
Before Width: | Height: | Size: 40 KiB After Width: | Height: | Size: 44 KiB |
Before Width: | Height: | Size: 44 KiB After Width: | Height: | Size: 66 KiB |