mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Merge pull request #6149 from MandiOhlinger/ado5701356
ADO 5701356: Removing references to Windows Phone
This commit is contained in:
commit
b4ee40b0b9
@ -1,5 +1,10 @@
|
||||
{
|
||||
"redirections": [
|
||||
{
|
||||
"source_path": "windows/client-management/mdm/browserfavorite-csp.md",
|
||||
"redirect_url": "https://support.microsoft.com/windows/windows-phone-8-1-end-of-support-faq-7f1ef0aa-0aaf-0747-3724-5c44456778a3",
|
||||
"redirect_document_id": false
|
||||
},
|
||||
{
|
||||
"source_path": "windows/security/threat-protection/windows-10-mobile-security-guide.md",
|
||||
"redirect_url": "https://support.microsoft.com/windows/windows-10-mobile-end-of-support-faq-8c2dd1cf-a571-00f0-0881-bb83926d05c5",
|
||||
|
@ -1,94 +0,0 @@
|
||||
---
|
||||
title: BrowserFavorite CSP
|
||||
description: Learn how the BrowserFavorite configuration service provider is used to add and remove URLs from the favorites list on a device.
|
||||
ms.assetid: 5d2351ff-2d6a-4273-9b09-224623723cbf
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
ms.author: dansimp
|
||||
ms.topic: article
|
||||
ms.prod: w10
|
||||
ms.technology: windows
|
||||
author: dansimp
|
||||
ms.date: 10/25/2021
|
||||
---
|
||||
|
||||
# BrowserFavorite CSP
|
||||
|
||||
|
||||
The BrowserFavorite configuration service provider is used to add and remove URLs from the favorites list on a device.
|
||||
|
||||
> [!Note]
|
||||
> BrowserFavorite CSP is only supported in Windows Phone 8.1.
|
||||
|
||||
|
||||
|
||||
The BrowserFavorite configuration service provider manages only the favorites at the root favorite folder level. It does not manage subfolders under the root favorite folder nor does it manage favorites under a subfolder.
|
||||
|
||||
> [!Note]
|
||||
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_INTERNET\_EXPLORER\_FAVORITES capabilities to be accessed from a network configuration application.
|
||||
|
||||
|
||||
|
||||
The following shows the BrowserFavorite configuration service provider in tree format as used by Open Mobile Alliance Device (OMA) Client Provisioning. The OMA Device Management protocol is not supported with this configuration service provider.
|
||||
|
||||
```console
|
||||
BrowserFavorite
|
||||
favorite name
|
||||
----URL
|
||||
```
|
||||
|
||||
<a href="" id="favorite-name-------------"></a>***favorite name***
|
||||
Required. Specifies the user-friendly name of the favorite URL that is displayed in the Favorites list of Internet Explorer.
|
||||
|
||||
> [!Note]
|
||||
> The *favorite name* should contain only characters that are valid in the Windows file system. The invalid characters are: \\ / : \* ? " < > |
|
||||
|
||||
|
||||
|
||||
Adding the same favorite twice adds only one occurrence to the Favorites list. If a favorite is added when another favorite with the same name but a different URL is already in the Favorites list, the existing favorite is replaced with the new favorite.
|
||||
|
||||
<a href="" id="url"></a>**URL**
|
||||
Optional. Specifies the complete URL for the favorite.
|
||||
|
||||
## OMA client provisioning examples
|
||||
|
||||
|
||||
Adding a new browser favorite.
|
||||
|
||||
```xml
|
||||
<?xml version="1.0" encoding="UTF-8" ?>
|
||||
<wap-provisioningdoc>
|
||||
<characteristic type="BrowserFavorite">
|
||||
<characteristic type="Help and how-to">
|
||||
<parm name="URL" value="http://www.microsoft.com/windowsphone/en-US/howto/wp7/default.aspx"/>
|
||||
</characteristic>
|
||||
</characteristic>
|
||||
</wap-provisioningdoc>
|
||||
```
|
||||
|
||||
## Microsoft Custom Elements
|
||||
|
||||
|
||||
The following table shows the Microsoft custom elements that this configuration service provider supports for OMA Client Provisioning.
|
||||
|
||||
|Elements|Available|
|
||||
|--- |--- |
|
||||
|Parm-query|Yes|
|
||||
|Noparm|Yes|
|
||||
|Nocharacteristic|Yes|
|
||||
|Characteristic-query|Yes<br> <br>Recursive query: Yes<br> <br>Top-level query: Yes|
|
||||
|
||||
## Related topics
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -227,11 +227,11 @@ Optional. Specifies where to keep the private key.
|
||||
|
||||
The data type is an integer corresponding to one of the following values:
|
||||
|
||||
| Value | Description |
|
||||
|-------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| 1 | Private key protected by TPM. |
|
||||
| 2 | Private key protected by phone TPM if the device supports TPM. All Windows Phone 8.1 devices support TPM and will treat value 2 as 1. |
|
||||
| 3 | (Default) Private key saved in software KSP. |
|
||||
| Value | Description |
|
||||
|---|---|
|
||||
| 1 | Private key protected by TPM. |
|
||||
| 2 | Private key protected by phone TPM if the device supports TPM. |
|
||||
| 3 | (Default) Private key saved in software KSP. |
|
||||
| 4 | Private key protected by Windows Hello for Business (formerly known as Microsoft Passport for Work). If this option is specified, the ContainerName must be specified, otherwise enrollment will fail. |
|
||||
|
||||
Supported operations are Add, Get, Delete, and Replace.
|
||||
@ -361,7 +361,7 @@ The date type format is Null, meaning this node doesn’t contain a value.
|
||||
The only supported operation is Execute.
|
||||
|
||||
<a href="" id="clientcertificateinstall-scep-uniqueid-install-aadkeyidentifierlist"></a>**ClientCertificateInstall/SCEP/*UniqueID*/Install/AADKeyIdentifierList**
|
||||
Optional. Specify the AAD Key Identifier List as a list of semicolon separated values. On Enroll, the values in this list are validated against the AAD Key present on the device. If no match is found, enrollment will fail.
|
||||
Optional. Specify the Azure AD Key Identifier List as a list of semicolon separated values. On Enroll, the values in this list are validated against the Azure AD Key present on the device. If no match is found, enrollment will fail.
|
||||
|
||||
Data type is string.
|
||||
|
||||
|
@ -556,21 +556,22 @@ Supported operations are Get, Add, Delete, Replace.</Description>
|
||||
</AccessType>
|
||||
<DefaultValue>3</DefaultValue>
|
||||
<Description>Optional. Specify where to keep the private key. Note that even it is protected by TPM, it is not guarded with TPM PIN.
|
||||
SCEP enrolled cert doesn’t support TPM PIN protection.
|
||||
Supported values:
|
||||
|
||||
SCEP enrolled cert doesn’t support TPM PIN protection. Supported values:
|
||||
|
||||
1 – private key protected by TPM,
|
||||
|
||||
2 – private key protected by phone TPM if the device supports TPM.
|
||||
All Windows Phone 8.1 devices support TPM and will treat value 2 as 1
|
||||
|
||||
3 (default) – private key saved in software KSP
|
||||
|
||||
4 – private key protected by NGC. If this option is specified, container name should be specifed, if not enrollment will fail
|
||||
4 – private key protected by NGC. If this option is specified, container name should be specified, if not enrollment will fail.
|
||||
|
||||
|
||||
Format is int.
|
||||
|
||||
Supported operations are Get, Add, Delete, Replace
|
||||
|
||||
</Description>
|
||||
<DFFormat>
|
||||
<int />
|
||||
|
@ -15,7 +15,7 @@ ms.collection: highpri
|
||||
|
||||
# Configuration service provider reference
|
||||
|
||||
A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot.
|
||||
A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the device image as a `.provxml` file that is installed during boot.
|
||||
|
||||
For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](/windows/win32/dmwmibridgeprov/mdm-bridge-wmi-provider-portal). For CSP DDF files, see [CSP DDF files download](#csp-ddf-files-download).
|
||||
|
||||
@ -150,18 +150,6 @@ Additional lists:
|
||||
<!--EndSKU-->
|
||||
<!--EndCSP-->
|
||||
|
||||
<!--StartCSP-->
|
||||
[BrowserFavorite CSP](browserfavorite-csp.md)
|
||||
|
||||
<!--StartSKU-->
|
||||
|
||||
|Home|Pro|Business|Enterprise|Education|
|
||||
|--- |--- |--- |--- |--- |
|
||||
|No|No|No|No|No|
|
||||
|
||||
<!--EndSKU-->
|
||||
<!--EndCSP-->
|
||||
|
||||
<!--StartCSP-->
|
||||
[CMPolicy CSP](cmpolicy-csp.md)
|
||||
|
||||
|
@ -25,7 +25,7 @@ ms.date: 06/26/2017
|
||||
# DMProcessConfigXMLFiltered function
|
||||
|
||||
> [!Important]
|
||||
> The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. For more information about the new process for provisioning connectivity configuration, see [Connectivity configuration](/previous-versions//dn757424(v=vs.85)). However, this function is still supported for other OEM uses.
|
||||
> The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. For more information about the new process for provisioning connectivity configuration, see [Connectivity configuration](/previous-versions//dn757424(v=vs.85)). However, this function is still supported for other OEM uses.
|
||||
|
||||
|
||||
Configures phone settings by using OMA Client Provisioning XML. Use of this function is strictly limited to the following scenarios.
|
||||
@ -45,7 +45,7 @@ Microsoft recommends that this function isn't used to configure the following ty
|
||||
- Email settings
|
||||
|
||||
> [!Note]
|
||||
> The **DMProcessConfigXMLFiltered** function has full functionality in Windows Phone 8.1, but it has a read-only functionality in Windows 10.
|
||||
> The **DMProcessConfigXMLFiltered** function has full functionality in Windows Phone 8.1, but it has a read-only functionality in Windows 10.
|
||||
|
||||
|
||||
|
||||
@ -54,37 +54,29 @@ Microsoft recommends that this function isn't used to configure the following ty
|
||||
```C++
|
||||
HRESULT STDAPICALLTYPE DMProcessConfigXMLFiltered(
|
||||
LPCWSTR pszXmlIn,
|
||||
const WCHAR **rgszAllowedCspNode,
|
||||
const DWORD dwNumAllowedCspNodes,
|
||||
BSTR *pbstrXmlOut
|
||||
const WCHAR **rgszAllowedCspNode,
|
||||
const DWORD dwNumAllowedCspNodes,
|
||||
BSTR *pbstrXmlOut
|
||||
);
|
||||
```
|
||||
|
||||
## Parameters
|
||||
|
||||
*pszXmlIn*
|
||||
<ul>
|
||||
<li>[in] The null–terminated input XML buffer containing the configuration data. The parameter holds the XML that will be used to configure the phone. <strong>DMProcessConfigXMLFiltered</strong> accepts only OMA Client Provisioning XML (also known as WAP provisioning). It doesn't accept OMA DM SyncML XML (also known as SyncML).</li>
|
||||
</ul>
|
||||
<br>
|
||||
|
||||
- [in] The null–terminated input XML buffer containing the configuration data. The parameter holds the XML that will be used to configure the phone. **DMProcessConfigXMLFiltered** accepts only OMA Client Provisioning XML (also known as WAP provisioning). It doesn't accept OMA DM SyncML XML (also known as SyncML).
|
||||
|
||||
*rgszAllowedCspNode*
|
||||
<ul>
|
||||
<li>[in] Array of <strong>WCHAR\</strong>* that specify which configuration service provider nodes can be invoked.</li>
|
||||
</ul>
|
||||
<br>
|
||||
|
||||
- [in] Array of `WCHAR` that specify which configuration service provider nodes can be invoked.
|
||||
|
||||
*dwNumAllowedCspNodes*
|
||||
<ul>
|
||||
<li>[in] Number of elements passed in <em>rgszAllowedCspNode</em>.</li>
|
||||
</ul>
|
||||
<br>
|
||||
|
||||
- [in] Number of elements passed in <em>rgszAllowedCspNode</em>.
|
||||
|
||||
*pbstrXmlOut*
|
||||
<ul>
|
||||
<li>[out] The resulting null–terminated XML from configuration. The caller of <strong>DMProcessConfigXMLFiltered</strong> is responsible for cleanup of the output buffer that the <em>pbstrXmlOut</em> parameter references. Use <a href="/windows/win32/api/oleauto/nf-oleauto-sysfreestring" data-raw-source="[**SysFreeString**](/windows/win32/api/oleauto/nf-oleauto-sysfreestring)"><strong>SysFreeString</strong></a> to free the memory.</li>
|
||||
</ul>
|
||||
<br>
|
||||
|
||||
- [out] The resulting null–terminated XML from configuration. The caller of **DMProcessConfigXMLFiltered** is responsible for cleanup of the output buffer that the <em>pbstrXmlOut</em> parameter references. Use <a href="/windows/win32/api/oleauto/nf-oleauto-sysfreestring" data-raw-source="[**SysFreeString**](/windows/win32/api/oleauto/nf-oleauto-sysfreestring)">**SysFreeString**</a> to free the memory.
|
||||
|
||||
If **DMProcessConfigXMLFiltered** retrieves a document, the *pbstrXmlOut* holds the XML output (in string form) of the provisioning operations. If **DMProcessConfigXMLFiltered** returns a failure, the XML output often contains "error nodes" that indicate which elements of the original XML failed. If the input document doesn't contain queries and is successfully processed, the output document should resemble the input document. In some error cases, no output is returned.
|
||||
|
||||
|
@ -16,9 +16,9 @@ ms.date: 07/28/2017
|
||||
|
||||
This section provides an example of the mobile device enrollment protocol using federated authentication policy. When the authentication policy is set to Federated, the web authentication broker is leveraged by the enrollment client to get a security token. The enrollment client calls the web authentication broker API within the response message to start the process. The server should build the web authentication broker pages to fit the device screen and should be consistent with the existing enrollment UI. The opaque security token that is returned from the broker as an end page is used by the enrollment client as the device security secret during the client certificate request call.
|
||||
|
||||
The <AuthenticationServiceURL> element the discovery response message specifies web authentication broker page start URL.
|
||||
The `<AuthenticationServiceURL>` element the discovery response message specifies web authentication broker page start URL.
|
||||
|
||||
For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](/openspecs/windows_protocols/ms-mde2/4d7eadd5-3951-4f1c-8159-c39e07cbe692).
|
||||
For details about the Microsoft mobile device enrollment protocol for Windows 10, see [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2](/openspecs/windows_protocols/ms-mde2/4d7eadd5-3951-4f1c-8159-c39e07cbe692).
|
||||
|
||||
## In this topic
|
||||
|
||||
@ -26,7 +26,7 @@ For details about the Microsoft mobile device enrollment protocol for Windows 1
|
||||
[Enrollment policy web service](#enrollment-policy-web-service)
|
||||
[Enrollment web service](#enrollment-web-service)
|
||||
|
||||
For the list of enrollment scenarios not supported in Windows 10, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
||||
For the list of enrollment scenarios not supported in Windows 10, see [Enrollment scenarios not supported](mobile-device-enrollment.md#enrollment-scenarios-not-supported).
|
||||
|
||||
## Discovery service
|
||||
|
||||
@ -35,7 +35,7 @@ The discovery web service provides the configuration information necessary for a
|
||||
> [!NOTE]
|
||||
> The administrator of the discovery service must create a host with the address enterpriseenrollment.*domain\_name*.com.
|
||||
|
||||
The automatic discovery flow of the device uses the domain name of the email address that was submitted to the Workplace settings screen during sign in. The automatic discovery system constructs a URI that uses this hostname by appending the subdomain “enterpriseenrollment” to the domain of the email address, and by appending the path “/EnrollmentServer/Discovery.svc”. For example, if the email address is “sample@contoso.com”, the resulting URI for first Get request would be: http:<span></span>//enterpriseenrollment.contoso.com/EnrollmentServer/Discovery.svc
|
||||
The automatic discovery flow of the device uses the domain name of the email address that was submitted to the Workplace settings screen during sign in. The automatic discovery system constructs a URI that uses this hostname by appending the subdomain “enterpriseenrollment” to the domain of the email address, and by appending the path “/EnrollmentServer/Discovery.svc”. For example, if the email address is “sample@contoso.com”, the resulting URI for first Get request would be: `http://enterpriseenrollment.contoso.com/EnrollmentServer/Discovery.svc`.
|
||||
|
||||
The first request is a standard HTTP GET request.
|
||||
|
||||
@ -146,7 +146,7 @@ A new XML tag, AuthenticationServiceUrl, is introduced in the DiscoveryResponse
|
||||
|
||||
The following are the explicit requirements for the server.
|
||||
|
||||
- The <DiscoveryResponse><AuthenticationServiceUrl> element must support HTTPS.
|
||||
- The `<DiscoveryResponse>``<AuthenticationServiceUrl>` element must support HTTPS.
|
||||
- The authentication server must use a device trusted root certificate. Otherwise, the WAP call will fail.
|
||||
- WP doesn’t support Windows Integrated Authentication (WIA) for ADFS during WAB authentication. ADFS 2012 R2 if used needs to be configured to not attempt WIA for Windows device.
|
||||
|
||||
@ -156,8 +156,8 @@ The enrollment client issues an HTTPS request as follows:
|
||||
AuthenticationServiceUrl?appru=<appid>&login_hint=<User Principal Name>
|
||||
```
|
||||
|
||||
- <appid> is of the form ms-app://string
|
||||
- <User Principal Name> is the name of the enrolling user, for example, user@constoso.com as input by the user in an enrollment sign in page. The value of this attribute serves as a hint that can be used by the authentication server as part of the authentication.
|
||||
- `<appid>` is of the form ms-app://string
|
||||
- `<User Principal Name>` is the name of the enrolling user, for example, user@constoso.com as input by the user in an enrollment sign in page. The value of this attribute serves as a hint that can be used by the authentication server as part of the authentication.
|
||||
|
||||
After authentication is complete, the auth server should return an HTML form document with a POST method action of appid identified in the query string parameter.
|
||||
|
||||
@ -191,7 +191,7 @@ Content-Length: 556
|
||||
</html>
|
||||
```
|
||||
|
||||
The server has to send a POST to a redirect URL of the form ms-app://string (the URL scheme is ms-app) as indicated in the POST method action. The security token value is the base64-encoded string "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary" contained in the <wsse:BinarySecurityToken> EncodingType attribute. Windows does the binary encode when it sends it back to enrollment server, in the form it is just HTML encoded. This string is opaque to the enrollment client; the client does not interpret the string.
|
||||
The server has to send a POST to a redirect URL of the form ms-app://string (the URL scheme is ms-app) as indicated in the POST method action. The security token value is the base64-encoded string `http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary` contained in the `<wsse:BinarySecurityToken>` EncodingType attribute. Windows does the binary encode when it sends it back to enrollment server, in the form it is just HTML encoded. This string is opaque to the enrollment client; the client does not interpret the string.
|
||||
|
||||
The following example shows a response received from the discovery web service which requires authentication via WAB.
|
||||
|
||||
@ -235,18 +235,18 @@ Policy service is optional. By default, if no policies are specified, the minimu
|
||||
|
||||
This web service implements the X.509 Certificate Enrollment Policy Protocol (MS-XCEP) specification that allows customizing certificate enrollment to match different security needs of enterprises at different times (cryptographic agility). The service processes the GetPolicies message from the client, authenticates the client, and returns matching enrollment policies in the GetPoliciesResponse message.
|
||||
|
||||
For Federated authentication policy, the security token credential is provided in a request message using the <wsse:BinarySecurityToken> element \[WSS\]. The security token is retrieved as described in the discovery response section. The authentication information is as follows:
|
||||
For Federated authentication policy, the security token credential is provided in a request message using the `<wsse:BinarySecurityToken>` element \[WSS\]. The security token is retrieved as described in the discovery response section. The authentication information is as follows:
|
||||
|
||||
- wsse:Security: The enrollment client implements the <wsse:Security> element defined in \[WSS\] section 5. The <wsse:Security> element must be a child of the <s:Header> element.
|
||||
- wsse:BinarySecurityToken: The enrollment client implements the <wsse:BinarySecurityToken> element defined in \[WSS\] section 6.3. The <wsse:BinarySecurityToken> element must be included as a child of the <wsse:Security> element in the SOAP header.
|
||||
- wsse:Security: The enrollment client implements the `<wsse:Security>` element defined in \[WSS\] section 5. The `<wsse:Security>` element must be a child of the `<s:Header>` element.
|
||||
- wsse:BinarySecurityToken: The enrollment client implements the `<wsse:BinarySecurityToken>` element defined in \[WSS\] section 6.3. The `<wsse:BinarySecurityToken>` element must be included as a child of the `<wsse:Security>` element in the SOAP header.
|
||||
|
||||
As was described in the discovery response section, the inclusion of the <wsse:BinarySecurityToken> element is opaque to the enrollment client, and the client does not interpret the string, and the inclusion of the element is agreed upon by the security token authentication server (as identified in the <AuthenticationServiceUrl> element of <DiscoveryResponse> and the enterprise server.
|
||||
As was described in the discovery response section, the inclusion of the `<wsse:BinarySecurityToken>` element is opaque to the enrollment client, and the client does not interpret the string, and the inclusion of the element is agreed upon by the security token authentication server (as identified in the `<AuthenticationServiceUrl>` element of `<DiscoveryResponse>` and the enterprise server.
|
||||
|
||||
The <wsse:BinarySecurityToken> element contains a base64-encoded string. The enrollment client uses the security token received from the authentication server and base64-encodes the token to populate the <wsse:BinarySecurityToken> element.
|
||||
The `<wsse:BinarySecurityToken>` element contains a base64-encoded string. The enrollment client uses the security token received from the authentication server and base64-encodes the token to populate the `<wsse:BinarySecurityToken>` element.
|
||||
|
||||
- wsse:BinarySecurityToken/attributes/ValueType: The `<wsse:BinarySecurityToken>` ValueType attribute must be "http:<span></span>//schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken".
|
||||
- wsse:BinarySecurityToken/attributes/ValueType: The `<wsse:BinarySecurityToken>` ValueType attribute must be `http://schemas.microsoft.com/5.0.0.0/ConfigurationManager/Enrollment/DeviceEnrollmentUserToken`.
|
||||
|
||||
- wsse:BinarySecurityToken/attributes/EncodingType: The `<wsse:BinarySecurityToken>` EncodingType attribute must be "http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary".
|
||||
- wsse:BinarySecurityToken/attributes/EncodingType: The `<wsse:BinarySecurityToken>` EncodingType attribute must be `http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd\#base64binary`.
|
||||
|
||||
The following is an enrollment policy request example with a received security token as client credential.
|
||||
|
||||
@ -478,7 +478,7 @@ After validating the request, the web service looks up the assigned certificate
|
||||
> [!Note]
|
||||
> The HTTP server response must not set Transfer-Encoding to Chunked; it must be sent as one message.
|
||||
|
||||
Similar to the TokenType in the RST, the RSTR will use a custom ValueType in the BinarySecurityToken (http:<span></span>//schemas.microsoft.com/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc), because the token is more than an X.509 v3 certificate.
|
||||
Similar to the TokenType in the RST, the RSTR will use a custom ValueType in the BinarySecurityToken (`http://schemas.microsoft.com/ConfigurationManager/Enrollment/DeviceEnrollmentProvisionDoc`), because the token is more than an X.509 v3 certificate.
|
||||
|
||||
The provisioning XML contains:
|
||||
|
||||
@ -616,7 +616,7 @@ The following code shows sample provisioning XML (presented in the preceding pac
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> - <Parm name> and <characteristic type=> elements in the w7 APPLICATION CSP XML are case sensitive and must be all uppercase.
|
||||
> - `<Parm name>` and `<characteristic type=>` elements in the w7 APPLICATION CSP XML are case sensitive and must be all uppercase.
|
||||
>
|
||||
> - In w7 APPLICATION characteristic, both CLIENT and APPSRV credentials should be provided in XML.
|
||||
>
|
||||
|
@ -57,7 +57,7 @@ The XML below is the current version for this CSP.
|
||||
<Add />
|
||||
<Delete />
|
||||
</AccessType>
|
||||
<Description>Group settings per DM server. Each group of settings is distinguished by the server's Provider ID. It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process. In Windows Phone 8, only one enterprise management server is supported. That is, there should be only one ProviderID node under NodeCache.</Description>
|
||||
<Description>Group settings per DM server. Each group of settings is distinguished by the server's Provider ID. It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
@ -282,7 +282,7 @@ The XML below is the current version for this CSP.
|
||||
<Add />
|
||||
<Delete />
|
||||
</AccessType>
|
||||
<Description>Group settings per DM server. Each group of settings is distinguished by the server's Provider ID. It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process. In Windows Phone 8, only one enterprise management server is supported. That is, there should be only one ProviderID node under NodeCache.</Description>
|
||||
<Description>Group settings per DM server. Each group of settings is distinguished by the server's Provider ID. It should be the same DM server PROVIDER-ID value that was supplied through the w7 APPLICATION configuration service provider XML during the enrollment process.</Description>
|
||||
<DFFormat>
|
||||
<node />
|
||||
</DFFormat>
|
||||
|
@ -580,7 +580,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
|
||||
The following list shows the supported values:
|
||||
|
||||
- An integer X where 0 <= X <= 999.
|
||||
- 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined."
|
||||
- 0 (default) - No timeout is defined.
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
@ -149,8 +149,6 @@ items:
|
||||
items:
|
||||
- name: BitLocker DDF file
|
||||
href: bitlocker-ddf-file.md
|
||||
- name: BrowserFavorite CSP
|
||||
href: browserfavorite-csp.md
|
||||
- name: CellularSettings CSP
|
||||
href: cellularsettings-csp.md
|
||||
- name: CertificateStore CSP
|
||||
|
@ -19,11 +19,12 @@ Use an **APPLICATION** configuration service provider that has an APPID of w4 to
|
||||
|
||||
The default security roles are defined in the root characteristic, and map to each subnode unless specific permission is granted to the subnode. The default security roles are Manager, Operator, and Operator – TPS.
|
||||
|
||||
> **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_W4\_APPLICATION capabilities to be accessed from a network configuration application.
|
||||
> [!NOTE]
|
||||
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_W4\_APPLICATION capabilities to be accessed from a network configuration application.
|
||||
|
||||
The following shows the configuration service provider in tree format as used by OMA Client Provisioning.
|
||||
|
||||
```console
|
||||
```cmd
|
||||
APPLICATION
|
||||
----APPID
|
||||
----NAME
|
||||
@ -45,11 +46,10 @@ This parameter takes a string value. The possible values to configure the NAME p
|
||||
|
||||
- no value specified
|
||||
|
||||
> **Note** MDM servers should resend APPLICATION/NAME to DMAcc after an upgrade because this value is displayed in the UI but not saved in Windows Phone 8.1 and cannot be migrated to Windows 10.
|
||||
> [!NOTE]
|
||||
> The APPLICATION/NAME value is displayed in the UI. The APPLICATION/NAME value might not be saved on the device. So after an upgrade, the MDM servers should resend APPLICATION/NAME to DMAcc.
|
||||
|
||||
|
||||
|
||||
If no value is specified, the registry location will default to <unnamed>.
|
||||
If no value is specified, the registry location will default to `<unnamed>`.
|
||||
|
||||
If `Name` is greater than 40 characters, it will be truncated to 40 characters.
|
||||
|
||||
@ -77,13 +77,3 @@ Optional. The maximum authorized size, in KB, for multimedia content. This param
|
||||
|
||||
|
||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: New policies for Windows 10 (Windows 10)
|
||||
description: Learn how Windows 10 includes new policies for management, like Group Policy settings for the Windows system and components.
|
||||
description: Learn how Windows 10 includes new policies for management, like Group Policy settings for the Windows system and components.
|
||||
ms.assetid: 1F24ABD8-A57A-45EA-BA54-2DA2238C573D
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
@ -20,8 +20,8 @@ ms.topic: reference
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
- Windows 10
|
||||
- Windows 11
|
||||
|
||||
As of September 2020 This page will no longer be updated. To find the Group Polices that ship in each version of Windows, refer to the Group Policy Settings Reference Spreadsheet. You can always locate the most recent version of the Spreadsheet by searching the Internet for "Windows Version + Group Policy Settings Reference".
|
||||
|
||||
@ -57,7 +57,7 @@ The following Group Policy settings were added in Windows 10, version 1903:
|
||||
- Windows Components\Remote Desktop Services\Remote Desktop Session Host\Remote Session Environment\Use WDDM graphics display driver for Remote Desktop Connections
|
||||
- Windows Components\Windows Logon Options\Configure the mode of automatically signing in and locking last interactive user after a restart or cold boot
|
||||
|
||||
## New Group Policy settings in Windows 10, version 1809
|
||||
## New Group Policy settings in Windows 10, version 1809
|
||||
|
||||
The following Group Policy settings were added in Windows 10, version 1809:
|
||||
|
||||
@ -242,7 +242,7 @@ The following Group Policy settings were added in Windows 10, version 1809:
|
||||
- Network\Windows Connection Manager\Enable Windows to soft-disconnect a computer from a network
|
||||
|
||||
|
||||
## New Group Policy settings in Windows 10, version 1803
|
||||
## New Group Policy settings in Windows 10, version 1803
|
||||
|
||||
The following Group Policy settings were added in Windows 10, version 1803:
|
||||
|
||||
@ -282,7 +282,7 @@ The following Group Policy settings were added in Windows 10, version 1803:
|
||||
- Windows Components\Windows Defender Security Center\Virus and threat protection\Hide the Ransomware data recovery area
|
||||
|
||||
|
||||
## New Group Policy settings in Windows 10, version 1709
|
||||
## New Group Policy settings in Windows 10, version 1709
|
||||
|
||||
The following Group Policy settings were added in Windows 10, version 1709:
|
||||
|
||||
@ -351,7 +351,7 @@ The following Group Policy settings were added in Windows 10, version 1709:
|
||||
- Windows Components\Windows Update\Do not allow update deferral policies to cause scans against Windows Update
|
||||
|
||||
|
||||
## New Group Policy settings in Windows 10, version 1703
|
||||
## New Group Policy settings in Windows 10, version 1703
|
||||
|
||||
The following Group Policy settings were added in Windows 10, version 1703:
|
||||
|
||||
@ -481,10 +481,9 @@ For a spreadsheet of Group Policy settings included in Windows 10 and Windows Se
|
||||
|
||||
## New MDM policies
|
||||
|
||||
Mobile device management (MDM) for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education include previous Windows Phone settings, and new or enhanced settings for Windows 10, such as:
|
||||
|
||||
Mobile device management (MDM) for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education includes settings from Windows Phone 8.1, plus new or enhanced settings for Windows 10, such as:
|
||||
|
||||
- Defender (Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education only)
|
||||
- Defender (Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education only)
|
||||
|
||||
- Enhanced Bluetooth policies
|
||||
|
||||
@ -508,7 +507,7 @@ Mobile device management (MDM) for Windows 10 Pro, Windows 10 Enterprise, and
|
||||
|
||||
Windows 10, version 1703, adds a number of [ADMX-backed policies to MDM](./mdm/policy-configuration-service-provider.md).
|
||||
|
||||
If you use Microsoft Intune for MDM, you can [configure custom policies](https://go.microsoft.com/fwlink/p/?LinkId=616316) to deploy Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings that can be used to control features on Windows 10. For a list of OMA-URI settings, see [Custom URI settings for Windows 10 devices](https://go.microsoft.com/fwlink/p/?LinkId=616317).
|
||||
If you use Microsoft Intune for MDM, you can [configure custom policies](https://go.microsoft.com/fwlink/p/?LinkId=616316) to deploy Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings that can be used to control features on Windows 10. For a list of OMA-URI settings, see [Custom URI settings for Windows 10 devices](https://go.microsoft.com/fwlink/p/?LinkId=616317).
|
||||
|
||||
No new [Exchange ActiveSync policies](/exchange/mobile-device-mailbox-policies-exchange-2013-help). For more information, see the [ActiveSync configuration service provider](./mdm/activesync-csp.md) technical reference.
|
||||
|
||||
@ -519,7 +518,3 @@ No new [Exchange ActiveSync policies](/exchange/mobile-device-mailbox-policies-e
|
||||
[Manage corporate devices](manage-corporate-devices.md)
|
||||
|
||||
[Changes to Group Policy settings for Start in Windows 10](/windows/configuration/changes-to-start-policies-in-windows-10)
|
||||
|
||||
|
||||
|
||||
|
@ -19,26 +19,28 @@ ms.topic: article
|
||||
|
||||
**Applies to**
|
||||
|
||||
- Windows 10 version 1709 and older
|
||||
- Windows 10 version 1709 and older
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Beginning with Windows 10, version 1803, Wifi-Sense is no longer available. The following information only applies to Windows 10, version 1709 and prior. Please see [Connecting to open Wi-Fi hotspots in Windows 10](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) for more details.
|
||||
> [!IMPORTANT]
|
||||
> Beginning with Windows 10, version 1803, Wifi-Sense is no longer available. The following information only applies to Windows 10, version 1709 and prior. Please see [Connecting to open Wi-Fi hotspots in Windows 10](https://privacy.microsoft.com/windows-10-open-wi-fi-hotspots) for more details.
|
||||
|
||||
Wi-Fi Sense learns about open Wi-Fi hotspots your Windows PC or Windows phone connects to by collecting information about the network, like whether the open Wi-Fi network has a high-quality connection to the Internet. By using that information from your device and from other Wi-Fi Sense customers' devices too, Wi-Fi Sense builds a database of these high-quality networks. When you’re in range of one of these Wi-Fi hotspots, you automatically get connected to it.
|
||||
Wi-Fi Sense learns about open Wi-Fi hotspots your Windows device by collecting information about the network, like whether the open Wi-Fi network has a high-quality connection to the Internet. By using that information from your device and from other Wi-Fi Sense customers' devices too, Wi-Fi Sense builds a database of these high-quality networks. When you’re in range of one of these Wi-Fi hotspots, you automatically get connected to it.
|
||||
|
||||
The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your PC with Windows 10.
|
||||
The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your device with Windows 10.
|
||||
|
||||
**Note**<br>Wi-Fi Sense isn’t available in all countries or regions.
|
||||
> [!NOTE]
|
||||
> >Wi-Fi Sense isn’t available in all countries or regions.
|
||||
|
||||
## How does Wi-Fi Sense work?
|
||||
Wi-Fi Sense connects your employees to open Wi-Fi networks. Typically, these are the open (no password required) Wi-Fi hotspots you see when you’re out and about.
|
||||
|
||||
## How to manage Wi-Fi Sense in your company
|
||||
In a company environment, you will most likely deploy Windows 10 to your employees' PCs using your preferred deployment method and then manage their settings globally. With that in mind, you have a few options for managing how your employees will use Wi-Fi Sense.
|
||||
In a company environment, you will most likely deploy Windows 10 to your employees' devices using your preferred deployment method and then manage their settings globally. With that in mind, you have a few options for managing how your employees will use Wi-Fi Sense.
|
||||
|
||||
**Important**<br>Turning off Wi-Fi Sense stops employees from connecting automatically to open hotspots.
|
||||
> [!IMPORTANT]
|
||||
> Turning off Wi-Fi Sense stops employees from connecting automatically to open hotspots.
|
||||
|
||||
### Using Group Policy (available starting with Windows 10, version 1511)
|
||||
### Using Group Policy (available starting with Windows 10, version 1511)
|
||||
You can manage your Wi-Fi Sense settings by using Group Policy and your Group Policy editor.
|
||||
|
||||
**To set up Wi-Fi Sense using Group Policy**
|
||||
@ -57,7 +59,8 @@ You can manage your Wi-Fi Sense settings by using registry keys and the Registry
|
||||
1. Open your Registry Editor and go to `HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config\`
|
||||
|
||||
2. Create and set a new **DWORD (32-bit) Value** named, **AutoConnectAllowedOEM**, with a **Value data** of **0 (zero)**.
|
||||
<p>Setting this value to <strong>0</strong> turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the <strong>Wi-Fi Settings</strong> screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see <a href="/troubleshoot/windows-client/networking/configure-wifi-sense-and-paid-wifi-service" data-raw-source="[How to configure Wi-Fi Sense on Windows 10 in an enterprise](/troubleshoot/windows-client/networking/configure-wifi-sense-and-paid-wifi-service)">How to configure Wi-Fi Sense on Windows 10 in an enterprise</a>.
|
||||
|
||||
Setting this value to `0` turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings** screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see [How to configure Wi-Fi Sense on Windows 10 in an enterprise](/troubleshoot/windows-client/networking/configure-wifi-sense-and-paid-wifi-service).
|
||||
|
||||

|
||||
|
||||
@ -67,7 +70,8 @@ You can manage your Wi-Fi Sense settings by changing the Windows provisioning se
|
||||
**To set up Wi-Fi Sense using WiFISenseAllowed**
|
||||
|
||||
- Change the Windows Provisioning setting, **WiFISenseAllowed**, to **0**.
|
||||
<p>Setting this value to <strong>0</strong> turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the <strong>Wi-Fi Settings</strong> screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Windows Provisioning settings reference topic, <a href="/windows/configuration/wcd/wcd-connectivityprofiles#wifisense" data-raw-source="[WiFiSenseAllowed](./wcd/wcd-connectivityprofiles.md#wifisense)">WiFiSenseAllowed</a>.
|
||||
|
||||
Setting this value to `0` turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings** screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Windows Provisioning settings reference topic, [WiFiSenseAllowed](./wcd/wcd-connectivityprofiles.md#wifisense).
|
||||
|
||||
### Using Unattended Windows Setup settings
|
||||
If your company still uses Unattend, you can manage your Wi-Fi Sense settings by changing the Unattended Windows Setup setting, **WiFiSenseAllowed**.
|
||||
@ -75,24 +79,24 @@ If your company still uses Unattend, you can manage your Wi-Fi Sense settings by
|
||||
**To set up Wi-Fi Sense using WiFISenseAllowed**
|
||||
|
||||
- Change the Unattended Windows Setup setting, **WiFISenseAllowed**, to **0**.
|
||||
<p>Setting this value to <strong>0</strong> turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the <strong>Wi-Fi Settings</strong> screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Unattended Windows Setup Reference topic, <a href="/previous-versions//mt186511(v=vs.85)" data-raw-source="[WiFiSenseAllowed](/previous-versions//mt186511(v=vs.85))">WiFiSenseAllowed</a>.
|
||||
|
||||
Setting this value to `0` turns off Wi-Fi Sense and all Wi-Fi sense features. When turned off, the Wi-Fi Sense settings still appear on the **Wi-Fi Settings</strong> screen, but can't be controlled by the employee and all of the Wi-Fi Sense features are turned off. For more info, see the Unattended Windows Setup Reference topic, [WiFiSenseAllowed](/previous-versions//mt186511(v=vs.85)).
|
||||
|
||||
### How employees can change their own Wi-Fi Sense settings
|
||||
If you don’t turn off the ability for your employees to use Wi-Fi Sense, they can turn it on locally by selecting **Settings > Network & Internet > Wi-Fi > Manage Wi-Fi settings**, and then turning on **Connect to suggested open hotspots**.
|
||||
If you don’t turn off the ability for your employees to use Wi-Fi Sense, they can turn it on locally by selecting **Settings > Network & Internet > Wi-Fi > Manage Wi-Fi settings**, and then turning on **Connect to suggested open hotspots**.
|
||||
|
||||

|
||||
|
||||
**Important**<br>The service that was used to share networks with Facebook friends, Outlook.com contacts, or Skype contacts is no longer available. This means:
|
||||
> [!IMPORTANT]
|
||||
> The service that was used to share networks with Facebook friends, Outlook.com contacts, or Skype contacts is no longer available. This means:
|
||||
|
||||
The **Connect to networks shared by my contacts** setting will still appear in **Settings > Network & Internet > Wi-Fi > Manage Wi-Fi settings** on your PC and in **Settings > Network & wireless > Wi‑Fi > Wi‑Fi Sense** on your phone. However, this setting will have no effect now. Regardless of what it’s set to, networks won’t be shared with your contacts. Your contacts won’t be connected to networks you’ve shared with them, and you won’t be connected to networks they’ve shared with you.
|
||||
The **Connect to networks shared by my contacts** setting will still appear in **Settings > Network & Internet > Wi-Fi > Manage Wi-Fi settings** on your device. However, this setting will have no effect now. Regardless of what it’s set to, networks won’t be shared with your contacts. Your contacts won’t be connected to networks you’ve shared with them, and you won’t be connected to networks they’ve shared with you.
|
||||
|
||||
Even if you selected **Automatically connect to networks shared by your contacts** when you first set up your Windows 10 device, you still won’t be connected to networks your contacts have shared with you.
|
||||
|
||||
If you select the **Share network with my contacts** check box the first time you connect to a new network, the network won’t be shared.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Wi-Fi Sense and Privacy](https://go.microsoft.com/fwlink/p/?LinkId=620911)
|
||||
- [How to configure Wi-Fi Sense on Windows 10 in an enterprise](/troubleshoot/windows-client/networking/configure-wifi-sense-and-paid-wifi-service)
|
||||
|
||||
|
||||
|
||||
|
@ -149,5 +149,5 @@ sections:
|
||||
Use the following resources for additional information about Windows 10.
|
||||
- If you are an IT professional or if you have a question about administering, managing, or deploying Windows 10 in your organization or business, visit the [Windows 10 IT Professional forums](https://social.technet.microsoft.com/forums/home?category=windows10itpro) on TechNet.
|
||||
- If you are an end user or if you have a question about using Windows 10, visit the [Windows 10 forums on Microsoft Community](https://answers.microsoft.com/windows/forum/windows_10).
|
||||
- If you are a developer or if you have a question about making apps for Windows 10, visit the [Windows Desktop Development forums](https://social.msdn.microsoft.com/forums/en-us/home?category=windowsdesktopdev) or [Windows and Windows phone apps forums](https://social.msdn.microsoft.com/forums/en-us/home?category=windowsapps) on MSDN.
|
||||
- If you have a question about Internet Explorer, visit the [Internet Explorer forums](https://social.technet.microsoft.com/forums/ie/en-us/home) on TechNet.
|
||||
- If you are a developer or if you have a question about making apps for Windows 10, visit the [Windows Desktop Development forums](https://social.msdn.microsoft.com/forums/en-us/home?category=windowsdesktopdev).
|
||||
- If you have a question about Internet Explorer, visit the [Internet Explorer forums](https://social.technet.microsoft.com/forums/ie/en-us/home).
|
||||
|
@ -1218,7 +1218,7 @@ The following fields are available:
|
||||
- **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device.
|
||||
- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime.
|
||||
- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic.
|
||||
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information.
|
||||
- **RunOnline** Indicates if appraiser was able to connect to Windows Update and therefore is making decisions using up-to-date driver coverage information.
|
||||
- **RunResult** The hresult of the Appraiser diagnostic data run.
|
||||
- **SendingUtc** Indicates whether the Appraiser client is sending events during the current diagnostic data run.
|
||||
- **StoreHandleIsNotNull** Obsolete, always set to false
|
||||
@ -1289,10 +1289,10 @@ This event sends type and capacity data about the battery on the device, as well
|
||||
The following fields are available:
|
||||
|
||||
- **InternalBatteryCapablities** Represents information about what the battery is capable of doing.
|
||||
- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity to estimate the battery's wear.
|
||||
- **InternalBatteryCapacityCurrent** Represents the battery's current fully charged capacity in mWh (or relative). Compare this value to DesignedCapacity to estimate the battery's wear.
|
||||
- **InternalBatteryCapacityDesign** Represents the theoretical capacity of the battery when new, in mWh.
|
||||
- **InternalBatteryNumberOfCharges** Provides the number of battery charges. This is used when creating new products and validating that existing products meets targeted functionality performance.
|
||||
- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected . Boolean value.
|
||||
- **IsAlwaysOnAlwaysConnectedCapable** Represents whether the battery enables the device to be AlwaysOnAlwaysConnected. Boolean value.
|
||||
|
||||
|
||||
### Census.Enterprise
|
||||
@ -1304,10 +1304,10 @@ The following fields are available:
|
||||
- **AzureOSIDPresent** Represents the field used to identify an Azure machine.
|
||||
- **AzureVMType** Represents whether the instance is Azure VM PAAS, Azure VM IAAS or any other VMs.
|
||||
- **CDJType** Represents the type of cloud domain joined for the machine.
|
||||
- **CommercialId** Represents the GUID for the commercial entity which the device is a member of. Will be used to reflect insights back to customers.
|
||||
- **CommercialId** Represents the GUID for the commercial entity which the device is a member of. Will be used to reflect insights back to customers.
|
||||
- **ContainerType** The type of container, such as process or virtual machine hosted.
|
||||
- **HashedDomain** The hashed representation of the user domain used for login.
|
||||
- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (AAD) tenant? true/false
|
||||
- **IsCloudDomainJoined** Is this device joined to an Azure Active Directory (Azure AD) tenant? true/false
|
||||
- **IsDERequirementMet** Represents if the device can do device encryption.
|
||||
- **IsDeviceProtected** Represents if Device protected by BitLocker/Device Encryption
|
||||
- **IsDomainJoined** Indicates whether a machine is joined to a domain.
|
||||
@ -1315,7 +1315,7 @@ The following fields are available:
|
||||
- **IsMDMEnrolled** Whether the device has been MDM Enrolled or not.
|
||||
- **MPNId** Returns the Partner ID/MPN ID from Regkey. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\DeployID
|
||||
- **SCCMClientId** This ID correlate systems that send data to Compat Analytics (OMS) and other OMS based systems with systems in an Enterprise System Center Configuration Manager (SCCM) environment.
|
||||
- **ServerFeatures** Represents the features installed on a Windows Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers.
|
||||
- **ServerFeatures** Represents the features installed on a Windows Server. This can be used by developers and administrators who need to automate the process of determining the features installed on a set of server computers.
|
||||
- **SystemCenterID** The SCCM ID is an anonymized one-way hash of the Active Directory Organization identifier.
|
||||
|
||||
|
||||
@ -1437,7 +1437,7 @@ The following fields are available:
|
||||
- **OA3xOriginalProductKey** Retrieves the License key stamped by the OEM to the machine.
|
||||
- **OSEdition** Retrieves the version of the current OS.
|
||||
- **OSInstallDateTime** Retrieves the date the OS was installed using ISO 8601 (Date part) == yyyy-mm-dd
|
||||
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc
|
||||
- **OSInstallType** Retrieves a numeric description of what install was used on the device i.e. clean, upgrade, refresh, reset, etc.
|
||||
- **OSOOBEDateTime** Retrieves Out of Box Experience (OOBE) Date in Coordinated Universal Time (UTC).
|
||||
- **OSSKU** Retrieves the Friendly Name of OS Edition.
|
||||
- **OSSubscriptionStatus** Represents the existing status for enterprise subscription feature for PRO machines.
|
||||
@ -1491,7 +1491,7 @@ The following fields are available:
|
||||
- **HolographicSpeechInputDisabledRemote** Indicates if a remote policy has disabled speech functionalities for the HMD devices.
|
||||
- **KWSEnabled** Cortana setting that represents if a user has enabled the "Hey Cortana" keyword spotter (KWS).
|
||||
- **MDMAllowInputPersonalization** Indicates if an MDM policy has enabled speech functionalities.
|
||||
- **RemotelyManaged** Indicates if the device is being controlled by a remote admininistrator (MDM or Group Policy) in the context of speech functionalities.
|
||||
- **RemotelyManaged** Indicates if the device is being controlled by a remote administrator (MDM or Group Policy) in the context of speech functionalities.
|
||||
- **SpeakerIdEnabled** Cortana setting that represents if keyword detection has been trained to try to respond to a single user's voice.
|
||||
- **SpeechServicesEnabled** Windows setting that represents whether a user is opted-in for speech services on the device.
|
||||
|
||||
@ -1823,7 +1823,7 @@ The following fields are available:
|
||||
|
||||
- **creativeId** A serialized string containing the ID of the offer being rendered, the ID of the current rotation period, the ID of the surface/ring/market combination, the offer index in the current branch, the ID of the batch, the rotation period length, and the expiration timestamp.
|
||||
- **eventToken** In there are multiple item offers, such as Start tiles, this indicates which tile the event corresponds to.
|
||||
- **eventType** A code that indicates the type of creative event, such a impression, click, positive feedback, negative feedback, etc..
|
||||
- **eventType** A code that indicates the type of creative event, such a impression, click, positive feedback, negative feedback, etc.
|
||||
- **placementId** Name of surface, such as LockScreen or Start.
|
||||
|
||||
|
||||
@ -2139,7 +2139,7 @@ This event sends data about hangs for both native and managed applications, to h
|
||||
The following fields are available:
|
||||
|
||||
- **AppName** The name of the app that has hung.
|
||||
- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend.
|
||||
- **AppSessionGuid** GUID made up of process ID used as a correlation vector for process instances in the telemetry backend.
|
||||
- **AppVersion** The version of the app that has hung.
|
||||
- **PackageFullName** Store application identity.
|
||||
- **PackageRelativeAppId** Store application identity.
|
||||
@ -2154,7 +2154,7 @@ The following fields are available:
|
||||
- **WaitingOnAppName** If this is a cross process hang waiting for an application, this has the name of the application.
|
||||
- **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting.
|
||||
- **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting.
|
||||
- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package.
|
||||
- **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative applicationIDof the package.
|
||||
|
||||
|
||||
## Inventory events
|
||||
@ -2845,8 +2845,8 @@ The following fields are available:
|
||||
- **BatteryCapacity** Maximum battery capacity in mWh
|
||||
- **BatteryCharge** Current battery charge as a percentage of total capacity
|
||||
- **BatteryDischarging** Flag indicating whether the battery is discharging or charging
|
||||
- **BootId** Monotonically increasing boot id, reset on upgrades.
|
||||
- **BootTimeUTC** Boot time in UTC file time.
|
||||
- **BootId** Monotonically increasing boot ID, reset on upgrades.
|
||||
- **BootTimeUTC** Boot time in UTC file time.
|
||||
- **EventSequence** Monotonically increasing event number for OsStateChange events logged during this boot.
|
||||
- **LastStateTransition** The previous state transition on the device.
|
||||
- **LastStateTransitionSub** The previous state subtransition on the device.
|
||||
@ -3238,7 +3238,7 @@ The following fields are available:
|
||||
- **RemediationWindowsTotalSystemDiskSize** The total storage capacity of the System Disk Drive, measured in Megabytes.
|
||||
- **Result** The HRESULT for Detection or Perform Action phases of the plug-in.
|
||||
- **RunResult** The HRESULT for Detection or Perform Action phases of the plug-in.
|
||||
- **ServiceHealthPlugin** The nae of the Service Health plug-in.
|
||||
- **ServiceHealthPlugin** The name of the Service Health plug-in.
|
||||
- **StartComponentCleanupTask** TRUE if the Component Cleanup task started successfully.
|
||||
- **TotalSizeofOrphanedInstallerFilesInMegabytes** The size of any orphaned Windows Installer files, measured in Megabytes.
|
||||
- **TotalSizeofStoreCacheAfterCleanupInMegabytes** The size of the Microsoft Store cache after cleanup, measured in Megabytes.
|
||||
@ -3882,7 +3882,7 @@ This event sends basic metadata about the SetupPlatform update installation proc
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **ActivityId** Provides a unique Id to correlate events that occur between a activity start event, and a stop event
|
||||
- **ActivityId** Provides a uniqueIDto correlate events that occur between a activity start event, and a stop event
|
||||
- **ActivityName** Provides a friendly name of the package type that belongs to the ActivityId (Setup, LanguagePack, GDR, Driver, etc.)
|
||||
- **FieldName** Retrieves the event name/data point. Examples: InstallStartTime, InstallEndtime, OverallResult etc.
|
||||
- **GroupName** Retrieves the groupname the event belongs to. Example: Install Information, DU Information, Disk Space Information etc.
|
||||
@ -3924,7 +3924,7 @@ Activity for deletion of a user account for devices set up for Shared PC mode as
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **accountType** The type of account that was deleted. Example: AD, AAD, or Local
|
||||
- **accountType** The type of account that was deleted. Example: AD, Azure AD, or Local
|
||||
- **userSid** The security identifier of the account.
|
||||
- **wilActivity** Windows Error Reporting data collected when there is a failure in deleting a user account with the Transient Account Manager. See [wilActivity](#wilactivity).
|
||||
|
||||
@ -4043,7 +4043,7 @@ The following fields are available:
|
||||
- **DriverExclusionPolicy** Indicates if the policy for not including drivers with Windows Update is enabled.
|
||||
- **DriverSyncPassPerformed** Were drivers scanned this time?
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed.
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was canceled, succeeded, or failed.
|
||||
- **ExtendedMetadataCabUrl** Hostname that is used to download an update.
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough.
|
||||
- **FailedUpdateGuids** The GUIDs for the updates that failed to be evaluated during the scan.
|
||||
@ -4114,7 +4114,7 @@ The following fields are available:
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventScenario** State of call
|
||||
- **EventType** Possible values are "Child", "Bundle", or "Driver".
|
||||
- **FlightId** The specific id of the flight the device is getting
|
||||
- **FlightId** The specificIDof the flight the device is getting
|
||||
- **HandlerType** Indicates the kind of content (app, driver, windows patch, etc.)
|
||||
- **RevisionNumber** Unique revision number of Update
|
||||
- **ServerId** Identifier for the service to which the software distribution client is connecting, such as Windows Update and Microsoft Store.
|
||||
@ -4160,13 +4160,13 @@ The following fields are available:
|
||||
- **Edition** Identifies the edition of Windows currently running on the device.
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventNamespaceID** The ID of the test events environment.
|
||||
- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was cancelled, succeeded, or failed.
|
||||
- **EventScenario** Indicates the purpose for sending this event: whether because the software distribution just started downloading content; or whether it was canceled, succeeded, or failed.
|
||||
- **EventType** Identifies the type of the event (Child, Bundle, or Driver).
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough.
|
||||
- **FeatureUpdatePause** Indicates whether feature OS updates are paused on the device.
|
||||
- **FlightBranch** The branch that a device is on if participating in flighting (pre-release builds).
|
||||
- **FlightBuildNumber** If this download was for a flight (pre-release build), this indicates the build number of that flight.
|
||||
- **FlightId** The specific id of the flight (pre-release build) the device is getting.
|
||||
- **FlightId** The specificIDof the flight (pre-release build) the device is getting.
|
||||
- **FlightRing** The ring (speed of getting builds) that a device is on if participating in flighting (pre-release builds).
|
||||
- **HandlerType** Indicates what kind of content is being downloaded (app, driver, windows patch, etc.).
|
||||
- **HardwareId** If this download was for a driver targeted to a particular device model, this ID indicates the model of the device.
|
||||
@ -4188,7 +4188,7 @@ The following fields are available:
|
||||
- **RelatedCV** The Correlation Vector that was used before the most recent change to a new Correlation Vector.
|
||||
- **RepeatFailFlag** Indicates whether this specific piece of content had previously failed to download.
|
||||
- **RevisionNumber** The revision number of the specified piece of content.
|
||||
- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc).
|
||||
- **ServiceGuid** A unique identifier for the service that the software distribution client is installing content for (Windows Update, Microsoft Store, etc.).
|
||||
- **Setup360Phase** Identifies the active phase of the upgrade download if the current download is for an Operating System upgrade.
|
||||
- **ShippingMobileOperator** The mobile operator linked to the device when the device shipped.
|
||||
- **StatusCode** Indicates the result of a Download event (success, cancellation, failure code HResult).
|
||||
@ -4217,8 +4217,8 @@ The following fields are available:
|
||||
|
||||
- **CallerApplicationName** The name provided by the caller who initiated API calls into the software distribution client
|
||||
- **ClientVersion** The version number of the software distribution client
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed
|
||||
- **EventType** Possible values are "Child", "Bundle", "Relase" or "Driver"
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was canceled, succeeded, or failed
|
||||
- **EventType** Possible values are "Child", "Bundle", "Release" or "Driver"
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough
|
||||
- **FileId** A hash that uniquely identifies a file
|
||||
- **FileName** Name of the downloaded file
|
||||
@ -4247,10 +4247,10 @@ The following fields are available:
|
||||
- **IsNetworkMetered** Indicates whether Windows considered the current network to be ?metered"
|
||||
- **MOAppDownloadLimit** Mobile operator cap on size of application downloads, if any
|
||||
- **MOUpdateDownloadLimit** Mobile operator cap on size of operating system update downloads, if any
|
||||
- **PowerState** Indicates the power state of the device at the time of heartbeart (DC, AC, Battery Saver, or Connected Standby)
|
||||
- **PowerState** Indicates the power state of the device at the time of heartbeat (DC, AC, Battery Saver, or Connected Standby)
|
||||
- **RelatedCV** The previous correlation vector that was used by the client, before swapping with a new one
|
||||
- **ResumeCount** Number of times this active download has resumed from a suspended state
|
||||
- **ServiceID** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc)
|
||||
- **ServiceID** Identifier for the service to which the software distribution client is connecting (Windows Update, Microsoft Store, etc.)
|
||||
- **SuspendCount** Number of times this active download has entered a suspended state
|
||||
- **SuspendReason** Last reason for why this active download entered a suspended state
|
||||
|
||||
@ -4285,8 +4285,8 @@ The following fields are available:
|
||||
- **DriverPingBack** Contains information about the previous driver and system state.
|
||||
- **Edition** Indicates the edition of Windows being used.
|
||||
- **EventInstanceID** A globally unique identifier for event instance.
|
||||
- **EventNamespaceID** Indicates whether the event succeeded or failed. Has the format EventType+Event where Event is Succeeded, Cancelled, Failed, etc.
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed.
|
||||
- **EventNamespaceID** Indicates whether the event succeeded or failed. Has the format EventType+Event where Event is Succeeded, Canceled, Failed, etc.
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was canceled, succeeded, or failed.
|
||||
- **EventType** Possible values are Child, Bundle, or Driver.
|
||||
- **ExtendedErrorCode** The extended error code.
|
||||
- **ExtendedStatusCode** Secondary error code for certain scenarios where StatusCode wasn't specific enough.
|
||||
@ -4342,7 +4342,7 @@ This event sends data about the ability of Windows to discover the location of a
|
||||
|
||||
The following fields are available:
|
||||
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was cancelled, succeeded, or failed
|
||||
- **EventScenario** Indicates the purpose of sending this event - whether because the software distribution just started checking for content, or whether it was canceled, succeeded, or failed
|
||||
- **HResult** Indicates the result code of the event (success, cancellation, failure code HResult)
|
||||
- **IsBackground** Indicates whether the SLS discovery event took place in the foreground or background
|
||||
- **NextExpirationTime** Indicates when the SLS cab expires
|
||||
@ -4536,7 +4536,7 @@ The following fields are available:
|
||||
- **FlightMetadata** Contains the FlightId and the build being flighted.
|
||||
- **ObjectId** Unique value for each Update Agent mode.
|
||||
- **RelatedCV** Correlation vector value generated from the latest USO scan.
|
||||
- **Result** Result of the initialize phase of update. 0 = Succeeded, 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled
|
||||
- **Result** Result of the initialize phase of update. 0 = Succeeded, 1 = Failed, 2 = Canceled, 3 = Blocked, 4 = BlockCanceled
|
||||
- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate
|
||||
- **SessionData** Contains instructions to update agent for processing FODs and DUICs (Null for other scenarios).
|
||||
- **SessionId** Unique value for each Update Agent mode attempt .
|
||||
@ -4553,7 +4553,7 @@ The following fields are available:
|
||||
- **FlightId** Unique ID for each flight.
|
||||
- **ObjectId** Unique value for each Update Agent mode.
|
||||
- **RelatedCV** Correlation vector value generated from the latest scan.
|
||||
- **Result** Result of the install phase of update. 0 = Succeeded 1 = Failed, 2 = Cancelled, 3 = Blocked, 4 = BlockCancelled
|
||||
- **Result** Result of the install phase of update. 0 = Succeeded 1 = Failed, 2 = Canceled, 3 = Blocked, 4 = BlockCanceled
|
||||
- **ScenarioId** The scenario ID. Example: MobileUpdate, DesktopLanguagePack, DesktopFeatureOnDemand, or DesktopDriverUpdate
|
||||
- **SessionId** Unique value for each Update Agent mode attempt.
|
||||
- **UpdateId** Unique ID for each update.
|
||||
@ -4819,7 +4819,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360 (HRESULT used to diagnose errors).
|
||||
- **Setup360Scenario** The Setup360 flow type (for example, Boot, Media, Update, MCT).
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
||||
- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** Exit state of given Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** An ID that uniquely identifies a group of events.
|
||||
- **WuId** This is the Windows Update Client ID. In the Windows Update scenario, this is the same as the clientId.
|
||||
|
||||
@ -4840,7 +4840,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** ID that uniquely identifies a group of events.
|
||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||
|
||||
@ -4861,7 +4861,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** Exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** ID that uniquely identifies a group of events.
|
||||
- **WuId** Windows Update client ID.
|
||||
|
||||
@ -4882,7 +4882,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that's used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled
|
||||
- **TestId** A string to uniquely identify a group of events.
|
||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as ClientId.
|
||||
|
||||
@ -4924,7 +4924,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of the target OS).
|
||||
- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** The exit state of the Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** ID that uniquely identifies a group of events.
|
||||
- **WuId** Windows Update client ID.
|
||||
|
||||
@ -4945,7 +4945,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used to diagnose errors.
|
||||
- **Setup360Scenario** Setup360 flow type (Boot, Media, Update, MCT).
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** A string to uniquely identify a group of events.
|
||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||
|
||||
@ -4966,7 +4966,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that is used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type, Example: Boot, Media, Update, MCT.
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** A string to uniquely identify a group of events.
|
||||
- **WuId** Windows Update client ID.
|
||||
|
||||
@ -5026,7 +5026,7 @@ The following fields are available:
|
||||
- **Setup360Result** The result of Setup360. This is an HRESULT error code that can be used used to diagnose errors.
|
||||
- **Setup360Scenario** The Setup360 flow type. Example: Boot, Media, Update, MCT.
|
||||
- **SetupVersionBuildNumber** The build number of Setup360 (build number of target OS).
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, cancelled.
|
||||
- **State** The exit state of a Setup360 run. Example: succeeded, failed, blocked, canceled.
|
||||
- **TestId** A string to uniquely identify a group of events.
|
||||
- **WuId** This is the Windows Update Client ID. With Windows Update, this is the same as the clientId.
|
||||
|
||||
@ -5035,7 +5035,7 @@ The following fields are available:
|
||||
|
||||
### Microsoft.Windows.WERVertical.OSCrash
|
||||
|
||||
This event sends binary data from the collected dump file wheneveer a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event.
|
||||
This event sends binary data from the collected dump file whenever a bug check occurs, to help keep Windows up to date. The is the OneCore version of this event.
|
||||
|
||||
The following fields are available:
|
||||
|
||||
@ -5048,7 +5048,7 @@ The following fields are available:
|
||||
- **DumpFileAttributes** Codes that identify the type of data contained in the dump file
|
||||
- **DumpFileSize** Size of the dump file
|
||||
- **IsValidDumpFile** True if the dump file is valid for the debugger, false otherwise
|
||||
- **ReportId** WER Report Id associated with this bug check (used for finding the corresponding report archive in Watson).
|
||||
- **ReportId** WER Report ID associated with this bug check (used for finding the corresponding report archive in Watson).
|
||||
|
||||
|
||||
### WerTraceloggingProvider.AppCrashEvent
|
||||
@ -5076,7 +5076,7 @@ The following fields are available:
|
||||
- **TargetAppId** The target app ID.
|
||||
- **TargetAppVer** The target app version.
|
||||
|
||||
|
||||
<!-- 01.06.2022 mandia: Commenting out, as these events are specific to Windows Phone.
|
||||
## Windows Phone events
|
||||
|
||||
### Microsoft.Windows.Phone.Telemetry.OnBoot.RebootReason
|
||||
@ -5088,7 +5088,7 @@ The following fields are available:
|
||||
- **BootId** The system boot ID.
|
||||
- **BoottimeSinceLastShutdown** The boot time since the last shutdown.
|
||||
- **RebootReason** Reason for the reboot.
|
||||
|
||||
-->
|
||||
|
||||
## Windows Store events
|
||||
|
||||
@ -5491,7 +5491,7 @@ The following fields are available:
|
||||
|
||||
- **CatalogId** The Store Catalog ID for the product being installed.
|
||||
- **ProductId** The Store Product ID for the product being installed.
|
||||
- **SkuId** Specfic edition of the app being updated.
|
||||
- **SkuId** Specific edition of the app being updated.
|
||||
|
||||
|
||||
### Microsoft.Windows.StoreAgent.Telemetry.UpdateAppOperationRequest
|
||||
@ -5505,7 +5505,7 @@ The following fields are available:
|
||||
|
||||
## Windows Update Delivery Optimization events
|
||||
|
||||
### Microsoft.OSG.DU.DeliveryOptClient.DownloadCanceled
|
||||
### Microsoft.OSG.DU.DeliveryOptClient.Downloadcanceled
|
||||
|
||||
This event describes when a download was canceled with Delivery Optimization. It's used to understand and address problems regarding downloads. The data collected with this event is used to help keep Windows up to date.
|
||||
|
||||
@ -5871,7 +5871,7 @@ The following fields are available:
|
||||
- **detectionBlockreason** The reason detection did not complete.
|
||||
- **detectionDeferreason** A log of deferral reasons for every update state.
|
||||
- **errorCode** The error code returned for the current process.
|
||||
- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was cancelled, succeeded, or failed.
|
||||
- **eventScenario** End-to-end update session ID, or indicates the purpose of sending this event - whether because the software distribution just started installing content, or whether it was canceled, succeeded, or failed.
|
||||
- **flightID** The unique identifier for the flight (Windows Insider pre-release build) should be delivered to the device, if applicable.
|
||||
- **interactive** Indicates whether the user initiated the session.
|
||||
- **revisionNumber** The Update revision number.
|
||||
@ -5938,7 +5938,7 @@ The following fields are available:
|
||||
|
||||
- **batteryLevel** Current battery capacity in mWh or percentage left.
|
||||
- **deferReason** Reason for install not completing.
|
||||
- **errorCode** The error code reppresented by a hexadecimal value.
|
||||
- **errorCode** The error code represented by a hexadecimal value.
|
||||
- **eventScenario** End-to-end update session ID.
|
||||
- **flightID** The ID of the Windows Insider build the device is getting.
|
||||
- **flightUpdate** Indicates whether the update is a Windows Insider build.
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: BitLocker Group Policy settings (Windows 10)
|
||||
description: This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
description: This article for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
ms.assetid: 4904e336-29fe-4cef-bb6c-3950541864af
|
||||
ms.reviewer:
|
||||
ms.prod: m365-security
|
||||
@ -26,17 +26,17 @@ ms.custom: bitlocker
|
||||
|
||||
- Windows 10, Windows 11, Windows Server 2019, Windows Server 2016, Windows 8.1, and Windows Server 2012 R2
|
||||
|
||||
This topic for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
This article for IT professionals describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption.
|
||||
|
||||
To control what drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings. How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed.
|
||||
To control the drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings. How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed.
|
||||
|
||||
> [!NOTE]
|
||||
> A separate set of Group Policy settings supports the use of the Trusted Platform Module (TPM). For details about those settings, see [Trusted Platform Module Group Policy settings](../tpm/trusted-platform-module-services-group-policy-settings.md).
|
||||
|
||||
BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC) under **Computer Configuration\\Administrative Templates\\Windows Components\\BitLocker Drive Encryption**.
|
||||
Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. If a computer is not compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance.
|
||||
Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. If a computer isn't compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance.
|
||||
|
||||
If multiple changes are necessary to bring the drive into compliance, you must suspend BitLocker protection, make the necessary changes, and then resume protection. This situation could occur, for example, if a removable drive was initially configured to be unlocked with a password and then Group
|
||||
If multiple changes are necessary to bring the drive into compliance, you must suspend BitLocker protection, make the necessary changes, and then resume protection. This situation could occur, for example, if a removable drive is initially configured to be unlocked with a password and then Group
|
||||
Policy settings are changed to disallow passwords and require smart cards. In this situation, you need to suspend BitLocker protection by using the [Manage-bde](/windows-server/administration/windows-commands/manage-bde) command-line tool, delete the password unlock method, and add the smart card method. After this is complete, BitLocker is compliant with the Group Policy setting and BitLocker protection on the drive can be resumed.
|
||||
|
||||
> [!NOTE]
|
||||
@ -119,14 +119,14 @@ This policy setting allows users on devices that are compliant with Modern Stand
|
||||
|
||||
**Reference**
|
||||
|
||||
The preboot authentication option **Require startup PIN with TPM** of the [Require additional authentication at startup](#bkmk-unlockpol1) policy is often enabled to help ensure security for older devices that do not support Modern Standby. But visually impaired users have no audible way to know when to enter a PIN.
|
||||
The preboot authentication option **Require startup PIN with TPM** of the [Require additional authentication at startup](#bkmk-unlockpol1) policy is often enabled to help ensure security for older devices that don't support Modern Standby. But visually impaired users have no audible way to know when to enter a PIN.
|
||||
This setting enables an exception to the PIN-required policy on secure hardware.
|
||||
|
||||
### <a href="" id="bkmk-netunlock"></a>Allow network unlock at startup
|
||||
|
||||
This policy controls a portion of the behavior of the Network Unlock feature in BitLocker. This policy is required to enable BitLocker Network Unlock on a network because it allows clients running BitLocker to create the necessary network key protector during encryption.
|
||||
|
||||
This policy is used in addition to the BitLocker Drive Encryption Network Unlock Certificate security policy (located in the **Public Key Policies** folder of Local Computer Policy) to allow systems that are connected to a trusted network to properly utilize the Network Unlock feature.
|
||||
This policy is used with the BitLocker Drive Encryption Network Unlock Certificate security policy (located in the **Public Key Policies** folder of Local Computer Policy) to allow systems that are connected to a trusted network to properly utilize the Network Unlock feature.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -136,14 +136,14 @@ This policy is used in addition to the BitLocker Drive Encryption Network Unlock
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|Clients configured with a BitLocker Network Unlock certificate can create and use Network Key Protectors.|
|
||||
|**When disabled or not configured**|Clients cannot create and use Network Key Protectors|
|
||||
|**When disabled or not configured**|Clients can't create and use Network Key Protectors|
|
||||
|
||||
**Reference**
|
||||
|
||||
To use a network key protector to unlock the computer, the computer and the server that hosts BitLocker Drive Encryption Network Unlock must be provisioned with a Network Unlock certificate. The Network Unlock certificate is used to create a network key protector and to protect the information exchange with the server to unlock the computer. You can use the Group Policy setting **Computer Configuration\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate** on the domain controller to distribute this certificate to computers in your organization. This unlock method uses the TPM on the computer, so computers that do not have a TPM cannot create network key protectors to automatically unlock by using Network Unlock.
|
||||
To use a network key protector to unlock the computer, the computer and the server that hosts BitLocker Drive Encryption Network Unlock must be provisioned with a Network Unlock certificate. The Network Unlock certificate is used to create a network key protector and to protect the information exchange with the server to unlock the computer. You can use the Group Policy setting **Computer Configuration\\Windows Settings\\Security Settings\\Public Key Policies\\BitLocker Drive Encryption Network Unlock Certificate** on the domain controller to distribute this certificate to computers in your organization. This unlock method uses the TPM on the computer, so computers that don't have a TPM can't create network key protectors to automatically unlock by using Network Unlock.
|
||||
|
||||
> [!NOTE]
|
||||
> For reliability and security, computers should also have a TPM startup PIN that can be used when the computer is disconnected from the wired network or cannot connect to the domain controller at startup.
|
||||
> For reliability and security, computers should also have a TPM startup PIN that can be used when the computer is disconnected from the wired network or can't connect to the domain controller at startup.
|
||||
|
||||
For more information about Network Unlock, see [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md).
|
||||
|
||||
@ -157,7 +157,7 @@ This policy setting is used to control which unlock options are available for op
|
||||
|**Introduced**|Windows Server 2008 R2 and Windows 7|
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|If one authentication method is required, the other methods cannot be allowed. Use of BitLocker with a TPM startup key or with a TPM startup key and a PIN must be disallowed if the **Deny write access to removable drives not protected by BitLocker** policy setting is enabled.|
|
||||
|**Conflicts**|If one authentication method is required, the other methods can't be allowed. Use of BitLocker with a TPM startup key or with a TPM startup key and a PIN must be disallowed if the **Deny write access to removable drives not protected by BitLocker** policy setting is enabled.|
|
||||
|**When enabled**|Users can configure advanced startup options in the BitLocker Setup Wizard.|
|
||||
|**When disabled or not configured**|Users can configure only basic options on computers with a TPM. <p> Only one of the additional authentication options can be required at startup; otherwise, a policy error occurs.|
|
||||
|
||||
@ -167,10 +167,10 @@ If you want to use BitLocker on a computer without a TPM, select **Allow BitLock
|
||||
|
||||
On a computer with a compatible TPM, additional authentication methods can be used at startup to improve protection for encrypted data. When the computer starts, it can use:
|
||||
|
||||
- only the TPM
|
||||
- insertion of a USB flash drive containing the startup key
|
||||
- the entry of a 4-digit to 20-digit personal identification number (PIN)
|
||||
- a combination of the PIN and the USB flash drive
|
||||
- Only the TPM
|
||||
- Insertion of a USB flash drive containing the startup key
|
||||
- The entry of a 4-digit to 20-digit personal identification number (PIN)
|
||||
- A combination of the PIN and the USB flash drive
|
||||
|
||||
There are four options for TPM-enabled computers or devices:
|
||||
|
||||
@ -206,7 +206,7 @@ This policy setting permits the use of enhanced PINs when you use an unlock meth
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|All new BitLocker startup PINs that are set will be enhanced PINs. Existing drives that were protected by using standard startup PINs are not affected.|
|
||||
|**When enabled**|All new BitLocker startup PINs that are set will be enhanced PINs. Existing drives that were protected by using standard startup PINs aren't affected.|
|
||||
|**When disabled or not configured**|Enhanced PINs will not be used.|
|
||||
|
||||
**Reference**
|
||||
@ -214,7 +214,7 @@ This policy setting permits the use of enhanced PINs when you use an unlock meth
|
||||
Enhanced startup PINs permit the use of characters (including uppercase and lowercase letters, symbols, numbers, and spaces). This policy setting is applied when you turn on BitLocker.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Not all computers support enhanced PIN characters in the preboot environment. It is strongly recommended that users perform a system check during the BitLocker setup to verify that enhanced PIN characters can be used.
|
||||
> Not all computers support enhanced PIN characters in the preboot environment. It's strongly recommended that users perform a system check during the BitLocker setup to verify that enhanced PIN characters can be used.
|
||||
|
||||
### <a href="" id="bkmk-unlockpol3"></a>Configure minimum PIN length for startup
|
||||
|
||||
@ -222,7 +222,7 @@ This policy setting is used to set a minimum PIN length when you use an unlock m
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
|**Policy description**|With this policy setting, you can configure a minimum length for a TPM startup PIN. This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits, and it can have a maximum length of 20 digits. By default, the minimum PIN length is 6.|
|
||||
|**Policy description**|With this policy setting, you can configure a minimum length for a TPM startup PIN. This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of four digits, and it can have a maximum length of 20 digits. By default, the minimum PIN length is 6.|
|
||||
|**Introduced**|Windows Server 2008 R2 and Windows 7|
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
@ -232,7 +232,7 @@ This policy setting is used to set a minimum PIN length when you use an unlock m
|
||||
|
||||
**Reference**
|
||||
|
||||
This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of 4 digits and can have a maximum length of 20 digits.
|
||||
This policy setting is applied when you turn on BitLocker. The startup PIN must have a minimum length of four digits and can have a maximum length of 20 digits.
|
||||
|
||||
Originally, BitLocker allowed from 4 to 20 characters for a PIN.
|
||||
Windows Hello has its own PIN for logon, which can be 4 to 127 characters.
|
||||
@ -244,13 +244,13 @@ The Dictionary Attack Prevention Parameters provide a way to balance security ne
|
||||
For example, when BitLocker is used with a TPM + PIN configuration, the number of PIN guesses is limited over time.
|
||||
A TPM 2.0 in this example could be configured to allow only 32 PIN guesses immediately, and then only one more guess every two hours.
|
||||
This totals a maximum of about 4415 guesses per year.
|
||||
If the PIN is 4 digits, all 9999 possible PIN combinations could be attempted in a little over two years.
|
||||
If the PIN is four digits, all 9999 possible PIN combinations could be attempted in a little over two years.
|
||||
|
||||
Increasing the PIN length requires a greater number of guesses for an attacker.
|
||||
In that case, the lockout duration between each guess can be shortened to allow legitimate users to retry a failed attempt sooner, while maintaining a similar level of protection.
|
||||
|
||||
Beginning with Windows 10, version 1703, or Windows 11, the minimum length for the BitLocker PIN was increased to 6 characters to better align with other Windows features that leverage TPM 2.0, including Windows Hello.
|
||||
To help organizations with the transition, beginning with Windows 10, version 1709 and Windows 10, version 1703 with the October 2017, or Windows 11 [cumulative update](https://support.microsoft.com/help/4018124) installed, the BitLocker PIN length is 6 characters by default, but it can be reduced to 4 characters.
|
||||
Beginning with Windows 10, version 1703, or Windows 11, the minimum length for the BitLocker PIN was increased to six characters to better align with other Windows features that use TPM 2.0, including Windows Hello.
|
||||
To help organizations with the transition, beginning with Windows 10, version 1709 and Windows 10, version 1703 with the October 2017, or Windows 11 [cumulative update](https://support.microsoft.com/help/4018124) installed, the BitLocker PIN length is six characters by default, but it can be reduced to four characters.
|
||||
If the minimum PIN length is reduced from the default of six characters, then the TPM 2.0 lockout period will be extended.
|
||||
|
||||
### Disable new DMA devices when this computer is locked
|
||||
@ -282,7 +282,7 @@ This policy setting allows you to configure whether standard users are allowed t
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|Standard users are not allowed to change BitLocker PINs or passwords.|
|
||||
|**When enabled**|Standard users aren't allowed to change BitLocker PINs or passwords.|
|
||||
|**When disabled or not configured**|Standard users are permitted to change BitLocker PINs or passwords.|
|
||||
|
||||
**Reference**
|
||||
@ -291,7 +291,7 @@ To change the PIN or password, the user must be able to provide the current PIN
|
||||
|
||||
### <a href="" id="bkmk-ospw"></a>Configure use of passwords for operating system drives
|
||||
|
||||
This policy controls how non-TPM based systems utilize the password protector. Used in conjunction with the **Password must meet complexity requirements** policy, this policy allows administrators to require password length and complexity for using the password protector. By default, passwords must be eight characters in length. Complexity configuration options determine how important domain connectivity is for the client. For the strongest password security, administrators should choose **Require password complexity** because it requires domain connectivity, and it requires that the BitLocker password meets the same password complexity requirements as domain sign-in passwords.
|
||||
This policy controls how non-TPM based systems utilize the password protector. Used with the **Password must meet complexity requirements** policy, this policy allows administrators to require password length and complexity for using the password protector. By default, passwords must be eight characters in length. Complexity configuration options determine how important domain connectivity is for the client. For the strongest password security, administrators should choose **Require password complexity** because it requires domain connectivity, and it requires that the BitLocker password meets the same password complexity requirements as domain sign-in passwords.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -299,9 +299,9 @@ This policy controls how non-TPM based systems utilize the password protector. U
|
||||
|**Introduced**|Windows Server 2012 and Windows 8|
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|Passwords cannot be used if FIPS-compliance is enabled. <p><br/> **NOTE:** The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting, which is located at **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options** specifies whether FIPS-compliance is enabled.|
|
||||
|**Conflicts**|Passwords can't be used if FIPS-compliance is enabled. <p><br/> **NOTE:** The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting, which is located at **Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options** specifies whether FIPS-compliance is enabled.|
|
||||
|**When enabled**|Users can configure a password that meets the requirements you define. To enforce complexity requirements for the password, select **Require complexity**.|
|
||||
|**When disabled or not configured**|The default length constraint of 8 characters will apply to operating system drive passwords and no complexity checks will occur.|
|
||||
|**When disabled or not configured**|The default length constraint of eight characters will apply to operating system drive passwords and no complexity checks will occur.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -311,7 +311,7 @@ If non-TPM protectors are allowed on operating system drives, you can provision
|
||||
> These settings are enforced when turning on BitLocker, not when unlocking a volume. BitLocker allows unlocking a drive with any of the protectors that are available on the drive.
|
||||
|
||||
When set to **Require complexity**, a connection to a domain controller is necessary when BitLocker is enabled to validate the complexity the password. When set to **Allow complexity**, a connection to a domain controller is attempted to validate that the complexity adheres to the rules set by the policy. If no domain controllers are found, the password will be accepted regardless of actual password complexity, and the drive will be encrypted by using that password as a protector. When set to **Do not allow complexity**, there is no password complexity validation.
|
||||
Passwords must be at least 8 characters. To configure a greater minimum length for the password, enter the desired number of characters in the **Minimum password length** box.
|
||||
Passwords must be at least eight characters. To configure a greater minimum length for the password, enter the desired number of characters in the **Minimum password length** box.
|
||||
|
||||
When this policy setting is enabled, you can set the option **Configure password complexity for operating system drives** to:
|
||||
|
||||
@ -329,7 +329,7 @@ This policy setting is used to control what unlock options are available for com
|
||||
|**Introduced**|Windows Server 2008 and Windows Vista|
|
||||
|**Drive type**|Operating system drives (Windows Server 2008 and Windows Vista)|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|If you choose to require an additional authentication method, other authentication methods cannot be allowed.|
|
||||
|**Conflicts**|If you choose to require an additional authentication method, other authentication methods can't be allowed.|
|
||||
|**When enabled**|The BitLocker Setup Wizard displays the page that allows the user to configure advanced startup options for BitLocker. You can further configure setting options for computers with or without a TPM.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard displays basic steps that allow users to enable BitLocker on computers with a TPM. In this basic wizard, no additional startup key or startup PIN can be configured.|
|
||||
|
||||
@ -368,7 +368,7 @@ This policy setting is used to require, allow, or deny the use of smart cards wi
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|To use smart cards with BitLocker, you may also need to modify the object identifier setting in the **Computer Configuration\Administrative Templates\BitLocker Drive Encryption\Validate smart card certificate usage rule compliance** policy setting to match the object identifier of your smart card certificates.|
|
||||
|**When enabled**|Smart cards can be used to authenticate user access to the drive. You can require smart card authentication by selecting the **Require use of smart cards on fixed data drives** check box.|
|
||||
|**When disabled**|Users cannot use smart cards to authenticate their access to BitLocker-protected fixed data drives.|
|
||||
|**When disabled**|Users can't use smart cards to authenticate their access to BitLocker-protected fixed data drives.|
|
||||
|**When not configured**|Smart cards can be used to authenticate user access to a BitLocker-protected drive.|
|
||||
|
||||
**Reference**
|
||||
@ -388,8 +388,8 @@ This policy setting is used to require, allow, or deny the use of passwords with
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|To use password complexity, the **Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy\Password must meet complexity requirements** policy setting must also be enabled.|
|
||||
|**When enabled**|Users can configure a password that meets the requirements you define. To require the use of a password, select **Require password for fixed data drive**. To enforce complexity requirements on the password, select **Require complexity**.|
|
||||
|**When disabled**|The user is not allowed to use a password.|
|
||||
|**When not configured**|Passwords are supported with the default settings, which do not include password complexity requirements and require only 8 characters.|
|
||||
|**When disabled**|The user isn't allowed to use a password.|
|
||||
|**When not configured**|Passwords are supported with the default settings, which don't include password complexity requirements and require only eight characters.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -399,18 +399,18 @@ When set to **Allow complexity**, a connection to a domain controller is attempt
|
||||
|
||||
When set to **Do not allow complexity**, no password complexity validation is performed.
|
||||
|
||||
Passwords must be at least 8 characters. To configure a greater minimum length for the password, enter the desired number of characters in the **Minimum password length** box.
|
||||
Passwords must be at least eight characters. To configure a greater minimum length for the password, enter the desired number of characters in the **Minimum password length** box.
|
||||
|
||||
> [!NOTE]
|
||||
> These settings are enforced when turning on BitLocker, not when unlocking a drive. BitLocker allows unlocking a drive with any of the protectors that are available on the drive.
|
||||
|
||||
For the complexity requirement setting to be effective, the Group Policy setting **Computer Configuration\\Windows Settings\\Security Settings\\Account Policies\\Password Policy\\Password must meet complexity requirements** must also be enabled.
|
||||
This policy setting is configured on a per-computer basis. This means that it applies to local user accounts and domain user accounts. Because the password filter that is used to validate password complexity is located on the domain controllers, local user accounts cannot access the password filter because they are not authenticated for domain access. When this policy setting is enabled, if you sign in with a local user account, and you attempt to encrypt a drive or change a password on an existing BitLocker-protected drive, an "Access denied" error message is displayed. In this situation, the password key protector cannot be added to the drive.
|
||||
This policy setting is configured on a per-computer basis. This means that it applies to local user accounts and domain user accounts. Because the password filter that's used to validate password complexity is located on the domain controllers, local user accounts can't access the password filter because they're not authenticated for domain access. When this policy setting is enabled, if you sign in with a local user account, and you attempt to encrypt a drive or change a password on an existing BitLocker-protected drive, an "Access denied" error message is displayed. In this situation, the password key protector can't be added to the drive.
|
||||
|
||||
Enabling this policy setting requires that connectivity to a domain be established before adding a password key protector to a BitLocker-protected drive. Users who work remotely and have periods of time in which they cannot connect to the domain should be made aware of this requirement so that they can schedule a time when they will be connected to the domain to turn on BitLocker or to change a password on a BitLocker-protected data drive.
|
||||
Enabling this policy setting requires that connectivity to a domain be established before adding a password key protector to a BitLocker-protected drive. Users who work remotely and have periods of time in which they can't connect to the domain should be made aware of this requirement so that they can schedule a time when they will be connected to the domain to turn on BitLocker or to change a password on a BitLocker-protected data drive.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Passwords cannot be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
|
||||
> Passwords can't be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
|
||||
|
||||
### <a href="" id="bkmk-unlockpol7"></a>Configure use of smart cards on removable data drives
|
||||
|
||||
@ -424,7 +424,7 @@ This policy setting is used to require, allow, or deny the use of smart cards wi
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|To use smart cards with BitLocker, you may also need to modify the object identifier setting in the **Computer Configuration\Administrative Templates\BitLocker Drive Encryption\Validate smart card certificate usage rule compliance** policy setting to match the object identifier of your smart card certificates.|
|
||||
|**When enabled**|Smart cards can be used to authenticate user access to the drive. You can require smart card authentication by selecting the **Require use of smart cards on removable data drives** check box.|
|
||||
|**When disabled or not configured**|Users are not allowed to use smart cards to authenticate their access to BitLocker-protected removable data drives.|
|
||||
|**When disabled or not configured**|Users aren't allowed to use smart cards to authenticate their access to BitLocker-protected removable data drives.|
|
||||
|**When not configured**|Smart cards are available to authenticate user access to a BitLocker-protected removable data drive.|
|
||||
|
||||
**Reference**
|
||||
@ -444,8 +444,8 @@ This policy setting is used to require, allow, or deny the use of passwords with
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|To use password complexity, the **Password must meet complexity requirements** policy setting, which is located at **Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy** must also be enabled.|
|
||||
|**When enabled**|Users can configure a password that meets the requirements you define. To require the use of a password, select **Require password for removable data drive**. To enforce complexity requirements on the password, select **Require complexity**.|
|
||||
|**When disabled**|The user is not allowed to use a password.|
|
||||
|**When not configured**|Passwords are supported with the default settings, which do not include password complexity requirements and require only 8 characters.|
|
||||
|**When disabled**|The user isn't allowed to use a password.|
|
||||
|**When not configured**|Passwords are supported with the default settings, which don't include password complexity requirements and require only eight characters.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -455,7 +455,7 @@ If you choose to allow the use of a password, you can require a password to be u
|
||||
> [!NOTE]
|
||||
> These settings are enforced when turning on BitLocker, not when unlocking a drive. BitLocker allows unlocking a drive with any of the protectors that are available on the drive.
|
||||
|
||||
Passwords must be at least 8 characters. To configure a greater minimum length for the password, enter the desired number of characters in the **Minimum password length** box.
|
||||
Passwords must be at least eight characters. To configure a greater minimum length for the password, enter the wanted number of characters in the **Minimum password length** box.
|
||||
|
||||
When set to **Require complexity**, a connection to a domain controller is necessary when BitLocker is enabled to validate the complexity the password.
|
||||
|
||||
@ -464,7 +464,7 @@ When set to **Allow complexity**, a connection to a domain controller will be at
|
||||
When set to **Do not allow complexity**, no password complexity validation will be done.
|
||||
|
||||
> [!NOTE]
|
||||
> Passwords cannot be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
|
||||
> Passwords can't be used if FIPS compliance is enabled. The **System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing** policy setting in **Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** specifies whether FIPS compliance is enabled.
|
||||
|
||||
For information about this setting, see [System cryptography: Use FIPS-compliant algorithms for encryption, hashing, and signing](../../threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md).
|
||||
|
||||
@ -491,7 +491,7 @@ The object identifier is specified in the enhanced key usage (EKU) of a certific
|
||||
The default object identifier is 1.3.6.1.4.1.311.67.1.1.
|
||||
|
||||
> [!NOTE]
|
||||
> BitLocker does not require that a certificate have an EKU attribute; however, if one is configured for the certificate, it must be set to an object identifier that matches the object identifier configured for BitLocker.
|
||||
> BitLocker doesn't require that a certificate have an EKU attribute; however, if one is configured for the certificate, it must be set to an object identifier that matches the object identifier configured for BitLocker.
|
||||
|
||||
### <a href="" id="bkmk-slates"></a>Enable use of BitLocker authentication requiring preboot keyboard input on slates
|
||||
|
||||
@ -509,13 +509,13 @@ This policy setting allows users to enable authentication options that require u
|
||||
|
||||
**Reference**
|
||||
|
||||
The Windows touch keyboard (such as used by tablets) is not available in the preboot environment where BitLocker requires additional information, such as a PIN or password.
|
||||
The Windows touch keyboard (such as used by tablets) isn't available in the preboot environment where BitLocker requires additional information, such as a PIN or password.
|
||||
|
||||
It is recommended that administrators enable this policy only for devices that are verified to have an alternative means of preboot input, such as attaching a USB keyboard.
|
||||
It's recommended that administrators enable this policy only for devices that are verified to have an alternative means of preboot input, such as attaching a USB keyboard.
|
||||
|
||||
When the Windows Recovery Environment is not enabled and this policy is not enabled, you cannot turn on BitLocker on a device that uses the Windows touch keyboard.
|
||||
When the Windows Recovery Environment isn't enabled and this policy isn't enabled, you can't turn on BitLocker on a device that uses the Windows touch keyboard.
|
||||
|
||||
If you do not enable this policy setting, the following options in the **Require additional authentication at startup** policy might not be available:
|
||||
If you don't enable this policy setting, the following options in the **Require additional authentication at startup** policy might not be available:
|
||||
|
||||
- Configure TPM startup PIN: Required and Allowed
|
||||
- Configure TPM startup key and PIN: Required and Allowed
|
||||
@ -532,7 +532,7 @@ This policy setting is used to require encryption of fixed drives prior to grant
|
||||
|**Drive type**|Fixed data drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|See the Reference section for a description of conflicts.|
|
||||
|**When enabled**|All fixed data drives that are not BitLocker-protected are mounted as Read-only. If the drive is protected by BitLocker, it is mounted with Read and Write access.|
|
||||
|**When enabled**|All fixed data drives that aren't BitLocker-protected are mounted as Read-only. If the drive is protected by BitLocker, it's mounted with Read and Write access.|
|
||||
|**When disabled or not configured**|All fixed data drives on the computer are mounted with Read and Write access.|
|
||||
|
||||
**Reference**
|
||||
@ -544,10 +544,10 @@ Conflict considerations include:
|
||||
1. When this policy setting is enabled, users receive "Access denied" error messages when they try to save data to unencrypted fixed data drives. See the Reference section for additional conflicts.
|
||||
2. If BdeHdCfg.exe is run on a computer when this policy setting is enabled, you could encounter the following issues:
|
||||
|
||||
- If you attempted to shrink the drive and create the system drive, the drive size is successfully reduced and a raw partition is created. However, the raw partition is not formatted. The following error message is displayed: "The new active drive cannot be formatted. You may need to manually prepare your drive for BitLocker."
|
||||
- If you attempted to shrink the drive and create the system drive, the drive size is successfully reduced and a raw partition is created. However, the raw partition isn't formatted. The following error message is displayed: "The new active drive cannot be formatted. You may need to manually prepare your drive for BitLocker."
|
||||
- If you attempt to use unallocated space to create the system drive, a raw partition will be created. However, the raw partition will not be formatted. The following error message is displayed: "The new active drive cannot be formatted. You may need to manually prepare your drive for BitLocker."
|
||||
- If you attempt to merge an existing drive into the system drive, the tool fails to copy the required boot file onto the target drive to create the system drive. The following error message is displayed: "BitLocker setup failed to copy boot files. You may need to manually prepare your drive for BitLocker."
|
||||
3. If this policy setting is enforced, a hard drive cannot be repartitioned because the drive is protected. If you are upgrading computers in your organization from a previous version of Windows, and those computers were configured with a single partition, you should create the required BitLocker system partition before you apply this policy setting to the computers.
|
||||
3. If this policy setting is enforced, a hard drive can't be repartitioned because the drive is protected. If you are upgrading computers in your organization from a previous version of Windows, and those computers were configured with a single partition, you should create the required BitLocker system partition before you apply this policy setting to the computers.
|
||||
|
||||
### <a href="" id="bkmk-driveaccess2"></a>Deny write access to removable drives not protected by BitLocker
|
||||
|
||||
@ -560,12 +560,12 @@ This policy setting is used to require that removable drives are encrypted prior
|
||||
|**Drive type**|Removable data drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|See the Reference section for a description of conflicts.|
|
||||
|**When enabled**|All removable data drives that are not BitLocker-protected are mounted as Read-only. If the drive is protected by BitLocker, it is mounted with Read and Write access.|
|
||||
|**When enabled**|All removable data drives that aren't BitLocker-protected are mounted as Read-only. If the drive is protected by BitLocker, it's mounted with Read and Write access.|
|
||||
|**When disabled or not configured**|All removable data drives on the computer are mounted with Read and Write access.|
|
||||
|
||||
**Reference**
|
||||
|
||||
If the **Deny write access to devices configured in another organization** option is selected, only drives with identification fields that match the computer's identification fields are given Write access. When a removable data drive is accessed, it is checked for a valid identification field and allowed identification fields. These fields are defined by the **Provide the unique identifiers for your organization** policy setting.
|
||||
If the **Deny write access to devices configured in another organization** option is selected, only drives with identification fields that match the computer's identification fields are given Write access. When a removable data drive is accessed, it's checked for a valid identification field and allowed identification fields. These fields are defined by the **Provide the unique identifiers for your organization** policy setting.
|
||||
|
||||
> [!NOTE]
|
||||
> You can override this policy setting with the policy settings under **User Configuration\\Administrative Templates\\System\\Removable Storage Access**. If the **Removable Disks: Deny write access** policy setting is enabled, this policy setting will be ignored.
|
||||
@ -588,7 +588,7 @@ This policy setting is used to prevent users from turning BitLocker on or off on
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can select property settings that control how users can configure BitLocker.|
|
||||
|**When disabled**|Users cannot use BitLocker on removable data drives.|
|
||||
|**When disabled**|Users can't use BitLocker on removable data drives.|
|
||||
|**When not configured**|Users can use BitLocker on removable data drives.|
|
||||
|
||||
**Reference**
|
||||
@ -614,27 +614,27 @@ This policy setting is used to control the encryption method and cipher strength
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can choose an encryption algorithm and key cipher strength for BitLocker to use to encrypt drives.|
|
||||
|**When disabled or not configured**|Beginning with Windows 10, version 1511, or Windows 11, BitLocker uses the default encryption method of XTS-AES 128-bit or the encryption method that is specified by the setup script. Windows Phone does not support XTS; it uses AES-CBC 128-bit by default and supports AES-CBC 256-bit by policy.|
|
||||
|**When disabled or not configured**|Beginning with Windows 10, version 1511, or Windows 11, BitLocker uses the default encryption method of XTS-AES 128-bit or the encryption method that is specified by the setup script.
|
||||
|
||||
**Reference**
|
||||
|
||||
The values of this policy determine the strength of the cipher that BitLocker uses for encryption.
|
||||
Enterprises may want to control the encryption level for increased security (AES-256 is stronger than AES-128).
|
||||
|
||||
If you enable this setting, you will be able to configure an encryption algorithm and key cipher strength for fixed data drives, operating system drives, and removable data drives individually.
|
||||
If you enable this setting, you can configure an encryption algorithm and key cipher strength for fixed data drives, operating system drives, and removable data drives individually.
|
||||
For fixed and operating system drives, we recommend that you use the XTS-AES algorithm.
|
||||
For removable drives, you should use AES-CBC 128-bit or AES-CBC 256-bit if the drive will be used in other devices that are not running Windows 10, version 1511 or later, or Windows 11.
|
||||
For removable drives, you should use AES-CBC 128-bit or AES-CBC 256-bit if the drive will be used in other devices that aren't running Windows 10, version 1511 or later, or Windows 11.
|
||||
|
||||
Changing the encryption method has no effect if the drive is already encrypted or if encryption is in progress. In these cases, this policy setting is ignored.
|
||||
|
||||
> [!WARNING]
|
||||
> This policy does not apply to encrypted drives. Encrypted drives utilize their own algorithm, which is set by the drive during partitioning.
|
||||
> This policy doesn't apply to encrypted drives. Encrypted drives utilize their own algorithm, which is set by the drive during partitioning.
|
||||
|
||||
When this policy setting is disabled or not configured, BitLocker will use the default encryption method of XTS-AES 128-bit or the encryption method that is specified in the setup script.
|
||||
|
||||
### <a href="" id="bkmk-hdefxd"></a>Configure use of hardware-based encryption for fixed data drives
|
||||
|
||||
This policy controls how BitLocker reacts to systems that are equipped with encrypted drives when they are used as fixed data volumes. Using hardware-based encryption can improve the performance of drive operations that involve frequent reading or writing of data to the drive.
|
||||
This policy controls how BitLocker reacts to systems that are equipped with encrypted drives when they're used as fixed data volumes. Using hardware-based encryption can improve the performance of drive operations that involve frequent reading or writing of data to the drive.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -643,16 +643,16 @@ This policy controls how BitLocker reacts to systems that are equipped with encr
|
||||
|**Drive type**|Fixed data drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker cannot use hardware-based encryption with fixed data drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that don't support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker can't use hardware-based encryption with fixed data drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When not configured**|BitLocker software-based encryption is used irrespective of hardware-based encryption ability.|
|
||||
|
||||
**Reference**
|
||||
|
||||
> [!NOTE]
|
||||
> The **Choose drive encryption method and cipher strength** policy setting does not apply to hardware-based encryption.
|
||||
> The **Choose drive encryption method and cipher strength** policy setting doesn't apply to hardware-based encryption.
|
||||
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive is not available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive isn't available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
|
||||
- Advanced Encryption Standard (AES) 128 in Cipher Block Chaining (CBC) mode OID: 2.16.840.1.101.3.4.1.2
|
||||
- AES 256 in CBC mode OID: 2.16.840.1.101.3.4.1.42
|
||||
@ -668,25 +668,25 @@ This policy controls how BitLocker reacts when encrypted drives are used as oper
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker cannot use hardware-based encryption with operating system drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that don't support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker can't use hardware-based encryption with operating system drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When not configured**|BitLocker software-based encryption is used irrespective of hardware-based encryption ability.|
|
||||
|
||||
**Reference**
|
||||
|
||||
If hardware-based encryption is not available, BitLocker software-based encryption is used instead.
|
||||
If hardware-based encryption isn't available, BitLocker software-based encryption is used instead.
|
||||
|
||||
> [!NOTE]
|
||||
> The **Choose drive encryption method and cipher strength** policy setting does not apply to hardware-based encryption.
|
||||
> The **Choose drive encryption method and cipher strength** policy setting doesn't apply to hardware-based encryption.
|
||||
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive is not available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive isn't available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
|
||||
- Advanced Encryption Standard (AES) 128 in Cipher Block Chaining (CBC) mode OID: 2.16.840.1.101.3.4.1.2
|
||||
- AES 256 in CBC mode OID: 2.16.840.1.101.3.4.1.42
|
||||
|
||||
### <a href="" id="bkmk-hderdd"></a>Configure use of hardware-based encryption for removable data drives
|
||||
|
||||
This policy controls how BitLocker reacts to encrypted drives when they are used as removable data drives. Using hardware-based encryption can improve the performance of drive operations that involve frequent reading or writing of data to the drive.
|
||||
This policy controls how BitLocker reacts to encrypted drives when they're used as removable data drives. Using hardware-based encryption can improve the performance of drive operations that involve frequent reading or writing of data to the drive.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -695,18 +695,18 @@ This policy controls how BitLocker reacts to encrypted drives when they are used
|
||||
|**Drive type**|Removable data drive|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that do not support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker cannot use hardware-based encryption with removable data drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When enabled**|You can specify additional options that control whether BitLocker software-based encryption is used instead of hardware-based encryption on computers that don't support hardware-based encryption. You can also specify whether you want to restrict the encryption algorithms and cipher suites that are used with hardware-based encryption.|
|
||||
|**When disabled**|BitLocker can't use hardware-based encryption with removable data drives, and BitLocker software-based encryption is used by default when the drive in encrypted.|
|
||||
|**When not configured**|BitLocker software-based encryption is used irrespective of hardware-based encryption ability.|
|
||||
|
||||
**Reference**
|
||||
|
||||
If hardware-based encryption is not available, BitLocker software-based encryption is used instead.
|
||||
If hardware-based encryption isn't available, BitLocker software-based encryption is used instead.
|
||||
|
||||
> [!NOTE]
|
||||
> The **Choose drive encryption method and cipher strength** policy setting does not apply to hardware-based encryption.
|
||||
> The **Choose drive encryption method and cipher strength** policy setting doesn't apply to hardware-based encryption.
|
||||
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive is not available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
The encryption algorithm that is used by hardware-based encryption is set when the drive is partitioned. By default, BitLocker uses the algorithm that is configured on the drive to encrypt the drive. The **Restrict encryption algorithms and cipher suites allowed for hardware-based encryption** option of this setting enables you to restrict the encryption algorithms that BitLocker can use with hardware encryption. If the algorithm that is set for the drive isn't available, BitLocker disables the use of hardware-based encryption. Encryption algorithms are specified by object identifiers (OID), for example:
|
||||
|
||||
- Advanced Encryption Standard (AES) 128 in Cipher Block Chaining (CBC) mode OID: 2.16.840.1.101.3.4.1.2
|
||||
- AES 256 in CBC mode OID: 2.16.840.1.101.3.4.1.42
|
||||
@ -722,7 +722,7 @@ This policy controls whether fixed data drives utilize Used Space Only encryptio
|
||||
|**Drive type**|Fixed data drive|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|This policy defines the encryption type that BitLocker uses to encrypt drives, and the encryption type option is not presented in the BitLocker Setup Wizard.|
|
||||
|**When enabled**|This policy defines the encryption type that BitLocker uses to encrypt drives, and the encryption type option isn't presented in the BitLocker Setup Wizard.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard asks the user to select the encryption type before turning on BitLocker.|
|
||||
|
||||
**Reference**
|
||||
@ -730,7 +730,7 @@ This policy controls whether fixed data drives utilize Used Space Only encryptio
|
||||
This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose Full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose Used Space Only encryption to require that only the portion of the drive that is used to store data is encrypted when BitLocker is turned on.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy is ignored when you are shrinking or expanding a volume and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space is not wiped as it would be for a drive that is using Full encryption. The user could wipe the free space on a Used Space Only drive by using the following command: **manage-bde -w**. If the volume is shrunk, no action is taken for the new free space.
|
||||
> This policy is ignored when you are shrinking or expanding a volume and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space isn't wiped as it would be for a drive that is using Full encryption. The user could wipe the free space on a Used Space Only drive by using the following command: `manage-bde -w`. If the volume is shrunk, no action is taken for the new free space.
|
||||
|
||||
For more information about the tool to manage BitLocker, see [Manage-bde](/windows-server/administration/windows-commands/manage-bde).
|
||||
|
||||
@ -745,7 +745,7 @@ This policy controls whether operating system drives utilize Full encryption or
|
||||
|**Drive type**|Operating system drive|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|The encryption type that BitLocker uses to encrypt drives is defined by this policy, and the encryption type option is not presented in the BitLocker Setup Wizard.|
|
||||
|**When enabled**|The encryption type that BitLocker uses to encrypt drives is defined by this policy, and the encryption type option isn't presented in the BitLocker Setup Wizard.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard asks the user to select the encryption type before turning on BitLocker.|
|
||||
|
||||
**Reference**
|
||||
@ -753,7 +753,7 @@ This policy controls whether operating system drives utilize Full encryption or
|
||||
This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose Full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose Used Space Only encryption to require that only the portion of the drive that is used to store data is encrypted when BitLocker is turned on.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy is ignored when shrinking or expanding a volume, and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space is not wiped as it would be for a drive that uses Full encryption. The user could wipe the free space on a Used Space Only drive by using the following command: **manage-bde -w**. If the volume is shrunk, no action is taken for the new free space.
|
||||
> This policy is ignored when shrinking or expanding a volume, and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space isn't wiped as it would be for a drive that uses Full encryption. The user could wipe the free space on a Used Space Only drive by using the following command: `manage-bde -w`. If the volume is shrunk, no action is taken for the new free space.
|
||||
|
||||
For more information about the tool to manage BitLocker, see [Manage-bde](/windows-server/administration/windows-commands/manage-bde).
|
||||
|
||||
@ -768,7 +768,7 @@ This policy controls whether fixed data drives utilize Full encryption or Used S
|
||||
|**Drive type**|Removable data drive|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|The encryption type that BitLocker uses to encrypt drives is defined by this policy, and the encryption type option is not presented in the BitLocker Setup Wizard.|
|
||||
|**When enabled**|The encryption type that BitLocker uses to encrypt drives is defined by this policy, and the encryption type option isn't presented in the BitLocker Setup Wizard.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard asks the user to select the encryption type before turning on BitLocker.|
|
||||
|
||||
**Reference**
|
||||
@ -776,7 +776,7 @@ This policy controls whether fixed data drives utilize Full encryption or Used S
|
||||
This policy setting is applied when you turn on BitLocker. Changing the encryption type has no effect if the drive is already encrypted or if encryption is in progress. Choose Full encryption to require that the entire drive be encrypted when BitLocker is turned on. Choose Used Space Only encryption to require that only the portion of the drive that is used to store data is encrypted when BitLocker is turned on.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy is ignored when shrinking or expanding a volume, and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space is not wiped as it would be for a drive that is using Full Encryption. The user could wipe the free space on a Used Space Only drive by using the following command: **manage-bde -w**. If the volume is shrunk, no action is taken for the new free space.
|
||||
> This policy is ignored when shrinking or expanding a volume, and the BitLocker driver uses the current encryption method. For example, when a drive that is using Used Space Only encryption is expanded, the new free space isn't wiped as it would be for a drive that is using Full Encryption. The user could wipe the free space on a Used Space Only drive by using the following command: `manage-bde -w`. If the volume is shrunk, no action is taken for the new free space.
|
||||
|
||||
For more information about the tool to manage BitLocker, see [Manage-bde](/windows-server/administration/windows-commands/manage-bde).
|
||||
|
||||
@ -792,7 +792,7 @@ This policy setting is used to configure recovery methods for operating system d
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|You must disallow the use of recovery keys if the **Deny write access to removable drives not protected by BitLocker** policy setting is enabled. </br> </br>When using data recovery agents, you must enable the **Provide the unique identifiers for your organization** policy setting.|
|
||||
|**When enabled**|You can control the methods that are available to users to recover data from BitLocker-protected operating system drives.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information is not backed up to AD DS.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information isn't backed up to AD DS.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -804,7 +804,7 @@ For more information about adding data recovery agents, see [BitLocker basic dep
|
||||
|
||||
In **Configure user storage of BitLocker recovery information**, select whether users are allowed, required, or not allowed to generate a 48-digit recovery password.
|
||||
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you will not be able to specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you can't specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for
|
||||
the drive are determined by the policy setting.
|
||||
|
||||
In **Save BitLocker recovery information to Active Directory Domain Services**, choose which BitLocker recovery information to store in Active Directory Domain Services (AD DS) for operating system drives. If you select **Store recovery password and key packages**, the BitLocker recovery password and the key package are stored in AD DS. Storing the key package supports recovering data from a drive that is physically corrupted. If you select **Store recovery password only**, only the recovery password is stored in AD DS.
|
||||
@ -825,7 +825,7 @@ This policy setting is used to configure recovery methods for BitLocker-protecte
|
||||
|**Drive type**|Operating system drives and fixed data drives on computers running Windows Server 2008 and Windows Vista|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption|
|
||||
|**Conflicts**|This policy setting provides an administrative method of recovering data that is encrypted by BitLocker to prevent data loss due to lack of key information. If you choose the **Do not allow** option for both user recovery options, you must enable the **Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)** policy setting to prevent a policy error.|
|
||||
|**When enabled**|You can configure the options that the Bitlocker Setup Wizard displays to users for recovering BitLocker encrypted data.|
|
||||
|**When enabled**|You can configure the options that the BitLocker Setup Wizard displays to users for recovering BitLocker encrypted data.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard presents users with ways to store recovery options.|
|
||||
|
||||
**Reference**
|
||||
@ -838,10 +838,10 @@ Saving the recovery password to a USB drive stores the 48-digit recovery passwor
|
||||
|
||||
> [!IMPORTANT]
|
||||
> If TPM initialization is performed during the BitLocker setup, TPM owner information is saved or printed with the BitLocker recovery information.
|
||||
> The 48-digit recovery password is not available in FIPS-compliance mode.
|
||||
> The 48-digit recovery password isn't available in FIPS-compliance mode.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To prevent data loss, you must have a way to recover BitLocker encryption keys. If you do not allow both recovery options, you must enable the backup of BitLocker recovery information to AD DS. Otherwise, a policy error occurs.
|
||||
> To prevent data loss, you must have a way to recover BitLocker encryption keys. If you don't allow both recovery options, you must enable the backup of BitLocker recovery information to AD DS. Otherwise, a policy error occurs.
|
||||
|
||||
### <a href="" id="bkmk-rec3"></a>Store BitLocker recovery information in Active Directory Domain Services (Windows Server 2008 and Windows Vista)
|
||||
|
||||
@ -855,7 +855,7 @@ This policy setting is used to configure the storage of BitLocker recovery infor
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|BitLocker recovery information is automatically and silently backed up to AD DS when BitLocker is turned on for a computer.|
|
||||
|**When disabled or not configured**|BitLocker recovery information is not backed up to AD DS.|
|
||||
|**When disabled or not configured**|BitLocker recovery information isn't backed up to AD DS.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -865,11 +865,11 @@ This policy setting is applied when you turn on BitLocker.
|
||||
|
||||
BitLocker recovery information includes the recovery password and unique identifier data. You can also include a package that contains an encryption key for a BitLocker-protected drive. This key package is secured by one or more recovery passwords, and it can help perform specialized recovery when the disk is damaged or corrupted.
|
||||
|
||||
If you select **Require BitLocker backup to AD DS**, BitLocker cannot be turned on unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. This option is selected by default to help ensure that BitLocker recovery is possible.
|
||||
If you select **Require BitLocker backup to AD DS**, BitLocker can't be turned on unless the computer is connected to the domain and the backup of BitLocker recovery information to AD DS succeeds. This option is selected by default to help ensure that BitLocker recovery is possible.
|
||||
|
||||
A recovery password is a 48-digit number that unlocks access to a BitLocker-protected drive. A key package contains a drive’s BitLocker encryption key, which is secured by one or more recovery passwords. Key packages may help perform specialized recovery when the disk is damaged or corrupted.
|
||||
|
||||
If the **Require BitLocker backup to AD DS** option is not selected, AD DS backup is attempted, but network or other backup failures do not prevent the BitLocker setup. The Backup process is not automatically retried, and the recovery password might not be stored in AD DS during BitLocker setup.
|
||||
If the **Require BitLocker backup to AD DS** option isn't selected, AD DS backup is attempted, but network or other backup failures don't prevent the BitLocker setup. The Backup process isn't automatically retried, and the recovery password might not be stored in AD DS during BitLocker setup.
|
||||
TPM initialization might be needed during the BitLocker setup. Enable the **Turn on TPM backup to Active Directory Domain Services** policy setting in **Computer Configuration\\Administrative Templates\\System\\Trusted Platform Module Services** to ensure that TPM information is also backed up.
|
||||
|
||||
For more information about this setting, see [TPM Group Policy settings](/windows/device-security/tpm/trusted-platform-module-services-group-policy-settings).
|
||||
@ -885,7 +885,7 @@ This policy setting is used to configure the default folder for recovery passwor
|
||||
|**Drive type**|All drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can specify the path that will be used as the default folder location when the user chooses the option to save the recovery password in a folder. You can specify a fully qualified path or include the target computer's environment variables in the path. If the path is not valid, the BitLocker Setup Wizard displays the computer's top-level folder view.|
|
||||
|**When enabled**|You can specify the path that will be used as the default folder location when the user chooses the option to save the recovery password in a folder. You can specify a fully qualified path or include the target computer's environment variables in the path. If the path isn't valid, the BitLocker Setup Wizard displays the computer's top-level folder view.|
|
||||
|**When disabled or not configured**|The BitLocker Setup Wizard displays the computer's top-level folder view when the user chooses the option to save the recovery password in a folder.|
|
||||
|
||||
**Reference**
|
||||
@ -893,7 +893,7 @@ This policy setting is used to configure the default folder for recovery passwor
|
||||
This policy setting is applied when you turn on BitLocker.
|
||||
|
||||
> [!NOTE]
|
||||
> This policy setting does not prevent the user from saving the recovery password in another folder.
|
||||
> This policy setting doesn't prevent the user from saving the recovery password in another folder.
|
||||
|
||||
### <a href="" id="bkmk-rec6"></a>Choose how BitLocker-protected fixed drives can be recovered
|
||||
|
||||
@ -907,7 +907,7 @@ This policy setting is used to configure recovery methods for fixed data drives.
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|You must disallow the use of recovery keys if the **Deny write access to removable drives not protected by BitLocker** policy setting is enabled. </br> </br>When using data recovery agents, you must enable and configure the **Provide the unique identifiers for your organization** policy setting.|
|
||||
|**When enabled**|You can control the methods that are available to users to recover data from BitLocker-protected fixed data drives.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information is not backed up to AD DS.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information isn't backed up to AD DS.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -917,10 +917,10 @@ The **Allow data recovery agent** check box is used to specify whether a data re
|
||||
|
||||
In **Configure user storage of BitLocker recovery information**, select whether users are allowed, required, or not allowed to generate a 48-digit recovery password or a 256-bit recovery key.
|
||||
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you cannot specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for the drive are determined by the policy setting.
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you can't specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for the drive are determined by the policy setting.
|
||||
|
||||
In **Save BitLocker recovery information to Active Directory Domain Services**, choose which BitLocker recovery information to store in AD DS for fixed data drives. If you select **Backup recovery password and key package**, the BitLocker recovery password and the key package are stored in AD DS.
|
||||
Storing the key package supports recovering data from a drive that has been physically corrupted. To recover this data, you can use the **Repair-bde** command-line tool. If you select **Backup recovery password only**, only the recovery password is stored in AD DS.
|
||||
Storing the key package supports recovering data from a drive that has been physically corrupted. To recover this data, you can use the `Repair-bde` command-line tool. If you select **Backup recovery password only**, only the recovery password is stored in AD DS.
|
||||
|
||||
For more information about the BitLocker repair tool, see [Repair-bde](/windows-server/administration/windows-commands/repair-bde).
|
||||
|
||||
@ -941,7 +941,7 @@ This policy setting is used to configure recovery methods for removable data dri
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|You must disallow the use of recovery keys if the **Deny write access to removable drives not protected by BitLocker** policy setting is enabled. </br> </br>When using data recovery agents, you must enable and configure the **Provide the unique identifiers for your organization** policy setting.|
|
||||
|**When enabled**|You can control the methods that are available to users to recover data from BitLocker-protected removable data drives.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information is not backed up to AD DS.|
|
||||
|**When disabled or not configured**|The default recovery options are supported for BitLocker recovery. By default, a data recovery agent is allowed, the recovery options can be specified by the user (including the recovery password and recovery key), and recovery information isn't backed up to AD DS.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -951,7 +951,7 @@ The **Allow data recovery agent** check box is used to specify whether a data re
|
||||
|
||||
In **Configure user storage of BitLocker recovery information**, select whether users are allowed, required, or not allowed to generate a 48-digit recovery password.
|
||||
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you cannot specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for the drive are determined by the policy setting.
|
||||
Select **Omit recovery options from the BitLocker setup wizard** to prevent users from specifying recovery options when they enable BitLocker on a drive. This means that you can't specify which recovery option to use when you enable BitLocker. Instead, BitLocker recovery options for the drive are determined by the policy setting.
|
||||
|
||||
In **Save BitLocker recovery information to Active Directory Domain Services**, choose which BitLocker recovery information to store in AD DS for removable data drives. If you select **Backup recovery password and key package**, the BitLocker recovery password and the key package are stored in AD DS. If you select **Backup recovery password only**, only the recovery password is stored in AD DS.
|
||||
|
||||
@ -972,13 +972,13 @@ This policy setting is used to configure the entire recovery message and to repl
|
||||
|**Policy path**|Computer Configuration \ Administrative Templates \ Windows Components \ BitLocker Drive Encryption \ Operating System Drives \ Configure pre-boot recovery message and URL|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|The customized message and URL are displayed on the pre-boot recovery screen. If you have previously enabled a custom recovery message and URL and want to revert to the default message and URL, you must keep the policy setting enabled and select the **Use default recovery message and URL** option.|
|
||||
|**When disabled or not configured**|If the setting has not been previously enabled the default pre-boot recovery screen is displayed for BitLocker recovery. If the setting previously was enabled and is subsequently disabled the last message in Boot Configuration Data (BCD) is displayed whether it was the default recovery message or the custom message.|
|
||||
|**When disabled or not configured**|If the setting hasn't been previously enabled, then the default pre-boot recovery screen is displayed for BitLocker recovery. If the setting previously was enabled and is later disabled, then the last message in Boot Configuration Data (BCD) is displayed whether it was the default recovery message or the custom message.|
|
||||
|
||||
**Reference**
|
||||
|
||||
Enabling the **Configure the pre-boot recovery message and URL** policy setting allows you to customize the default recovery screen message and URL to assist customers in recovering their key.
|
||||
|
||||
Once you enable the setting you have three options:
|
||||
Once you enable the setting, you have three options:
|
||||
|
||||
- If you select the **Use default recovery message and URL** option, the default BitLocker recovery message and URL will be displayed on the pre-boot recovery screen.
|
||||
- If you select the **Use custom recovery message** option, type the custom message in the **Custom recovery message option** text box. The message that you type in the **Custom recovery message option** text box will be displayed on the pre-boot recovery screen. If a recovery URL is available, include it in the message.
|
||||
@ -988,11 +988,11 @@ Once you enable the setting you have three options:
|
||||
> Not all characters and languages are supported in the pre-boot environment. We strongly recommended that you verify the correct appearance of the characters that you use for the custom message and URL on the pre-boot recovery screen.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Because you can alter the BCDEdit commands manually before you have set Group Policy settings, you cannot return the policy setting to the default setting by selecting the **Not Configured** option after you have configured this policy setting. To return to the default pre-boot recovery screen leave the policy setting enabled and select the **Use default message** options from the **Choose an option for the pre-boot recovery message** drop-down list box.
|
||||
> Because you can alter the BCDEdit commands manually before you have set Group Policy settings, you can't return the policy setting to the default setting by selecting the **Not Configured** option after you have configured this policy setting. To return to the default pre-boot recovery screen leave the policy setting enabled and select the **Use default message** options from the **Choose an option for the pre-boot recovery message** drop-down list box.
|
||||
|
||||
### <a href="" id="bkmk-secboot"></a>Allow Secure Boot for integrity validation
|
||||
|
||||
This policy controls how BitLocker-enabled system volumes are handled in conjunction with the Secure Boot feature. Enabling this feature forces Secure Boot validation during the boot process and verifies Boot Configuration Data (BCD) settings according to the Secure Boot policy.
|
||||
This policy controls how BitLocker-enabled system volumes are handled with the Secure Boot feature. Enabling this feature forces Secure Boot validation during the boot process and verifies Boot Configuration Data (BCD) settings according to the Secure Boot policy.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -1000,7 +1000,7 @@ This policy controls how BitLocker-enabled system volumes are handled in conjunc
|
||||
|**Introduced**|Windows Server 2012 and Windows 8|
|
||||
|**Drive type**|All drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|If you enable **Allow Secure Boot for integrity validation**, make sure the **Configure TPM platform validation profile for native UEFI firmware configurations** Group Policy setting is not enabled or include PCR 7 to allow BitLocker to use Secure Boot for platform or BCD integrity validation. <P> For more information about PCR 7, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this topic.|
|
||||
|**Conflicts**|If you enable **Allow Secure Boot for integrity validation**, make sure the **Configure TPM platform validation profile for native UEFI firmware configurations** Group Policy setting isn't enabled or include PCR 7 to allow BitLocker to use Secure Boot for platform or BCD integrity validation. <P> For more information about PCR 7, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this article.|
|
||||
|**When enabled or not configured**|BitLocker uses Secure Boot for platform integrity if the platform is capable of Secure Boot-based integrity validation.|
|
||||
|**When disabled**|BitLocker uses legacy platform integrity validation, even on systems that are capable of Secure Boot-based integrity validation.|
|
||||
|
||||
@ -1022,9 +1022,9 @@ This policy setting is used to establish an identifier that is applied to all dr
|
||||
|**Introduced**|Windows Server 2008 R2 and Windows 7|
|
||||
|**Drive type**|All drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption|
|
||||
|**Conflicts**|Identification fields are required to manage certificate-based data recovery agents on BitLocker-protected drives. BitLocker manages and updates certificate-based data recovery agents only when the identification field is present on a drive and it is identical to the value that is configured on the computer.|
|
||||
|**Conflicts**|Identification fields are required to manage certificate-based data recovery agents on BitLocker-protected drives. BitLocker manages and updates certificate-based data recovery agents only when the identification field is present on a drive and it's identical to the value that is configured on the computer.|
|
||||
|**When enabled**|You can configure the identification field on the BitLocker-protected drive and any allowed identification field that is used by your organization.|
|
||||
|**When disabled or not configured**|The identification field is not required.|
|
||||
|**When disabled or not configured**|The identification field isn't required.|
|
||||
|
||||
**Reference**
|
||||
|
||||
@ -1034,7 +1034,7 @@ An identification field is required to manage certificate-based data recovery ag
|
||||
|
||||
For more information about the tool to manage BitLocker, see [Manage-bde](/windows-server/administration/windows-commands/manage-bde).
|
||||
|
||||
The allowed identification field is used in combination with the **Deny write access to removable drives not protected by BitLocker** policy setting to help control the use of removable drives in your organization. It is a comma-separated list of identification fields from your organization or external organizations.
|
||||
The allowed identification field is used in combination with the **Deny write access to removable drives not protected by BitLocker** policy setting to help control the use of removable drives in your organization. It's a comma-separated list of identification fields from your organization or external organizations.
|
||||
|
||||
You can configure the identification fields on existing drives by using the [Manage-bde](/windows-server/administration/windows-commands/manage-bde) command-line tool.
|
||||
|
||||
@ -1071,12 +1071,12 @@ This policy setting determines what values the TPM measures when it validates ea
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can configure the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**When enabled**|You can configure the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, then the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**When disabled or not configured**|The TPM uses the default platform validation profile or the platform validation profile that is specified by the setup script.|
|
||||
|
||||
**Reference**
|
||||
|
||||
This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker has already been turned on with TPM protection.
|
||||
This policy setting doesn't apply if the computer doesn't have a compatible TPM or if BitLocker has already been turned on with TPM protection.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This Group Policy setting only applies to computers with BIOS configurations or to computers with UEFI firmware with the CSM enabled. Computers that use a native UEFI firmware configuration store different values in the Platform Configuration Registers (PCRs). Use the **Configure TPM platform validation profile for native UEFI firmware configurations** Group Policy setting to configure the TPM PCR profile for computers that use native UEFI firmware.
|
||||
@ -1121,12 +1121,12 @@ This policy setting determines what values the TPM measures when it validates ea
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|You can configure the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**When enabled**|You can configure the boot components that the TPM validates before unlocking access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**When disabled or not configured**|The TPM uses the default platform validation profile or the platform validation profile that is specified by the setup script.|
|
||||
|
||||
**Reference**
|
||||
|
||||
This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker is already turned on with TPM protection.
|
||||
This policy setting doesn't apply if the computer doesn't have a compatible TPM or if BitLocker is already turned on with TPM protection.
|
||||
|
||||
A platform validation profile consists of a set of PCR indices that range from 0 to 23. The default platform validation profile secures the encryption key against changes to the following:
|
||||
|
||||
@ -1170,13 +1170,13 @@ This policy setting determines what values the TPM measures when it validates ea
|
||||
|**Introduced**|Windows Server 2012 and Windows 8|
|
||||
|**Drive type**|Operating system drives|
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|Setting this policy with PCR 7 omitted, overrides the **Allow Secure Boot for integrity validation** Group Policy setting, and it prevents BitLocker from using Secure Boot for platform or Boot Configuration Data (BCD) integrity validation. <br/><p> If your environments use TPM and Secure Boot for platform integrity checks, this policy should not be configured. <p> For more information about PCR 7, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this topic.|
|
||||
|**When enabled**|Before you turn on BitLocker, you can configure the boot components that the TPM validates before it unlocks access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM does not release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**Conflicts**|Setting this policy with PCR 7 omitted, overrides the **Allow Secure Boot for integrity validation** Group Policy setting, and it prevents BitLocker from using Secure Boot for platform or Boot Configuration Data (BCD) integrity validation. <br/><p> If your environments use TPM and Secure Boot for platform integrity checks, this policy is configured. <p> For more information about PCR 7, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this article.|
|
||||
|**When enabled**|Before you turn on BitLocker, you can configure the boot components that the TPM validates before it unlocks access to the BitLocker-encrypted operating system drive. If any of these components change while BitLocker protection is in effect, the TPM doesn't release the encryption key to unlock the drive. Instead, the computer displays the BitLocker Recovery console and requires that the recovery password or the recovery key is provided to unlock the drive.|
|
||||
|**When disabled or not configured**|BitLocker uses the default platform validation profile or the platform validation profile that is specified by the setup script.|
|
||||
|
||||
**Reference**
|
||||
|
||||
This policy setting does not apply if the computer does not have a compatible TPM or if BitLocker is already turned on with TPM protection.
|
||||
This policy setting doesn't apply if the computer doesn't have a compatible TPM or if BitLocker is already turned on with TPM protection.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> This Group Policy setting only applies to computers with a native UEFI firmware configuration. Computers with BIOS or UEFI firmware with a Compatibility Support Module (CSM) enabled store different values in the Platform Configuration Registers (PCRs). Use the **Configure TPM platform validation profile for BIOS-based firmware configurations** Group Policy setting to configure the TPM PCR profile for computers with BIOS configurations or for computers with UEFI firmware with a CSM enabled.
|
||||
@ -1194,7 +1194,7 @@ The following list identifies all of the PCRs available:
|
||||
- PCR 6: Resume from S4 and S5 Power State Events
|
||||
- PCR 7: Secure Boot State
|
||||
|
||||
For more information about this PCR, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this topic.
|
||||
For more information about this PCR, see [Platform Configuration Register (PCR)](#bkmk-pcr) in this article.
|
||||
|
||||
- PCR 8: Initialized to 0 with no Extends (reserved for future use)
|
||||
- PCR 9: Initialized to 0 with no Extends (reserved for future use)
|
||||
@ -1220,7 +1220,7 @@ This policy setting determines if you want platform validation data to refresh w
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Operating System Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled**|Platform validation data is refreshed when Windows is started following a BitLocker recovery.|
|
||||
|**When disabled**|Platform validation data is not refreshed when Windows is started following a BitLocker recovery.|
|
||||
|**When disabled**|Platform validation data isn't refreshed when Windows is started following a BitLocker recovery.|
|
||||
|**When not configured**|Platform validation data is refreshed when Windows is started following a BitLocker recovery.|
|
||||
|
||||
**Reference**
|
||||
@ -1245,7 +1245,7 @@ This policy setting determines specific Boot Configuration Data (BCD) settings t
|
||||
**Reference**
|
||||
|
||||
> [!NOTE]
|
||||
> The setting that controls boot debugging (0x16000010) is always validated, and it has no effect if it is included in the inclusion or the exclusion list.
|
||||
> The setting that controls boot debugging (0x16000010) is always validated, and it has no effect if it's included in the inclusion or the exclusion list.
|
||||
|
||||
### <a href="" id="bkmk-depopt4"></a>Allow access to BitLocker-protected fixed data drives from earlier versions of Windows
|
||||
|
||||
@ -1259,14 +1259,14 @@ This policy setting is used to control whether access to drives is allowed by us
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Fixed Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled and When not configured**|Fixed data drives that are formatted with the FAT file system can be unlocked on computers running Windows Server 2008, Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have Read-only access to BitLocker-protected drives.|
|
||||
|**When disabled**|Fixed data drives that are formatted with the FAT file system and are BitLocker-protected cannot be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2. BitLocker To Go Reader (bitlockertogo.exe) is not installed.|
|
||||
|**When disabled**|Fixed data drives that are formatted with the FAT file system and are BitLocker-protected can't be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2. BitLocker To Go Reader (bitlockertogo.exe) isn't installed.|
|
||||
|
||||
**Reference**
|
||||
|
||||
> [!NOTE]
|
||||
> This policy setting does not apply to drives that are formatted with the NTFS file system.
|
||||
> This policy setting doesn't apply to drives that are formatted with the NTFS file system.
|
||||
|
||||
When this policy setting is enabled, select the **Do not install BitLocker To Go Reader on FAT formatted fixed drives** check box to help prevent users from running BitLocker To Go Reader from their fixed drives. If BitLocker To Go Reader (bitlockertogo.exe) is present on a drive that does not have an identification field specified, or if the drive has the same identification field as specified in the **Provide unique identifiers for your organization** policy setting, the user is prompted to update BitLocker, and BitLocker To Go Reader is deleted from the drive. In this situation, for the fixed drive to be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2, BitLocker To Go Reader must be installed on the computer. If this check box is not selected, BitLocker To Go Reader will be installed on the fixed drive to enable users to unlock the drive on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2.
|
||||
When this policy setting is enabled, select the **Do not install BitLocker To Go Reader on FAT formatted fixed drives** check box to help prevent users from running BitLocker To Go Reader from their fixed drives. If BitLocker To Go Reader (bitlockertogo.exe) is present on a drive that doesn't have an identification field specified, or if the drive has the same identification field as specified in the **Provide unique identifiers for your organization** policy setting, the user is prompted to update BitLocker, and BitLocker To Go Reader is deleted from the drive. In this situation, for the fixed drive to be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2, BitLocker To Go Reader must be installed on the computer. If this check box isn't selected, then BitLocker To Go Reader will be installed on the fixed drive to enable users to unlock the drive on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2.
|
||||
|
||||
### <a href="" id="bkmk-depopt5"></a>Allow access to BitLocker-protected removable data drives from earlier versions of Windows
|
||||
|
||||
@ -1280,18 +1280,18 @@ This policy setting controls access to removable data drives that are using the
|
||||
|**Policy path**|Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives|
|
||||
|**Conflicts**|None|
|
||||
|**When enabled and When not configured**|Removable data drives that are formatted with the FAT file system can be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2, and their content can be viewed. These operating systems have Read-only access to BitLocker-protected drives.|
|
||||
|**When disabled**|Removable data drives that are formatted with the FAT file system that are BitLocker-protected cannot be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2. BitLocker To Go Reader (bitlockertogo.exe) is not installed.|
|
||||
|**When disabled**|Removable data drives that are formatted with the FAT file system that are BitLocker-protected can't be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2. BitLocker To Go Reader (bitlockertogo.exe) isn't installed.|
|
||||
|
||||
**Reference**
|
||||
|
||||
> [!NOTE]
|
||||
> This policy setting does not apply to drives that are formatted with the NTFS file system.
|
||||
> This policy setting doesn't apply to drives that are formatted with the NTFS file system.
|
||||
|
||||
When this policy setting is enabled, select the **Do not install BitLocker To Go Reader on FAT formatted removable drives** check box to help prevent users from running BitLocker To Go Reader from their removable drives. If BitLocker To Go Reader (bitlockertogo.exe) is present on a drive that does not have an identification field specified, or if the drive has the same identification field as specified in the **Provide unique identifiers for your organization** policy setting, the user will be prompted to update BitLocker, and BitLocker To Go Reader is deleted from the drive. In this situation, for the removable drive to be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2, BitLocker To Go Reader must be installed on the computer. If this check box is not selected, BitLocker To Go Reader will be installed on the removable drive to enable users to unlock the drive on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2 that do not have BitLocker To Go Reader installed.
|
||||
When this policy setting is enabled, select the **Do not install BitLocker To Go Reader on FAT formatted removable drives** check box to help prevent users from running BitLocker To Go Reader from their removable drives. If BitLocker To Go Reader (bitlockertogo.exe) is present on a drive that doesn't have an identification field specified, or if the drive has the same identification field as specified in the **Provide unique identifiers for your organization** policy setting, the user will be prompted to update BitLocker, and BitLocker To Go Reader is deleted from the drive. In this situation, for the removable drive to be unlocked on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2, BitLocker To Go Reader must be installed on the computer. If this check box isn't selected, then BitLocker To Go Reader will be installed on the removable drive to enable users to unlock the drive on computers running Windows Vista, Windows XP with SP3, or Windows XP with SP2 that don't have BitLocker To Go Reader installed.
|
||||
|
||||
## FIPS setting
|
||||
|
||||
You can configure the Federal Information Processing Standard (FIPS) setting for FIPS compliance. As an effect of FIPS compliance, users cannot create or save a BitLocker password for recovery or as a key protector. The use of a recovery key is permitted.
|
||||
You can configure the Federal Information Processing Standard (FIPS) setting for FIPS compliance. As an effect of FIPS compliance, users can't create or save a BitLocker password for recovery or as a key protector. The use of a recovery key is permitted.
|
||||
|
||||
| | |
|
||||
|:---|:---|
|
||||
@ -1299,15 +1299,15 @@ You can configure the Federal Information Processing Standard (FIPS) setting for
|
||||
|**Introduced**|Windows Server 2003 with SP1|
|
||||
|**Drive type**|System-wide|
|
||||
|**Policy path**|Local Policies\Security Options\System cryptography: **Use FIPS compliant algorithms for encryption, hashing, and signing**|
|
||||
|**Conflicts**|Some applications, such as Terminal Services, do not support FIPS-140 on all operating systems.|
|
||||
|**When enabled**|Users will be unable to save a recovery password to any location. This includes AD DS and network folders. In addition, you cannot use WMI or the BitLocker Drive Encryption Setup wizard to create a recovery password.|
|
||||
|**Conflicts**|Some applications, such as Terminal Services, don't support FIPS-140 on all operating systems.|
|
||||
|**When enabled**|Users will be unable to save a recovery password to any location. This includes AD DS and network folders. Also, you can't use WMI or the BitLocker Drive Encryption Setup wizard to create a recovery password.|
|
||||
|**When disabled or not configured**|No BitLocker encryption key is generated|
|
||||
|
||||
**Reference**
|
||||
|
||||
This policy needs to be enabled before any encryption key is generated for BitLocker. Note that when this policy is enabled, BitLocker prevents creating or using recovery passwords, so recovery keys should be used instead.
|
||||
This policy must be enabled before any encryption key is generated for BitLocker. When this policy is enabled, BitLocker prevents creating or using recovery passwords, so recovery keys should be used instead.
|
||||
|
||||
You can save the optional recovery key to a USB drive. Because recovery passwords cannot be saved to AD DS when FIPS is enabled, an error is caused if AD DS backup is required by Group Policy.
|
||||
You can save the optional recovery key to a USB drive. Because recovery passwords can't be saved to AD DS when FIPS is enabled, an error is caused if AD DS backup is required by Group Policy.
|
||||
|
||||
You can edit the FIPS setting by using the Security Policy Editor (Secpol.msc) or by editing the Windows registry. You must be an administrator to perform these procedures.
|
||||
|
||||
@ -1315,11 +1315,11 @@ For more information about setting this policy, see [System cryptography: Use FI
|
||||
|
||||
## Power management Group Policy settings: Sleep and Hibernate
|
||||
|
||||
PCs default power settings for a computer will cause the computer to enter Sleep mode frequently to conserve power when idle and to help extend the system’s battery life. When a computer transitions to Sleep, open programs and documents are persisted in memory. When a computer resumes from Sleep, users are not required to re-authenticate with a PIN or USB startup key to access encrypted data. This might lead to conditions where data security is compromised.
|
||||
PCs default power settings for a computer will cause the computer to enter Sleep mode frequently to conserve power when idle and to help extend the system’s battery life. When a computer transitions to Sleep, open programs and documents are persisted in memory. When a computer resumes from Sleep, users aren't required to reauthenticate with a PIN or USB startup key to access encrypted data. This might lead to conditions where data security is compromised.
|
||||
|
||||
However, when a computer hibernates the drive is locked, and when it resumes from hibernation the drive is unlocked, which means that users will need to provide a PIN or a startup key if using multifactor authentication with BitLocker. Therefore, organizations that use BitLocker may want to use Hibernate instead of Sleep for improved security. This setting does not have an impact on TPM-only mode, because it provides a transparent user experience at startup and when resuming from the Hibernate states.
|
||||
However, when a computer hibernates the drive is locked, and when it resumes from hibernation the drive is unlocked, which means that users will need to provide a PIN or a startup key if using multifactor authentication with BitLocker. Therefore, organizations that use BitLocker may want to use Hibernate instead of Sleep for improved security. This setting doesn't have an impact on TPM-only mode, because it provides a transparent user experience at startup and when resuming from the Hibernate states.
|
||||
|
||||
You can use disable the following Group Policy settings, which are located in **Computer Configuration\\Administrative Templates\\System\\Power Management** to disable all available sleep states:
|
||||
You can disable the following Group Policy settings, which are located in **Computer Configuration\\Administrative Templates\\System\\Power Management** to disable all available sleep states:
|
||||
|
||||
- Allow Standby States (S1-S3) When Sleeping (Plugged In)
|
||||
- Allow Standby States (S1-S3) When Sleeping (Battery)
|
||||
@ -1332,7 +1332,7 @@ Changing from the default platform validation profile affects the security and m
|
||||
|
||||
**About PCR 7**
|
||||
|
||||
PCR 7 measures the state of Secure Boot. With PCR 7, BitLocker can leverage Secure Boot for integrity validation. Secure Boot ensures that the computer's preboot environment loads only firmware that is digitally signed by authorized software publishers. PCR 7 measurements indicate whether Secure Boot is on and which keys are trusted on the platform. If Secure Boot is on and the firmware measures PCR 7 correctly per the UEFI specification, BitLocker can bind to this information rather than to PCRs 0, 2, and 4 which have the measurements of the exact firmware and Bootmgr images loaded. This
|
||||
PCR 7 measures the state of Secure Boot. With PCR 7, BitLocker can use Secure Boot for integrity validation. Secure Boot ensures that the computer's preboot environment loads only firmware that is digitally signed by authorized software publishers. PCR 7 measurements indicate whether Secure Boot is on and which keys are trusted on the platform. If Secure Boot is on and the firmware measures PCR 7 correctly per the UEFI specification, BitLocker can bind to this information rather than to PCRs 0, 2, and 4, which have the measurements of the exact firmware and Bootmgr images loaded. This
|
||||
reduces the likelihood of BitLocker starting in recovery mode as a result of firmware and image updates, and it provides you with greater flexibility to manage the preboot configuration.
|
||||
|
||||
PCR 7 measurements must follow the guidance that is described in [Appendix A Trusted Execution Environment EFI Protocol](/windows-hardware/test/hlk/testref/trusted-execution-environment-efi-protocol).
|
||||
|
@ -19,7 +19,7 @@ ms.reviewer:
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10, version 1607 and later
|
||||
- Windows 10, version 1607 and later
|
||||
|
||||
Microsoft Intune has an easy way to create and deploy a Windows Information Protection (WIP) policy. You can choose which apps to protect, the level of protection, and how to find enterprise data on the network. The devices can be fully managed by Mobile Device Management (MDM), or managed by Mobile Application Management (MAM), where Intune manages only the apps on a user's personal device.
|
||||
|
||||
@ -27,10 +27,10 @@ Microsoft Intune has an easy way to create and deploy a Windows Information Prot
|
||||
|
||||
You can create an app protection policy in Intune either with device enrollment for MDM or without device enrollment for MAM. The process to create either policy is similar, but there are important differences:
|
||||
|
||||
- MAM has additional **Access** settings for Windows Hello for Business.
|
||||
- MAM has more **Access** settings for Windows Hello for Business.
|
||||
- MAM can [selectively wipe company data](/intune/apps-selective-wipe) from a user's personal device.
|
||||
- MAM requires an [Azure Active Directory (Azure AD) Premium license](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses).
|
||||
- An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM.
|
||||
- An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and regain access to protected data. WIP auto-recovery depends on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM.
|
||||
- MAM supports only one user per device.
|
||||
- MAM can only manage [enlightened apps](enlightened-microsoft-apps-and-wip.md).
|
||||
- Only MDM can use [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp) policies.
|
||||
@ -39,15 +39,15 @@ You can create an app protection policy in Intune either with device enrollment
|
||||
|
||||
## Prerequisites
|
||||
|
||||
Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Directory (Azure AD) Premium license](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and re-gain access to protected data. WIP auto-recovery relies on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM.
|
||||
Before you can create a WIP policy using Intune, you need to configure an MDM or MAM provider in Azure Active Directory (Azure AD). MAM requires an [Azure Active Directory (Azure AD) Premium license](/azure/active-directory/fundamentals/active-directory-whatis#what-are-the-azure-ad-licenses). An Azure AD Premium license is also required for WIP auto-recovery, where a device can re-enroll and regain access to protected data. WIP auto-recovery relies on Azure AD registration to back up the encryption keys, which requires device auto-enrollment with MDM.
|
||||
|
||||
## Configure the MDM or MAM provider
|
||||
|
||||
1. Sign in to the Azure portal.
|
||||
|
||||
2. Click **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**.
|
||||
2. Select **Azure Active Directory** > **Mobility (MDM and MAM)** > **Microsoft Intune**.
|
||||
|
||||
3. Click **Restore Default URLs** or enter the settings for MDM or MAM user scope and click **Save**:
|
||||
3. Select **Restore Default URLs** or enter the settings for MDM or MAM user scope and select **Save**:
|
||||
|
||||

|
||||
|
||||
@ -55,11 +55,11 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or
|
||||
|
||||
1. Sign in to the [Microsoft Endpoint Manager](https://endpoint.microsoft.com/).
|
||||
|
||||
2. Open Microsoft Intune and click **Apps** > **App protection policies** > **Create policy**.
|
||||
2. Open Microsoft Intune and select **Apps** > **App protection policies** > **Create policy**.
|
||||
|
||||

|
||||
|
||||
3. In the **App policy** screen, click **Add a policy**, and then fill out the fields:
|
||||
3. In the **App policy** screen, select **Add a policy**, and then fill out the fields:
|
||||
|
||||
- **Name.** Type a name (required) for your new policy.
|
||||
|
||||
@ -71,7 +71,7 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or
|
||||
|
||||

|
||||
|
||||
4. Click **Protected apps** and then click **Add apps**.
|
||||
4. Select **Protected apps** and then select **Add apps**.
|
||||
|
||||

|
||||
|
||||
@ -86,13 +86,13 @@ Before you can create a WIP policy using Intune, you need to configure an MDM or
|
||||
|
||||
### Add recommended apps
|
||||
|
||||
Select **Recommended apps** and select each app you want to access your enterprise data or select them all, and click **OK**.
|
||||
Select **Recommended apps** and select each app you want to access your enterprise data or select them all, and select **OK**.
|
||||
|
||||

|
||||
|
||||
### Add Store apps
|
||||
|
||||
Select **Store apps**, type the app product name and publisher, and click **OK**. For example, to add the Power BI Mobile App from the Store, type the following:
|
||||
Select **Store apps**, type the app product name and publisher, and select **OK**. For example, to add the Power BI Mobile App from the Store, type the following:
|
||||
|
||||
- **Name**: Microsoft Power BI
|
||||
- **Publisher**: `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US`
|
||||
@ -100,15 +100,15 @@ Select **Store apps**, type the app product name and publisher, and click **OK**
|
||||
|
||||

|
||||
|
||||
To add multiple Store apps, click the ellipsis **…**.
|
||||
To add multiple Store apps, select the ellipsis `…`.
|
||||
|
||||
If you don't know the Store app publisher or product name, you can find them by following these steps.
|
||||
|
||||
1. Go to the [Microsoft Store for Business](https://go.microsoft.com/fwlink/p/?LinkID=722910) website, and find your app. For example, *Power BI Mobile App*.
|
||||
|
||||
2. Copy the ID value from the app URL. For example, the Power BI Mobile App ID URL is https://www.microsoft.com/store/p/microsoft-power-bi/9nblgggzlxn1, and you'd copy the ID value, `9nblgggzlxn1`.
|
||||
2. Copy the ID value from the app URL. For example, the Power BI Mobile App ID URL is `https://www.microsoft.com/store/p/microsoft-power-bi/9nblgggzlxn1`, and you'd copy the ID value, `9nblgggzlxn1`.
|
||||
|
||||
3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata, where `9nblgggzlxn1` is replaced with your ID value.
|
||||
3. In a browser, run the Store for Business portal web API, to return a JavaScript Object Notation (JSON) file that includes the publisher and product name values. For example, run `https://bspmts.mp.microsoft.com/v1/public/catalog/Retail/Products/9nblgggzlxn1/applockerdata`, where `9nblgggzlxn1` is replaced with your ID value.
|
||||
|
||||
The API runs and opens a text editor with the app details.
|
||||
|
||||
@ -131,6 +131,7 @@ If you don't know the Store app publisher or product name, you can find them by
|
||||
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||
> }
|
||||
|
||||
<!-- 01.06.2022 mandia: Commenting out, as these events are specific to Windows Phone.
|
||||
|
||||
> [!NOTE]
|
||||
> Your PC and phone must be on the same wireless network.
|
||||
@ -159,6 +160,8 @@ If you don't know the Store app publisher or product name, you can find them by
|
||||
> "windowsPhoneLegacyId": "ca05b3ab-f157-450c-8c49-a1f127f5e71d",
|
||||
> }
|
||||
|
||||
-->
|
||||
|
||||
### Add Desktop apps
|
||||
|
||||
To add **Desktop apps**, complete the following fields, based on what results you want returned.
|
||||
@ -166,14 +169,14 @@ To add **Desktop apps**, complete the following fields, based on what results yo
|
||||
|Field|Manages|
|
||||
|--- |--- |
|
||||
|All fields marked as “*”|All files signed by any publisher. (Not recommended and may not work)|
|
||||
|Publisher only|If you only fill out this field, you’ll get all files signed by the named publisher.This might be useful if your company is the publisher and signer of internal line-of-business apps.|
|
||||
|Publisher only|If you only fill out this field, you’ll get all files signed by the named publisher. This might be useful if your company is the publisher and signer of internal line-of-business apps.|
|
||||
|Publisher and Name only|If you only fill out these fields, you’ll get all files for the specified product, signed by the named publisher.|
|
||||
|Publisher, Name, and File only|If you only fill out these fields, you’ll get any version of the named file or package for the specified product, signed by the named publisher.|
|
||||
|Publisher, Name, File, and Min version only|If you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher.This option is recommended for enlightened apps that weren't previously enlightened.|
|
||||
|Publisher, Name, File, and Min version only|If you only fill out these fields, you’ll get the specified version or newer releases of the named file or package for the specified product, signed by the named publisher. This option is recommended for enlightened apps that weren't previously enlightened.|
|
||||
|Publisher, Name, File, and Max version only|If you only fill out these fields, you’ll get the specified version or older releases of the named file or package for the specified product, signed by the named publisher.|
|
||||
|All fields completed|If you fill out all fields, you’ll get the specified version of the named file or package for the specified product, signed by the named publisher.|
|
||||
|
||||
To add another Desktop app, click the ellipsis **…**. After you’ve entered the info into the fields, click **OK**.
|
||||
To add another Desktop app, select the ellipsis **…**. After you’ve entered the info into the fields, select **OK**.
|
||||
|
||||

|
||||
|
||||
@ -199,7 +202,7 @@ Path Publisher
|
||||
|
||||
Where `O=MICROSOFT CORPORATION, L=REDMOND, S=WASHINGTON, C=US` is the **Publisher** name and `WORDPAD.EXE` is the **File** name.
|
||||
|
||||
Regarding to how to get the Product Name for the Apps you wish to Add, please reach out to our Windows Support Team to request the guidelines
|
||||
Regarding to how to get the Product Name for the Apps you wish to Add, contact the Windows Support Team to request the guidelines
|
||||
|
||||
### Import a list of apps
|
||||
|
||||
@ -214,35 +217,35 @@ For more info about AppLocker, see the [AppLocker](../../threat-protection/windo
|
||||
|
||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||
|
||||
2. In the left blade, expand **Application Control Policies**, expand **AppLocker**, and then click **Packaged App Rules**.
|
||||
2. Expand **Application Control Policies**, expand **AppLocker**, and then select **Packaged App Rules**.
|
||||
|
||||

|
||||
|
||||
3. Right-click in the right-hand blade, and then click **Create New Rule**.
|
||||
3. Right-click in the right side, and then select **Create New Rule**.
|
||||
|
||||
The **Create Packaged app Rules** wizard appears.
|
||||
|
||||
4. On the **Before You Begin** page, click **Next**.
|
||||
4. On the **Before You Begin** page, select **Next**.
|
||||
|
||||

|
||||
|
||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then select **Next**.
|
||||
|
||||

|
||||
|
||||
6. On the **Publisher** page, click **Select** from the **Use an installed packaged app as a reference** area.
|
||||
6. On the **Publisher** page, choose **Select** from the **Use an installed packaged app as a reference** area.
|
||||
|
||||

|
||||
|
||||
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then click **OK**. For this example, we’re using Microsoft Dynamics 365.
|
||||
7. In the **Select applications** box, pick the app that you want to use as the reference for your rule, and then select **OK**. For this example, we’re using Microsoft Dynamics 365.
|
||||
|
||||

|
||||
|
||||
8. On the updated **Publisher** page, click **Create**.
|
||||
8. On the updated **Publisher** page, select **Create**.
|
||||
|
||||

|
||||
|
||||
9. Click **No** in the dialog box that appears, asking if you want to create the default rules. You must not create default rules for your WIP policy.
|
||||
9. Select **No** in the dialog box that appears, asking if you want to create the default rules. Don't create default rules for your WIP policy.
|
||||
|
||||

|
||||
|
||||
@ -250,15 +253,15 @@ For more info about AppLocker, see the [AppLocker](../../threat-protection/windo
|
||||
|
||||

|
||||
|
||||
10. In the left blade, right-click on **AppLocker**, and then click **Export policy**.
|
||||
10. On the left, right-click on **AppLocker**, and then select **Export policy**.
|
||||
|
||||
The **Export policy** box opens, letting you export and save your new policy as XML.
|
||||
|
||||

|
||||
|
||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then select **Save**.
|
||||
|
||||
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
||||
The policy is saved and you’ll see a message that says one rule was exported from the policy.
|
||||
|
||||
**Example XML file**<br>
|
||||
This is the XML file that AppLocker creates for Microsoft Dynamics 365.
|
||||
@ -290,40 +293,40 @@ The executable rule helps to create an AppLocker rule to sign any unsigned apps.
|
||||
|
||||
1. Open the Local Security Policy snap-in (SecPol.msc).
|
||||
|
||||
2. In the left pane, click **Application Control Policies** > **AppLocker** > **Executable Rules**.
|
||||
2. In the left pane, select **Application Control Policies** > **AppLocker** > **Executable Rules**.
|
||||
|
||||
3. Right-click **Executable Rules** > **Create New Rule**.
|
||||
|
||||

|
||||
|
||||
4. On the **Before You Begin** page, click **Next**.
|
||||
4. On the **Before You Begin** page, select **Next**.
|
||||
|
||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then click **Next**.
|
||||
5. On the **Permissions** page, make sure the **Action** is set to **Allow** and the **User or group** is set to **Everyone**, and then select **Next**.
|
||||
|
||||
6. On the **Conditions** page, click **Path** and then click **Next**.
|
||||
6. On the **Conditions** page, select **Path** and then select **Next**.
|
||||
|
||||

|
||||
|
||||
7. Click **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
||||
7. Select **Browse Folders...** and select the path for the unsigned apps. For this example, we’re using "C:\Program Files".
|
||||
|
||||

|
||||
|
||||
8. On the **Exceptions** page, add any exceptions and then click **Next**.
|
||||
8. On the **Exceptions** page, add any exceptions and then select **Next**.
|
||||
|
||||
9. On the **Name** page, type a name and description for the rule and then click **Create**.
|
||||
9. On the **Name** page, type a name and description for the rule and then select **Create**.
|
||||
|
||||
10. In the left pane, right-click **AppLocker** > **Export policy**.
|
||||
|
||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then click **Save**.
|
||||
11. In the **Export policy** box, browse to where the policy should be stored, give the policy a name, and then select **Save**.
|
||||
|
||||
The policy is saved and you’ll see a message that says 1 rule was exported from the policy.
|
||||
The policy is saved and you’ll see a message that says one rule was exported from the policy.
|
||||
|
||||
12. After you’ve created your XML file, you need to import it by using Microsoft Intune.
|
||||
|
||||
|
||||
**To import a list of protected apps using Microsoft Intune**
|
||||
|
||||
1. In **Protected apps**, click **Import apps**.
|
||||
1. In **Protected apps**, select **Import apps**.
|
||||
|
||||

|
||||
|
||||
@ -331,20 +334,20 @@ The executable rule helps to create an AppLocker rule to sign any unsigned apps.
|
||||
|
||||

|
||||
|
||||
2. Browse to your exported AppLocker policy file, and then click **Open**.
|
||||
2. Browse to your exported AppLocker policy file, and then select **Open**.
|
||||
|
||||
The file imports and the apps are added to your **Protected apps** list.
|
||||
|
||||
### Exempt apps from a WIP policy
|
||||
If your app is incompatible with WIP, but still needs to be used with enterprise data, you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||
If your app is incompatible with WIP, but still needs to be used with enterprise data, then you can exempt the app from the WIP restrictions. This means that your apps won't include auto-encryption or tagging and won't honor your network restrictions. It also means that your exempted apps might leak.
|
||||
|
||||
1. In **Client apps - App protection policies**, click **Exempt apps**.
|
||||
1. In **Client apps - App protection policies**, select **Exempt apps**.
|
||||
|
||||

|
||||
|
||||
2. In **Exempt apps**, click **Add apps**.
|
||||
2. In **Exempt apps**, select **Add apps**.
|
||||
|
||||
Be aware that when you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data.
|
||||
When you exempt apps, they’re allowed to bypass the WIP restrictions and access your corporate data.
|
||||
|
||||
3. Fill out the rest of the app info, based on the type of app you’re adding:
|
||||
|
||||
@ -356,40 +359,40 @@ If your app is incompatible with WIP, but still needs to be used with enterprise
|
||||
|
||||
- [Import apps](#import-a-list-of-apps)
|
||||
|
||||
4. Click **OK**.
|
||||
4. Select **OK**.
|
||||
|
||||
## Manage the WIP protection mode for your enterprise data
|
||||
After you've added the apps you want to protect with WIP, you'll need to apply a management and protection mode.
|
||||
|
||||
We recommend that you start with **Silent** or **Allow Overrides** while verifying with a small group that you have the right apps on your protected apps list. After you're done, you can change to your final enforcement policy, **Block**.
|
||||
|
||||
1. From the **App protection policy** blade, click the name of your policy, and then click **Required settings**.
|
||||
1. From **App protection policy**, select the name of your policy, and then select **Required settings**.
|
||||
|
||||

|
||||

|
||||
|
||||
|Mode |Description |
|
||||
|-----|------------|
|
||||
|Block |WIP looks for inappropriate data sharing practices and stops the employee from completing the action. This can include sharing info across non-enterprise-protected apps in addition to sharing enterprise data between other people and devices outside of your enterprise.|
|
||||
|Allow Overrides |WIP looks for inappropriate data sharing, warning employees if they do something deemed potentially unsafe. However, this management mode lets the employee override the policy and share the data, logging the action to your audit log. For info about how to collect your audit log files, see [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md).|
|
||||
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would’ve been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
||||
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<br><br>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Be aware that your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
||||
|Silent |WIP runs silently, logging inappropriate data sharing, without blocking anything that would have been prompted for employee interaction while in Allow Override mode. Unallowed actions, like apps inappropriately trying to access a network resource or WIP-protected data, are still stopped.|
|
||||
|Off (not recommended) |WIP is turned off and doesn't help to protect or audit your data.<br><br>After you turn off WIP, an attempt is made to decrypt any WIP-tagged files on the locally attached drives. Your previous decryption and policy info isn’t automatically reapplied if you turn WIP protection back on.|
|
||||
|
||||
2. Click **Save**.
|
||||
2. Select **Save**.
|
||||
|
||||
## Define your enterprise-managed corporate identity
|
||||
Corporate identity, usually expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||
Corporate identity, typically expressed as your primary Internet domain (for example, contoso.com), helps to identify and tag your corporate data from apps you’ve marked as protected by WIP. For example, emails using contoso.com are identified as being corporate and are restricted by your Windows Information Protection policies.
|
||||
|
||||
Starting with Windows 10, version 1703, Intune automatically determines your corporate identity and adds it to the **Corporate identity** field.
|
||||
|
||||
**To change your corporate identity**
|
||||
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Required settings**.
|
||||
1. From **App policy**, select the name of your policy, and then select **Required settings**.
|
||||
|
||||
2. If the auto-defined identity isn’t correct, you can change the info in the **Corporate identity** field.
|
||||
|
||||

|
||||
|
||||
3. To add domains, such your email domain names, click **Configure Advanced settings** > **Add network boundary** and select **Protected domains**.
|
||||
3. To add domains, such your email domain names, select **Configure Advanced settings** > **Add network boundary** and select **Protected domains**.
|
||||
|
||||

|
||||
|
||||
@ -398,17 +401,17 @@ After you've added a protection mode to your apps, you'll need to decide where t
|
||||
|
||||
There are no default locations included with WIP, you must add each of your network locations. This area applies to any network endpoint device that gets an IP address in your enterprise’s range and is also bound to one of your enterprise domains, including SMB shares. Local file system locations should just maintain encryption (for example, on local NTFS, FAT, ExFAT).
|
||||
|
||||
To define the network boundaries, click **App policy** > the name of your policy > **Advanced settings** > **Add network boundary**.
|
||||
To define the network boundaries, select **App policy** > the name of your policy > **Advanced settings** > **Add network boundary**.
|
||||
|
||||

|
||||
|
||||
Select the type of network boundary to add from the **Boundary type** box. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the options covered in the following subsections, and then click **OK**.
|
||||
Select the type of network boundary to add from the **Boundary type** box. Type a name for your boundary into the **Name** box, add your values to the **Value** box, based on the options covered in the following subsections, and then select **OK**.
|
||||
|
||||
### Cloud resources
|
||||
|
||||
Specify the cloud resources to be treated as corporate and protected by WIP.
|
||||
For each cloud resource, you may also optionally specify a proxy server from your Internal proxy servers list to route traffic for this cloud resource.
|
||||
Be aware that all traffic routed through your Internal proxy servers is considered enterprise.
|
||||
All traffic routed through your Internal proxy servers is considered enterprise.
|
||||
|
||||
Separate multiple resources with the "|" delimiter.
|
||||
For example:
|
||||
@ -417,7 +420,7 @@ For example:
|
||||
URL <,proxy>|URL <,proxy>
|
||||
```
|
||||
|
||||
Personal applications will be able to access a cloud resource that has a blank space or an invalid character, such as a trailing dot in the URL.
|
||||
Personal applications can access a cloud resource that has a blank space or an invalid character, such as a trailing dot in the URL.
|
||||
|
||||
To add a subdomain for a cloud resource, use a period (.) instead of an asterisk (*). For example, to add all subdomains within Office.com, use ".office.com" (without the quotation marks).
|
||||
|
||||
@ -447,7 +450,7 @@ contoso.sharepoint.com|contoso.visualstudio.com|contoso.onedrive.com,
|
||||
### Protected domains
|
||||
|
||||
Specify the domains used for identities in your environment.
|
||||
All traffic to the fully-qualified domains appearing in this list will be protected.
|
||||
All traffic to the fully qualified domains appearing in this list will be protected.
|
||||
Separate multiple domains with the "|" delimiter.
|
||||
|
||||
```console
|
||||
@ -457,7 +460,7 @@ exchange.contoso.com|contoso.com|region.contoso.com
|
||||
### Network domains
|
||||
|
||||
Specify the DNS suffixes used in your environment.
|
||||
All traffic to the fully-qualified domains appearing in this list will be protected.
|
||||
All traffic to the fully qualified domains appearing in this list will be protected.
|
||||
Separate multiple resources with the "," delimiter.
|
||||
|
||||
```console
|
||||
@ -526,13 +529,13 @@ Separate multiple resources with the "," delimiter.
|
||||
sts.contoso.com,sts.contoso2.com
|
||||
```
|
||||
|
||||
Decide if you want Windows to look for additional network settings:
|
||||
Decide if you want Windows to look for more network settings:
|
||||
|
||||
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you turn this off, Windows will search for additional proxy servers in your immediate network.
|
||||
- **Enterprise Proxy Servers list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the proxy servers you specified in the network boundary definition as the complete list of proxy servers available on your network. If you turn this off, Windows will search for more proxy servers in your immediate network.
|
||||
|
||||
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you turn this off, Windows will search for additional IP ranges on any domain-joined devices connected to your network.
|
||||
- **Enterprise IP Ranges list is authoritative (do not auto-detect).** Turn on if you want Windows to treat the IP ranges you specified in the network boundary definition as the complete list of IP ranges available on your network. If you turn this off, Windows will search for more IP ranges on any domain-joined devices connected to your network.
|
||||
|
||||

|
||||

|
||||
|
||||
## Upload your Data Recovery Agent (DRA) certificate
|
||||
After you create and deploy your WIP policy to your employees, Windows begins to encrypt your corporate data on the employees’ local device drive. If somehow the employees’ local encryption keys get lost or revoked, the encrypted data can become unrecoverable. To help avoid this possibility, the Data Recovery Agent (DRA) certificate lets Windows use an included public key to encrypt the local data while you maintain the private key that can unencrypt the data.
|
||||
@ -541,11 +544,11 @@ After you create and deploy your WIP policy to your employees, Windows begins to
|
||||
>Using a DRA certificate isn’t mandatory. However, we strongly recommend it. For more info about how to find and export your data recovery certificate, see [Data Recovery and Encrypting File System (EFS)](/previous-versions/tn-archive/cc512680(v=technet.10)). For more info about creating and verifying your EFS DRA certificate, see [Create and verify an Encrypting File System (EFS) Data Recovery Agent (DRA) certificate](/windows/threat-protection/windows-information-protection/create-and-verify-an-efs-dra-certificate).
|
||||
|
||||
**To upload your DRA certificate**
|
||||
1. From the **App policy** blade, click the name of your policy, and then click **Advanced settings** from the menu that appears.
|
||||
1. From **App policy**, select the name of your policy, and then select **Advanced settings** from the menu that appears.
|
||||
|
||||
The **Advanced settings** blade appears.
|
||||
**Advanced settings** shows.
|
||||
|
||||
2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, click **Browse** to add a data recovery certificate for your policy.
|
||||
2. In the **Upload a Data Recovery Agent (DRA) certificate to allow recovery of encrypted data** box, select **Browse** to add a data recovery certificate for your policy.
|
||||
|
||||

|
||||
|
||||
@ -558,15 +561,15 @@ After you've decided where your protected apps can access enterprise data on you
|
||||
|
||||
- **On, or not configured (recommended).** Revokes local encryption keys from a device during unenrollment.
|
||||
|
||||
- **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example if you’re migrating between Mobile Device Management (MDM) solutions.
|
||||
- **Off.** Stop local encryption keys from being revoked from a device during unenrollment. For example, if you’re migrating between Mobile Device Management (MDM) solutions.
|
||||
|
||||
**Show the enterprise data protection icon.** Determines whether the Windows Information Protection icon overlay appears on corporate files in the Save As and File Explorer views. The options are:
|
||||
|
||||
- **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Additionally, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu.
|
||||
- **On.** Allows the Windows Information Protection icon overlay to appear on corporate files in the Save As and File Explorer views. Also, for unenlightened but protected apps, the icon overlay also appears on the app tile and with Managed text on the app name in the **Start** menu.
|
||||
|
||||
- **Off, or not configured (recommended).** Stops the Windows Information Protection icon overlay from appearing on corporate files or unenlightened, but protected apps. Not configured is the default option.
|
||||
|
||||
**Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared amongst employees. In other words, WIP uses Azure Rights Management "machinery" to apply EFS encryption to files when they are copied to removable drives. You must already have Azure Rights Management set up. The EFS file encryption key is protected by the RMS template’s license. Only users with permission to that template will be able to read it from the removable drive. WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](/windows/client-management/mdm/enterprisedataprotection-csp).
|
||||
**Use Azure RMS for WIP.** Determines whether WIP uses [Microsoft Azure Rights Management](https://products.office.com/business/microsoft-azure-rights-management) to apply EFS encryption to files that are copied from Windows 10 to USB or other removable drives so they can be securely shared with employees. In other words, WIP uses Azure Rights Management "machinery" to apply EFS encryption to files when they're copied to removable drives. You must already have Azure Rights Management set up. The EFS file encryption key is protected by the RMS template’s license. Only users with permission to that template can read it from the removable drive. WIP can also integrate with Azure RMS by using the **AllowAzureRMSForEDP** and the **RMSTemplateIDForEDP** MDM settings in the [EnterpriseDataProtection CSP](/windows/client-management/mdm/enterprisedataprotection-csp).
|
||||
|
||||
- **On.** Protects files that are copied to a removable drive. You can enter a TemplateID GUID to specify who can access the Azure Rights Management protected files, and for how long. The RMS template is only applied to the files on removable media, and is only used for access control—it doesn’t actually apply Azure Information Protection to the files.
|
||||
|
||||
@ -585,11 +588,11 @@ After you've decided where your protected apps can access enterprise data on you
|
||||
|
||||
## Encrypted file extensions
|
||||
|
||||
You can restrict which files are protected by WIP when they are downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied.
|
||||
You can restrict which files are protected by WIP when they're downloaded from an SMB share within your enterprise network locations. If this setting is configured, only files with the extensions in the list will be encrypted. If this setting is not specified, the existing auto-encryption behavior is applied.
|
||||
|
||||

|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
- [How to collect Windows Information Protection (WIP) audit event logs](collect-wip-audit-event-logs.md)
|
||||
|
||||
|
@ -16,9 +16,9 @@ ms.topic: article
|
||||
# What's new in Windows 10 Enterprise LTSC 2019
|
||||
|
||||
**Applies to**
|
||||
- Windows 10 Enterprise LTSC 2019
|
||||
- Windows 10 Enterprise LTSC 2019
|
||||
|
||||
This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2019, compared to Windows 10 Enterprise LTSC 2016 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md).
|
||||
This article lists new and updated features and content that are of interest to IT Pros for Windows 10 Enterprise LTSC 2019, compared to Windows 10 Enterprise LTSC 2016 (LTSB). For a brief description of the LTSC servicing channel and associated support, see [Windows 10 Enterprise LTSC](index.md).
|
||||
|
||||
>[!NOTE]
|
||||
>Features in Windows 10 Enterprise LTSC 2019 are equivalent to Windows 10, version 1809.
|
||||
@ -200,8 +200,6 @@ New features in [Windows Hello for Business](/windows/security/identity-protecti
|
||||
|
||||
- You can now reset a forgotten PIN without deleting company managed data or apps on devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune).
|
||||
|
||||
- For Windows Phone devices, an administrator is able to initiate a remote PIN reset through the Intune portal.
|
||||
|
||||
- For Windows desktops, users are able to reset a forgotten PIN through **Settings > Accounts > Sign-in options**. For more details, check out [What if I forget my PIN?](/windows/security/identity-protection/hello-for-business/hello-features#pin-reset).
|
||||
|
||||
[Windows Hello](/windows/security/identity-protection/hello-for-business/hello-features) now supports FIDO 2.0 authentication for Azure AD Joined Windows 10 devices and has enhanced support for shared devices, as described in [Kiosk configuration](#kiosk-configuration).
|
||||
@ -210,13 +208,13 @@ New features in [Windows Hello for Business](/windows/security/identity-protecti
|
||||
|
||||
- Support for S/MIME with Windows Hello for Business and APIs for non-Microsoft identity lifecycle management solutions.
|
||||
|
||||
- Windows Hello is part of the account protection pillar in Windows Defender Security Center. Account Protection will encourage password users to set up Windows Hello Face, Fingerprint or PIN for faster sign in, and will notify Dynamic lock users if Dynamic lock has stopped working because their phone or device Bluetooth is off.
|
||||
- Windows Hello is part of the account protection pillar in Windows Defender Security Center. Account Protection will encourage password users to set up Windows Hello Face, Fingerprint or PIN for faster sign in, and will notify Dynamic lock users if Dynamic lock has stopped working because their device Bluetooth is off.
|
||||
|
||||
- You can set up Windows Hello from lock screen for MSA accounts. We’ve made it easier for Microsoft account users to set up Windows Hello on their devices for faster and more secure sign-in. Previously, you had to navigate deep into Settings to find Windows Hello. Now, you can set up Windows Hello Face, Fingerprint or PIN straight from your lock screen by clicking the Windows Hello tile under Sign-in options.
|
||||
|
||||
- New [public API](/uwp/api/windows.security.authentication.web.core.webauthenticationcoremanager.findallaccountsasync#Windows_Security_Authentication_Web_Core_WebAuthenticationCoreManager_FindAllAccountsAsync_Windows_Security_Credentials_WebAccountProvider_) for secondary account SSO for a particular identity provider.
|
||||
|
||||
- It is easier to set up Dynamic lock, and WD SC actionable alerts have been added when Dynamic lock stops working (ex: phone Bluetooth is off).
|
||||
- It is easier to set up Dynamic lock, and WD SC actionable alerts have been added when Dynamic lock stops working (ex: device Bluetooth is off).
|
||||
|
||||
For more information, see: [Windows Hello and FIDO2 Security Keys enable secure and easy authentication for shared devices](https://blogs.windows.com/business/2018/04/17/windows-hello-fido2-security-keys/#OdKBg3pwJQcEKCbJ.97)
|
||||
|
||||
@ -348,7 +346,7 @@ If you have shared devices deployed in your work place, **Fast sign-in** enables
|
||||
|
||||
**To enable fast sign-in:**
|
||||
|
||||
1. Set up a shared or guest device with Windows 10, version 1809 or Windows 10 Enterprise LTSC 2019.
|
||||
1. Set up a shared or guest device with Windows 10, version 1809 or Windows 10 Enterprise LTSC 2019.
|
||||
|
||||
2. Set the Policy CSP, and the **Authentication** and **EnableFastFirstSignIn** policies to enable fast sign-in.
|
||||
|
||||
@ -586,11 +584,11 @@ Users attempt to connect to a Miracast receiver as they did previously. When the
|
||||
|
||||
If you have a device that has been updated to Windows 10 Enterprise LTSC 2019, then you automatically have this new feature. To take advantage of it in your environment, you need to ensure the following is true within your deployment:
|
||||
|
||||
- The device (PC, phone, or Surface Hub) needs to be running Windows 10, version 1703, Windows 10 Enterprise LTSC 2019, or a later OS.
|
||||
- The device (PC or Surface Hub) needs to be running Windows 10, version 1703, Windows 10 Enterprise LTSC 2019, or a later OS.
|
||||
|
||||
- A Windows PC or Surface Hub can act as a Miracast over Infrastructure *receiver*. A Windows PC or phone can act as a Miracast over Infrastructure *source*.
|
||||
- A Windows PC or Surface Hub can act as a Miracast over Infrastructure *receiver*. A Windows device can act as a Miracast over Infrastructure *source*.
|
||||
- As a Miracast receiver, the PC or Surface Hub must be connected to your enterprise network via either Ethernet or a secure Wi-Fi connection (e.g. using either WPA2-PSK or WPA2-Enterprise security). If the Hub is connected to an open Wi-Fi connection, Miracast over Infrastructure will disable itself.
|
||||
- As a Miracast source, the PC or phone must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||
- As a Miracast source, the device must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||
|
||||
- The DNS Hostname (device name) of the device needs to be resolvable via your DNS servers. You can achieve this by either allowing your device to register automatically via Dynamic DNS, or by manually creating an A or AAAA record for the device's hostname.
|
||||
|
||||
|
@ -18,7 +18,7 @@ ms.topic: article
|
||||
|
||||
Below is a list of some of what's new in Information Technology (IT) pro features in Windows 10, version 1703 (also known as the Creators Update).
|
||||
|
||||
For more general info about Windows 10 features, see [Features available only on Windows 10](https://www.microsoft.com/windows/features). For info about previous versions of Windows 10, see [What's New in Windows 10](./index.yml). Also see this blog post: [What’s new for IT pros in the Windows 10 Creators Update](https://blogs.technet.microsoft.com/windowsitpro/2017/04/05/whats-new-for-it-pros-in-the-windows-10-creators-update/).
|
||||
For more general info about Windows 10 features, see [Features available only on Windows 10](https://www.microsoft.com/windows/features). For info about previous versions of Windows 10, see [What's New in Windows 10](./index.yml). Also see this blog post: [What’s new for IT pros in the Windows 10 Creators Update](https://blogs.technet.microsoft.com/windowsitpro/2017/04/05/whats-new-for-it-pros-in-the-windows-10-creators-update/).
|
||||
|
||||
>[!NOTE]
|
||||
>Windows 10, version 1703 contains all fixes included in previous cumulative updates to Windows 10, version 1607. For info about each version, see [Windows 10 release information](https://technet.microsoft.com/windows/release-info). For a list of removed features, see [Features that are removed or deprecated in Windows 10 Creators Update](/windows/deployment/planning/windows-10-removed-features).
|
||||
@ -99,23 +99,20 @@ For details, see [MBR2GPT.EXE](/windows/deployment/mbr-to-gpt).
|
||||
### Microsoft Defender for Endpoint
|
||||
|
||||
New features in Microsoft Defender for Endpoint for Windows 10, version 1703 include:
|
||||
- **Detection**<br>
|
||||
Enhancements to the detection capabilities include:
|
||||
- **Detection**: Enhancements to the detection capabilities include:
|
||||
- [Use the threat intelligence API to create custom alerts](/windows/threat-protection/windows-defender-atp/use-custom-ti-windows-defender-advanced-threat-protection) - Understand threat intelligence concepts, enable the threat intel application, and create custom threat intelligence alerts for your organization.
|
||||
- Improvements on OS memory and kernel sensors to enable detection of attackers who are using in-memory and kernel-level attacks
|
||||
- Upgraded detections of ransomware and other advanced attacks
|
||||
- Historical detection capability ensures new detection rules apply to up to six months of stored data to detect previous attacks that might not have been noticed
|
||||
|
||||
- **Investigation**<br>
|
||||
Enterprise customers can now take advantage of the entire Windows security stack with Microsoft Defender Antivirus detections and Device Guard blocks being surfaced in the Microsoft Defender for Endpoint portal. Other capabilities have been added to help you gain a holistic view on investigations.
|
||||
- **Investigation**: Enterprise customers can now take advantage of the entire Windows security stack with Microsoft Defender Antivirus detections and Device Guard blocks being surfaced in the Microsoft Defender for Endpoint portal. Other capabilities have been added to help you gain a holistic view on investigations.
|
||||
|
||||
Other investigation enhancements include:
|
||||
- [Investigate a user account](/windows/threat-protection/windows-defender-atp/investigate-user-windows-defender-advanced-threat-protection) - Identify user accounts with the most active alerts and investigate cases of potential compromised credentials.
|
||||
- [Alert process tree](/windows/threat-protection/windows-defender-atp/investigate-alerts-windows-defender-advanced-threat-protection#alert-process-tree) - Aggregates multiple detections and related events into a single view to reduce case resolution time.
|
||||
- [Pull alerts using REST API](/windows/threat-protection/windows-defender-atp/pull-alerts-using-rest-api-windows-defender-advanced-threat-protection) - Use REST API to pull alerts from Microsoft Defender for Endpoint.
|
||||
|
||||
- **Response**<br>
|
||||
When detecting an attack, security response teams can now take immediate action to contain a breach:
|
||||
- **Response**: When detecting an attack, security response teams can now take immediate action to contain a breach:
|
||||
- [Take response actions on a machine](/windows/threat-protection/windows-defender-atp/respond-machine-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by isolating machines or collecting an investigation package.
|
||||
- [Take response actions on a file](/windows/threat-protection/windows-defender-atp/respond-file-alerts-windows-defender-advanced-threat-protection) - Quickly respond to detected attacks by stopping and quarantining files or blocking a file.
|
||||
|
||||
@ -168,8 +165,6 @@ A new security policy setting
|
||||
|
||||
You can now reset a forgotten PIN without deleting company managed data or apps on devices managed by [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune).
|
||||
|
||||
For Windows Phone devices, an administrator is able to initiate a remote PIN reset through the Intune portal.
|
||||
|
||||
For Windows desktops, users are able to reset a forgotten PIN through **Settings > Accounts > Sign-in options**.
|
||||
|
||||
For more details, check out [What if I forget my PIN?](/windows/security/identity-protection/hello-for-business/hello-features#pin-reset).
|
||||
@ -295,10 +290,10 @@ Users attempt to connect to a Miracast receiver as they did previously. When the
|
||||
|
||||
If you have a device that has been updated to Windows 10, version 1703, then you automatically have this new feature. To take advantage of it in your environment, you need to ensure the following is true within your deployment:
|
||||
|
||||
- The device (PC, phone, or Surface Hub) needs to be running Windows 10, version 1703.
|
||||
- A Windows PC or Surface Hub can act as a Miracast over Infrastructure *receiver*. A Windows PC or phone can act as a Miracast over Infrastructure *source*.
|
||||
- The device (PC or Surface Hub) needs to be running Windows 10, version 1703.
|
||||
- A Windows PC or Surface Hub can act as a Miracast over Infrastructure *receiver*. A Windows device can act as a Miracast over Infrastructure *source*.
|
||||
- As a Miracast receiver, the PC or Surface Hub must be connected to your enterprise network via either Ethernet or a secure Wi-Fi connection (e.g. using either WPA2-PSK or WPA2-Enterprise security). If the Hub is connected to an open Wi-Fi connection, Miracast over Infrastructure will disable itself.
|
||||
- As a Miracast source, the PC or phone must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||
- As a Miracast source, the device must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||
- The DNS Hostname (device name) of the device needs to be resolvable via your DNS servers. You can achieve this by either allowing your device to register automatically via Dynamic DNS, or by manually creating an A or AAAA record for the device's hostname.
|
||||
- Windows 10 PCs must be connected to the same enterprise network via Ethernet or a secure Wi-Fi connection.
|
||||
|
||||
@ -325,4 +320,4 @@ Update Compliance helps you to keep Windows 10 devices in your organization secu
|
||||
|
||||
Update Compliance is a solution built using OMS Log Analytics that provides information about installation status of monthly quality and feature updates. Details are provided about the deployment progress of existing updates and the status of future updates. Information is also provided about devices that might need attention to resolve issues.
|
||||
|
||||
For more information about Update Compliance, see [Monitor Windows Updates with Update Compliance](/windows/deployment/update/update-compliance-monitor).
|
||||
For more information about Update Compliance, see [Monitor Windows Updates with Update Compliance](/windows/deployment/update/update-compliance-monitor).
|
||||
|
Loading…
x
Reference in New Issue
Block a user