mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into sfb-10015274
This commit is contained in:
@ -244,7 +244,7 @@ For more info on virtualization-based security and Device Guard, see [Device Gua
|
||||
|
||||
**Turn off Credential Guard by using the Device Guard and Credential Guard hardware readiness tool**
|
||||
|
||||
You can also enable Credential Guard by using the [Device Guard and Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
||||
You can also disable Credential Guard by using the [Device Guard and Credential Guard hardware readiness tool](https://www.microsoft.com/download/details.aspx?id=53337).
|
||||
|
||||
```
|
||||
DG_Readiness_Tool_v2.0.ps1 -Disable -AutoReboot
|
||||
|
@ -20,7 +20,7 @@ localizationpriority: high
|
||||
You can create a Group Policy or mobile device management (MDM) policy that will implement Windows Hello on devices running Windows 10.
|
||||
|
||||
>[!IMPORTANT]
|
||||
>The Group Policy setting **Turn on PIN sign-in** does not apply to Windows Hello for Business. Use the **Turn on PIN sign-in** setting to allow or deny the use of a convenience PIN for Windows 10, versions 1507, 1511, and 1607.
|
||||
>The Group Policy setting **Turn on PIN sign-in** does not apply to Windows Hello for Business. Use the **Turn on PIN sign-in** setting to allow or deny the use of a convenience PIN for Windows 10, version 1607.
|
||||
>
|
||||
>Beginning in version 1607, Windows Hello as a convenience PIN is disabled by default on all domain-joined computers. To enable a convenience PIN for Windows 10, version 1607, enable the Group Policy setting **Turn on convenience PIN sign-in**. Learn more in the blog post [Changes to Convenience PIN/Windows Hello Behavior in Windows 10, version 1607](https://blogs.technet.microsoft.com/ash/2016/08/13/changes-to-convenience-pin-and-thus-windows-hello-behaviour-in-windows-10-version-1607/).
|
||||
>
|
||||
|
@ -71,6 +71,7 @@ For information how to enforce or ignore the default and local lists of blocked
|
||||
|
||||
- [Ignore the default list of blocked TPM commands](#bkmk-tpmgp-idlb)
|
||||
- [Ignore the local list of blocked TPM commands](#bkmk-tpmgp-illb)
|
||||
|
||||
### <a href="" id="bkmk-tpmgp-idlb"></a>Ignore the default list of blocked TPM commands
|
||||
|
||||
This policy setting allows you to enforce or ignore the computer's default list of blocked Trusted Platform Module (TPM) commands.
|
||||
|
@ -68,12 +68,12 @@ The following table lists the different parts of Start and any applicable policy
|
||||
</tr>
|
||||
<tr class="even">
|
||||
<td align="left">Recently added</td>
|
||||
<td align="left"></td>
|
||||
<td align="left">not applicable</td>
|
||||
<td align="left"><strong>Settings</strong> > <strong>Personalization</strong> > <strong>Start</strong> > <strong>Show recently added apps</strong></td>
|
||||
</tr>
|
||||
<tr class="odd">
|
||||
<td align="left">Pinned folders</td>
|
||||
<td align="left"></td>
|
||||
<td align="left">not applicable</td>
|
||||
<td align="left"><strong>Settings</strong> > <strong>Personalization</strong> > <strong>Start</strong> > <strong>Choose which folders appear on Start</strong></td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
|
Reference in New Issue
Block a user