mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-19 20:33:42 +00:00
Merging changes synced from https://github.com/MicrosoftDocs/windows-docs-pr (branch live)
This commit is contained in:
@ -21,7 +21,7 @@ ms.date: 07/01/2019
|
||||
|
||||
This topic provides information about what's new and breaking changes in Windows 10 mobile device management (MDM) enrollment and management experience across all Windows 10 devices.
|
||||
|
||||
For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( http://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||
For details about Microsoft mobile device management protocols for Windows 10 see [\[MS-MDM\]: Mobile Device Management Protocol](https://go.microsoft.com/fwlink/p/?LinkId=619346) and [\[MS-MDE2\]: Mobile Device Enrollment Protocol Version 2]( https://go.microsoft.com/fwlink/p/?LinkId=619347).
|
||||
|
||||
- **What’s new in MDM for Windows 10 versions**
|
||||
- [What’s new in MDM for Windows 10, version 1909](#whats-new-in-mdm-for-windows-10-version-1909)
|
||||
@ -58,6 +58,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
||||
- [What is dmwappushsvc?](#what-is-dmwappushsvc)
|
||||
|
||||
- **Change history in MDM documentation**
|
||||
- [November 2019](#november-2019)
|
||||
- [October 2019](#october-2019)
|
||||
- [September 2019](#september-2019)
|
||||
- [August 2019](#august-2019)
|
||||
@ -1934,6 +1935,12 @@ How do I turn if off? | The service can be stopped from the "Services" console o
|
||||
|
||||
## Change history in MDM documentation
|
||||
|
||||
### November 2019
|
||||
|
||||
|New or updated topic | Description|
|
||||
|--- | ---|
|
||||
|[Policy CSP - DeliveryOptimization](policy-csp-deliveryoptimization.md)|Added option 5 in the supported values list for DeliveryOptimization/DOGroupIdSource.|
|
||||
|
||||
### October 2019
|
||||
|
||||
|New or updated topic | Description|
|
||||
|
@ -780,7 +780,7 @@ ADMX Info:
|
||||
|
||||
<!--/Scope-->
|
||||
<!--Description-->
|
||||
Added in Windows 10, version 1803. Set this policy to restrict peer selection to a specific source. Options available are: 1 = AD Site, 2 = Authenticated domain SID, 3 = DHCP Option ID, 4 = DNS Suffix
|
||||
Added in Windows 10, version 1803. Set this policy to restrict peer selection to a specific source. Available options are: 1 = AD Site, 2 = Authenticated domain SID, 3 = DHCP Option ID, 4 = DNS Suffix, 5 = AAD.
|
||||
|
||||
When set, the Group ID will be assigned automatically from the selected source.
|
||||
|
||||
@ -790,6 +790,8 @@ The options set in this policy only apply to Group (2) download mode. If Group (
|
||||
|
||||
For option 3 - DHCP Option ID, the client will query DHCP Option ID 234 and use the returned GUID value as the Group ID.
|
||||
|
||||
Starting with Windows 10, version 1903, you can use the Azure Active Directory (AAD) Tenant ID as a means to define groups. To do this, set the value of DOGroupIdSource to 5.
|
||||
|
||||
<!--/Description-->
|
||||
<!--ADMXMapped-->
|
||||
ADMX Info:
|
||||
@ -807,6 +809,7 @@ The following list shows the supported values:
|
||||
- 2 - Authenticated domain SID
|
||||
- 3 - DHCP user option
|
||||
- 4 - DNS suffix
|
||||
- 5 - AAD
|
||||
|
||||
<!--/SupportedValues-->
|
||||
<!--/Policy-->
|
||||
|
@ -20,7 +20,7 @@ The UEFI configuration service provider (CSP) interfaces to UEFI's Device Firmwa
|
||||
> The UEFI CSP version published in Windows 10, version 1803 is replaced with this one (version 1809).
|
||||
|
||||
> [!NOTE]
|
||||
> The production UEFI CSP is present in 1809, but it depends upon the Device Firmware Configuration Interface (DFCI) and UEFI firmware to comply with this interface. The specification for this interface and compatible firmware is not yet available.
|
||||
> The production UEFI CSP is present in 1809, but it depends upon the [Device Firmware Configuration Interface (DFCI) and UEFI firmware](https://microsoft.github.io/mu/dyn/mu_plus/DfciPkg/Docs/Dfci_Feature/) to comply with this interface.
|
||||
|
||||
The following diagram shows the UEFI CSP in tree format.
|
||||
|
||||
@ -70,7 +70,7 @@ Apply a permissions information package to UEFI. Input is the signed package in
|
||||
Value type is Base64. Supported operation is Replace.
|
||||
|
||||
<a href="" id="permissions-result"></a>**Permissions/Result**
|
||||
Retrieves the binary result package of the previous Permissions/Apply operation. This binary package contains XML describing the action taken for each individual permission.
|
||||
Retrieves the binary result package of the previous Permissions/Apply operation. This binary package contains XML describing the action taken for each individual permission.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
@ -109,17 +109,17 @@ Supported operation is Get.
|
||||
Node for settings permission operations. Alternate endpoint for sending a second permission package without an OS restart.
|
||||
|
||||
<a href="" id="permissions2-apply"></a>**Permissions2/Apply**
|
||||
Apply a permissions information package to UEFI. Input is the signed package in base64 encoded format. Alternate location for sending two permissions information packages in the same session.
|
||||
Apply a permissions information package to UEFI. Input is the signed package in base64 encoded format. Alternate location for sending two permissions information packages in the same session.
|
||||
|
||||
Value type is Base64. Supported operation is Replace.
|
||||
|
||||
<a href="" id="permissions2-result"></a>**Permissions2/Result**
|
||||
Retrieves the binary result package from the previous Permissions2/Apply operation. This binary package contains XML describing the action taken for each individual permission.
|
||||
Retrieves the binary result package from the previous Permissions2/Apply operation. This binary package contains XML describing the action taken for each individual permission.
|
||||
|
||||
Supported operation is Get.
|
||||
|
||||
<a href="" id="settings2"></a>**Settings2**
|
||||
Nodefor device settings operations. Alternate endpoint for sending a second settings package without an OS restart.
|
||||
Node for device settings operations. Alternate endpoint for sending a second settings package without an OS restart.
|
||||
|
||||
<a href="" id="settings2-apply"></a>**Settings2/Apply**
|
||||
Apply a settings information package to UEFI. Input is the signed package in base64 encoded format. Alternate location for sending two settings information packages in the same session.
|
||||
|
@ -0,0 +1,40 @@
|
||||
---
|
||||
title: Breaking out of a Bitlocker recovery loop
|
||||
description: This topic for IT professionals describes how to break out of a Bitlocker recovery loop.
|
||||
ms.assetid: #c40f87ac-17d3-47b2-afc6-6c641f72ecee
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: explore
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: #medium
|
||||
ms.author: v-maave
|
||||
author: martyav
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: conceptual
|
||||
ms.date: 10/28/2019
|
||||
---
|
||||
|
||||
# Breaking out of a Bitlocker recovery loop
|
||||
|
||||
Sometimes, following a crash, you might be unable to successfully boot into your operating system, due to the recovery screen repeatedly prompting you to enter your recovery key. This can be very frustrating.
|
||||
|
||||
If you've entered the correct Bitlocker recovery key multiple times, and are still unable to continue past the initial recovery screen, follow these steps to break out of the loop.
|
||||
|
||||
> [!NOTE]
|
||||
> Only try these steps after you have restarted your device at least once.
|
||||
|
||||
1. On the initial recovery screen, don't enter your recovery key. Instead, select **Skip this drive**.
|
||||
|
||||
1. On the next screen, select **Troubleshoot**.
|
||||
|
||||
1. On the Troubleshoot screen, select **Advanced options**.
|
||||
|
||||
1. On the Advanced options screen, select **Command prompt**.
|
||||
|
||||
1. From the WinRE command prompt, manually unlock your drive: `manage-bde.exe -unlock C: -rp <recovery password>`
|
||||
|
||||
1. Suspend operating system drive protection: `manage-bde.exe -protectors -disable C:`
|
||||
|
||||
1. Once the last command is run, you can safely exit the command prompt and continue to boot into your operating system
|
Reference in New Issue
Block a user