mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 13:57:22 +00:00
Merge branch 'master' into symantec-mdatp
This commit is contained in:
commit
bb86e648a9
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Only Allow Admins to Enable Connection Groups (Windows 10)
|
title: Only Allow Admins to Enable Connection Groups (Windows 10)
|
||||||
description: How to Allow Only Administrators to Enable Connection Groups
|
description: Configure the App-V client so that only administrators, not users, can enable or disable connection groups.
|
||||||
author: dansimp
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to Deploy the App-V Databases by Using SQL Scripts (Windows 10)
|
title: How to Deploy the App-V Databases by Using SQL Scripts (Windows 10)
|
||||||
description: How to Deploy the App-V Databases by Using SQL Scripts
|
description: These instructions can be used to deploy App-V databases by using SQL scripts.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: How to Deploy the App-V Server (Windows 10)
|
title: How to Deploy the App-V Server (Windows 10)
|
||||||
description: How to Deploy the App-V Server in App-V for Windows 10
|
description: Use these instructions to deploy the App-V Server in App-V for Windows 10.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deploying Microsoft Office 2010 by Using App-V (Windows 10)
|
title: Deploying Microsoft Office 2010 by Using App-V (Windows 10)
|
||||||
description: Deploying Microsoft Office 2010 by Using App-V
|
description: See the methods for creating Microsoft Office 2010 packages by Using App-V.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: App-V Supported Configurations (Windows 10)
|
title: App-V Supported Configurations (Windows 10)
|
||||||
description: App-V Supported Configurations
|
description: Learn the requirements to install and run App-V supported configurations in your Windows 10 environment.
|
||||||
author: lomayor
|
author: lomayor
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: BOOTSTRAP CSP
|
title: BOOTSTRAP CSP
|
||||||
description: BOOTSTRAP CSP
|
description: Use the BOOTSTRAP configuration service provider sets the Trusted Provisioning Server (TPS) for the device.
|
||||||
ms.assetid: b8acbddc-347f-4543-a45b-ad2ffae3ffd0
|
ms.assetid: b8acbddc-347f-4543-a45b-ad2ffae3ffd0
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseAppManagement CSP
|
title: EnterpriseAppManagement CSP
|
||||||
description: EnterpriseAppManagement CSP
|
description: Handle enterprise application management tasks using EnterpriseAppManagement configuration service provider (CSP).
|
||||||
ms.assetid: 698b8bf4-652e-474b-97e4-381031357623
|
ms.assetid: 698b8bf4-652e-474b-97e4-381031357623
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseAssignedAccess CSP
|
title: EnterpriseAssignedAccess CSP
|
||||||
description: EnterpriseAssignedAccess CSP
|
description: Use the EnterpriseAssignedAccess CSP to configure custom layouts on a device.
|
||||||
ms.assetid: 5F88E567-77AA-4822-A0BC-3B31100639AA
|
ms.assetid: 5F88E567-77AA-4822-A0BC-3B31100639AA
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
@ -306,7 +306,7 @@ Starting in Windows 10, version 1511, you can specify the following quick acti
|
|||||||
<p>Dependencies - none</p></li>
|
<p>Dependencies - none</p></li>
|
||||||
</ul>
|
</ul>
|
||||||
|
|
||||||
Starting in Windows 10, version 1703, Quick action settings no longer require any dependencis from related group or page. Here is the list:
|
Starting in Windows 10, version 1703, Quick action settings no longer require any dependencies from related group or page. Here is the list:
|
||||||
- QuickActions_Launcher_AllSettings
|
- QuickActions_Launcher_AllSettings
|
||||||
- QuickActions_Launcher_DeviceDiscovery
|
- QuickActions_Launcher_DeviceDiscovery
|
||||||
- SystemSettings_BatterySaver_LandingPage_OverrideControl
|
- SystemSettings_BatterySaver_LandingPage_OverrideControl
|
||||||
@ -1600,7 +1600,7 @@ The following table lists the product ID and AUMID for each app that is included
|
|||||||
<td>Microsoft.MSPodcast_8wekyb3d8bbwe!xc3215724yb279y4206y8c3ey61d1a9d63ed3x</td>
|
<td>Microsoft.MSPodcast_8wekyb3d8bbwe!xc3215724yb279y4206y8c3ey61d1a9d63ed3x</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
<td>Powerpoint</td>
|
<td>PowerPoint</td>
|
||||||
<td>B50483C4-8046-4E1B-81BA-590B24935798</td>
|
<td>B50483C4-8046-4E1B-81BA-590B24935798</td>
|
||||||
<td>Microsoft.Office.PowerPoint_8wekyb3d8bbwe!microsoft.pptim</td>
|
<td>Microsoft.Office.PowerPoint_8wekyb3d8bbwe!microsoft.pptim</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: EnterpriseAssignedAccess DDF
|
title: EnterpriseAssignedAccess DDF
|
||||||
description: EnterpriseAssignedAccess DDF
|
description: Utilize the OMA DM device description framework (DDF) for the EnterpriseAssignedAccess configuration service provider.
|
||||||
ms.assetid: 8BD6FB05-E643-4695-99A2-633995884B37
|
ms.assetid: 8BD6FB05-E643-4695-99A2-633995884B37
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: dansimp
|
manager: dansimp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Messaging CSP
|
title: Messaging CSP
|
||||||
description: Messaging CSP
|
description: Use the Messaging CSP to configure the ability to get text messages audited on a mobile device.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Messaging DDF file
|
title: Messaging DDF file
|
||||||
description: Messaging DDF file
|
description: Utilize the OMA DM device description framework (DDF) for the Messaging configuration service provider.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - LocalPoliciesSecurityOptions
|
title: Policy CSP - LocalPoliciesSecurityOptions
|
||||||
description: Policy CSP - LocalPoliciesSecurityOptions
|
description: These settings prevents users from adding new Microsoft accounts on a specific computer using LocalPoliciesSecurityOptions.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - Printers
|
title: Policy CSP - Printers
|
||||||
description: Policy CSP - Printers
|
description: Use this policy setting to control the client Point and Print behavior, including security prompts for Windows Vista computers.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - Start
|
title: Policy CSP - Start
|
||||||
description: Policy CSP - Start
|
description: Use this policy CSP to control the visibility of the Documents shortcut on the Start menu.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Policy CSP - Update
|
title: Policy CSP - Update
|
||||||
description: Policy CSP - Update
|
description: Manage a range of active hours for when update reboots are not scheduled.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -30,7 +30,7 @@ Update Compliance enables organizations to:
|
|||||||
* View a report of device and update issues related to compliance that need attention.
|
* View a report of device and update issues related to compliance that need attention.
|
||||||
* Check bandwidth savings incurred across multiple content types by using [Delivery Optimization](waas-delivery-optimization.md).
|
* Check bandwidth savings incurred across multiple content types by using [Delivery Optimization](waas-delivery-optimization.md).
|
||||||
|
|
||||||
Update Compliance is offered through the Azure portal, and is included as part of Windows 10 licenses listed in the [prerequisites](update-compliance-get-started.md#update-compliance-prerequisites).
|
Update Compliance is offered through the Azure portal, and is included as part of Windows 10 licenses listed in the [prerequisites](update-compliance-get-started.md#update-compliance-prerequisites). Azure Log Analytics ingestion and retention charges are not incurred on your Azure subscription for Update Compliance data.
|
||||||
|
|
||||||
Update Compliance uses Windows 10 diagnostic data for all of its reporting. It collects system data including update deployment progress, [Windows Update for Business](waas-manage-updates-wufb.md) configuration data, and Delivery Optimization usage data, and then sends this data to a customer-owned [Azure Log Analytics](https://docs.microsoft.com/azure/log-analytics/query-language/get-started-analytics-portal) workspace to power the experience.
|
Update Compliance uses Windows 10 diagnostic data for all of its reporting. It collects system data including update deployment progress, [Windows Update for Business](waas-manage-updates-wufb.md) configuration data, and Delivery Optimization usage data, and then sends this data to a customer-owned [Azure Log Analytics](https://docs.microsoft.com/azure/log-analytics/query-language/get-started-analytics-portal) workspace to power the experience.
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Common Migration Scenarios (Windows 10)
|
title: Common Migration Scenarios (Windows 10)
|
||||||
description: Common Migration Scenarios
|
description: See how the User State Migration Tool (USMT) 10.0 is used when planning hardware and/or operating system upgrades.
|
||||||
ms.assetid: 1d8170d5-e775-4963-b7a5-b55e8987c1e4
|
ms.assetid: 1d8170d5-e775-4963-b7a5-b55e8987c1e4
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 deployment tools
|
title: Windows 10 deployment tools
|
||||||
description: Browse through documentation describing Windows 10 deployment tools. Learn how to use these these tools to successfully deploy Windows 10 to your organization.
|
description: Learn how to use Windows 10 deployment tools to successfully deploy Windows 10 to your organization.
|
||||||
ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB
|
ms.assetid: 5C4B0AE3-B2D0-4628-9E73-606F3FAA17BB
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Hybrid Windows Hello for Business Prerequisites
|
title: Hybrid Windows Hello for Business Prerequisites
|
||||||
description: Prerequisites for hybrid Windows Hello for Business deployments using certificate trust.
|
description: Learn these prerequisites for hybrid Windows Hello for Business deployments using certificate trust.
|
||||||
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
keywords: identity, PIN, biometric, Hello, passport, WHFB, hybrid, certificate-trust
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Advanced Hunting with Powershell API Guide
|
title: Advanced Hunting with Powershell API Guide
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
description: Walk through a practice scenario, complete with code samples, querying several Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) APIs.
|
description: Use these code samples, querying several Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) APIs.
|
||||||
keywords: apis, supported apis, advanced hunting, query
|
keywords: apis, supported apis, advanced hunting, query
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
|
@ -51,7 +51,7 @@ The following table summarizes the steps you would need to take to deploy and ma
|
|||||||
| [Grant full disk access to Microsoft Defender ATP](#create-system-configuration-profiles-step-8) | MDATP_tcc_Catalina_or_newer.xml | com.microsoft.wdav.tcc |
|
| [Grant full disk access to Microsoft Defender ATP](#create-system-configuration-profiles-step-8) | MDATP_tcc_Catalina_or_newer.xml | com.microsoft.wdav.tcc |
|
||||||
| [Configure Microsoft AutoUpdate (MAU)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-updates#intune) | MDATP_Microsoft_AutoUpdate.xml | com.microsoft.autoupdate2 |
|
| [Configure Microsoft AutoUpdate (MAU)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-updates#intune) | MDATP_Microsoft_AutoUpdate.xml | com.microsoft.autoupdate2 |
|
||||||
| [Microsoft Defender ATP configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-preferences#intune-profile-1)<br/><br/> **Note:** If you are planning to run a 3rd party AV for macOS, set `passiveMode` to `true`. | MDATP_WDAV_and_exclusion_settings_Preferences.xml | com.microsoft.wdav |
|
| [Microsoft Defender ATP configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-preferences#intune-profile-1)<br/><br/> **Note:** If you are planning to run a 3rd party AV for macOS, set `passiveMode` to `true`. | MDATP_WDAV_and_exclusion_settings_Preferences.xml | com.microsoft.wdav |
|
||||||
| [Configure Microsoft Defender ATP and MS AutoUpdate (MAU) notifications](#create-system-configuration-profiles-step-9) | MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig | com.microsoft.autoupdate2 or com.microsoft.wdavtray |
|
| [Configure Microsoft Defender ATP and MS AutoUpdate (MAU) notifications](#create-system-configuration-profiles-step-9) | MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig | com.microsoft.autoupdate2 or com.microsoft.wdav.tray |
|
||||||
|
|
||||||
## Download installation and onboarding packages
|
## Download installation and onboarding packages
|
||||||
|
|
||||||
@ -245,7 +245,7 @@ You may now enroll more devices. You can also enroll them later, after you have
|
|||||||
<key>BadgesEnabled</key>
|
<key>BadgesEnabled</key>
|
||||||
<true/>
|
<true/>
|
||||||
<key>BundleIdentifier</key>
|
<key>BundleIdentifier</key>
|
||||||
<string>com.microsoft.wdavtray</string>
|
<string>com.microsoft.wdav.tray</string>
|
||||||
<key>CriticalAlertEnabled</key>
|
<key>CriticalAlertEnabled</key>
|
||||||
<false/>
|
<false/>
|
||||||
<key>GroupingType</key>
|
<key>GroupingType</key>
|
||||||
|
@ -46,7 +46,7 @@ The following table summarizes the steps you would need to take to deploy and ma
|
|||||||
|-|-|-|
|
|-|-|-|
|
||||||
| [Download installation and onboarding packages](#download-installation-and-onboarding-packages) | WindowsDefenderATPOnboarding__MDATP_wdav.atp.xml | com.microsoft.wdav.atp |
|
| [Download installation and onboarding packages](#download-installation-and-onboarding-packages) | WindowsDefenderATPOnboarding__MDATP_wdav.atp.xml | com.microsoft.wdav.atp |
|
||||||
| [Microsoft Defender ATP configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-preferences#property-list-for-jamf-configuration-profile-1)<br/><br/> **Note:** If you are planning to run a 3rd party AV for macOS, set `passiveMode` to `true`. | MDATP_WDAV_and_exclusion_settings_Preferences.plist | com.microsoft.wdav |
|
| [Microsoft Defender ATP configuration settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-preferences#property-list-for-jamf-configuration-profile-1)<br/><br/> **Note:** If you are planning to run a 3rd party AV for macOS, set `passiveMode` to `true`. | MDATP_WDAV_and_exclusion_settings_Preferences.plist | com.microsoft.wdav |
|
||||||
| [Configure Microsoft Defender ATP and MS AutoUpdate (MAU) notifications](#notification-settings) | MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig | com.microsoft.wdavtray |
|
| [Configure Microsoft Defender ATP and MS AutoUpdate (MAU) notifications](#notification-settings) | MDATP_MDAV_Tray_and_AutoUpdate2.mobileconfig | com.microsoft.wdav.tray |
|
||||||
| [Configure Microsoft AutoUpdate (MAU)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-updates#jamf) | MDATP_Microsoft_AutoUpdate.mobileconfig | com.microsoft.autoupdate2 |
|
| [Configure Microsoft AutoUpdate (MAU)](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/mac-updates#jamf) | MDATP_Microsoft_AutoUpdate.mobileconfig | com.microsoft.autoupdate2 |
|
||||||
| [Grant Full Disk Access to Microsoft Defender ATP](#privacy-preferences-policy-control) | Note: If there was one, MDATP_tcc_Catalina_or_newer.plist | com.microsoft.wdav.tcc |
|
| [Grant Full Disk Access to Microsoft Defender ATP](#privacy-preferences-policy-control) | Note: If there was one, MDATP_tcc_Catalina_or_newer.plist | com.microsoft.wdav.tcc |
|
||||||
| [Approve Kernel Extension for Microsoft Defender ATP](#approved-kernel-extension) | Note: If there was one, MDATP_KExt.plist | N/A |
|
| [Approve Kernel Extension for Microsoft Defender ATP](#approved-kernel-extension) | Note: If there was one, MDATP_KExt.plist | N/A |
|
||||||
@ -142,7 +142,7 @@ Starting in macOS 10.15 (Catalina) a user must manually allow to display notific
|
|||||||
```xml
|
```xml
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
<plist version="1.0"><dict><key>PayloadContent</key><array><dict><key>NotificationSettings</key><array><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.autoupdate2</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.wdavtray</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadType</key><string>com.apple.notificationsettings</string><key>PayloadUUID</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadVersion</key><integer>1</integer></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>mdatp - allow notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadRemovalDisallowed</key><false/><key>PayloadScope</key><string>System</string><key>PayloadType</key><string>Configuration</string><key>PayloadUUID</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadVersion</key><integer>1</integer></dict></plist>
|
<plist version="1.0"><dict><key>PayloadContent</key><array><dict><key>NotificationSettings</key><array><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.autoupdate2</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict><dict><key>AlertType</key><integer>2</integer><key>BadgesEnabled</key><true/><key>BundleIdentifier</key><string>com.microsoft.wdav.tray</string><key>CriticalAlertEnabled</key><false/><key>GroupingType</key><integer>0</integer><key>NotificationsEnabled</key><true/><key>ShowInLockScreen</key><false/><key>ShowInNotificationCenter</key><true/><key>SoundsEnabled</key><true/></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadType</key><string>com.apple.notificationsettings</string><key>PayloadUUID</key><string>BB977315-E4CB-4915-90C7-8334C75A7C64</string><key>PayloadVersion</key><integer>1</integer></dict></array><key>PayloadDescription</key><string/><key>PayloadDisplayName</key><string>mdatp - allow notifications</string><key>PayloadEnabled</key><true/><key>PayloadIdentifier</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadOrganization</key><string>Microsoft</string><key>PayloadRemovalDisallowed</key><false/><key>PayloadScope</key><string>System</string><key>PayloadType</key><string>Configuration</string><key>PayloadUUID</key><string>85F6805B-0106-4D23-9101-7F1DFD5EA6D6</string><key>PayloadVersion</key><integer>1</integer></dict></plist>
|
||||||
```
|
```
|
||||||
|
|
||||||
### Package
|
### Package
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Enable Predefined Inbound Rules (Windows 10)
|
title: Enable Predefined Inbound Rules (Windows 10)
|
||||||
description: Enable Predefined Inbound Rules
|
description: Learn the rules for Windows Defender Firewall with Advanced Security for common networking roles and functions.
|
||||||
ms.assetid: a4fff086-ae81-4c09-b828-18c6c9a937a7
|
ms.assetid: a4fff086-ae81-4c09-b828-18c6c9a937a7
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
|
Loading…
x
Reference in New Issue
Block a user