diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index d3069c4d21..761b93800a 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14862,19 +14862,14 @@ "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-ms-flow.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-ms-flow", -"redirect_document_id": true + "source_path": "windows/security/threat-protection/windows-defender-atp/api-microsoft-flow.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow", + "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-app-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-app-token", -"redirect_document_id": true -}, -{ -"source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-power-bi-user-token.md", -"redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/run-advanced-query-sample-power-bi-user-token", -"redirect_document_id": true + "source_path": "windows/security/threat-protection/windows-defender-atp/api-power-bi.md", + "redirect_url": "/windows/security/threat-protection/microsoft-defender-atp/api-power-bi", + "redirect_document_id": true }, { "source_path": "windows/security/threat-protection/windows-defender-atp/run-advanced-query-sample-powershell.md", diff --git a/surface-hub-2s-ports-keypad.md b/surface-hub-2s-ports-keypad.md deleted file mode 100644 index de36eacd73..0000000000 --- a/surface-hub-2s-ports-keypad.md +++ /dev/null @@ -1,41 +0,0 @@ ---- -title: "Surface Hub 2S ports and keypad overview" -description: "This page describes the ports, physical buttons, and configuration information for Surface Hub 2S." -keywords: separate values with commas -ms.prod: surface-hub -ms.sitesec: library -author: robmazz -ms.author: robmazz -audience: Admin -ms.topic: article -ms.localizationpriority: Normal ---- - -# Surface Hub 2S ports and keypad overview - -This page describes the ports, physical buttons, and configuration information essential for connecting to Surface Hub 2S whether via wired, Wi-Fi, or Bluetooth methods. It also includes best practice recommendations for key connectivity scenarios. - -Figure 1 shows the location ports and physical buttons located on a keypad attached to the underside of the device. Table 1 includes detailed descriptions of each element. -*Figure 1. Front facing and underside view of I/O connections and physical buttons* -*Table 1. Surface Hub 2S port and keypad component reference* - -| Key | Component | Description | Key parameters | -| --- | -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------- | -| ① | USB C | USB 3.0 Port

- Use as a walk-up port for plugging in peripherals such as thumb-drives. Guest ports are located on each side of the device (4).
-

NOTE: This is the recommended port for connecting an external camera. Additional camera mount features are incorporated into the design to help support retention of attached cameras.


- NOTE: TouchBack and video ingest are not supported on these ports. | Type C

- 15 W Port (5V/3A) | -| ② | AC power | 100-240V input
Connect to standard AC power and Surface Hub 2S will auto switch to the local power standard such as110 volts in the US and Canada or 220 volts in the UK or other countries.

NOTE: When the AC cord is plugged in, the system remains in an off state in which only the system management controller (SMC), real time clock (RTC), and keypad are running. | IEC 60320 C14 | -| ③ | DC power | 24V DC input port
Use for connecting to mobile battery. | Xbox1 Dual barrel to Anderson connector | -| ④ | Ethernet | 1000/100/10 BaseT
Use for providing a continuous connection in a corporate environment and related scenarios requiring maximum stability or capacity. | RJ45 | -| ⑤ | USB-A | USB 3.0 Port
Use as a walk-up port for plugging in peripherals such as thumb-drives. | Type A
7.5 W Port (5V/1.5A) | -| ⑥ | USB-C | USB 3.0 Port
Use as a walk-up port for connecting external PCs and related devices or plugging in peripherals such as thumb-drives.

NOTE: This is the recommended video input port, supporting both TouchBack and InkBack. | Type C
18 W Port (5V/3A, 9V/2A) | -| ⑦ | HDMI in | HDMI 2.0, HDCP 2.2 /1.4
Use for multiple scenarios including HDMI-to-HDMI guest input. | Standard HDMI | -| ⑧ | Mini DisplayPort out | DisplayPort 1.2 output
Use for video-out scenarios such as mirroring the Surface Hub 2S display to a larger projector. | Mini DisplayPort | -| ⑨ | Source | Use to toggle among connected ingest sources — external PC, HDMI, and DisplayPort modes. | n/a | -| ⑩ | Volume | Use +/- to adjust audio locally on the device.

NOTE: When navigating to the brightness control, use +/- on the volume slider to control display brightness. | n/a | -| ⑪ | Power | Power device on/off.
Use also to navigate display menus and select items. | n/a | - - ** - ** -*Figure 2. Rear facing view of wireless, audio, & related components* -NOTE: **many of these components are internal and may not be obviously visible from the outside. - -*Figure 3. Wired port connections on Surface Hub-2S* \ No newline at end of file diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 90c5a2b411..deb52e3e8a 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -6,15 +6,12 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: lomayor -ms.date: 05/02/2019 +ms.date: 08/05/2019 ms.reviewer: manager: dansimp --- # BitLocker CSP -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. Starting in Windows 10, version 1809, it is also supported in Windows 10 Pro. > [!NOTE] @@ -31,10 +28,10 @@ The following diagram shows the BitLocker configuration service provider in tree ![bitlocker csp](images/provisioning-csp-bitlocker.png) **./Device/Vendor/MSFT/BitLocker** -

Defines the root node for the BitLocker configuration service provider.

+Defines the root node for the BitLocker configuration service provider. **RequireStorageCardEncryption** -

Allows the administrator to require storage card encryption on the device. This policy is valid only for a mobile SKU.

+Allows the administrator to require storage card encryption on the device. This policy is valid only for a mobile SKU. @@ -57,14 +54,14 @@ The following diagram shows the BitLocker configuration service provider in tree
-

Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the storage card, but the user will no longer be prompted to turn it on.

+Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the storage card, but the user will no longer be prompted to turn it on. - 0 (default) – Storage cards do not need to be encrypted. - 1 – Require Storage cards to be encrypted. -

Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on.

+Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on. -

If you want to disable this policy use the following SyncML:

+If you want to disable this policy use the following SyncML: ```xml @@ -85,11 +82,11 @@ The following diagram shows the BitLocker configuration service provider in tree ``` -

Data type is integer. Supported operations are Add, Get, Replace, and Delete.

+Data type is integer. Supported operations are Add, Get, Replace, and Delete. **RequireDeviceEncryption** -

Allows the administrator to require encryption to be turned on by using BitLocker\Device Encryption.

+Allows the administrator to require encryption to be turned on by using BitLocker\Device Encryption. @@ -112,9 +109,26 @@ The following diagram shows the BitLocker configuration service provider in tree
-

Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on.

+Data type is integer. Sample value for this node to enable this policy: 1. +Supported operations are Add, Get, Replace, and Delete. -

If you want to disable this policy use the following SyncML:

+Status of OS volumes and encryptable fixed data volumes are checked with a Get operation. Typically, BitLocker/Device Encryption will follow whichever value [EncryptionMethodByDriveType](#encryptionmethodbydrivetype) policy is set to. However, this policy setting will be ignored for self-encrypting fixed drives and self-encrypting OS drives. + +Encryptable fixed data volumes are treated similarly to OS volumes. However, fixed data volumes must meet additional criteria to be considered encryptable: + +- It must not be a dynamic volume. +- It must not be a recovery partition. +- It must not be a hidden volume. +- It must not be a system partition. +- It must not be backed by virtual storage. +- It must not have a reference in the BCD store. + +The following list shows the supported values: + +- 0 (default) – Disable. If the policy setting is not set or is set to 0, the device's enforcement status will not be checked. The policy will not enforce encryption and it will not decrypt encrypted volumes. +- 1 – Enable. The device's enforcement status will be checked. Setting this policy to 1 will trigger encryption of all drives (silently or non-silently based on [AllowWarningForOtherDiskEncryption](#allowwarningforotherdiskencryption) policy). + +If you want to disable this policy use the following SyncML: ```xml @@ -135,10 +149,9 @@ The following diagram shows the BitLocker configuration service provider in tree ``` -

Data type is integer. Supported operations are Add, Get, Replace, and Delete.

+**EncryptionMethodByDriveType** -**EncryptionMethodByDriveType** -

Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)".

+Allows you to set the default encrytion method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)". @@ -159,7 +172,7 @@ The following diagram shows the BitLocker configuration service provider in tree
Homecross mark
-

ADMX Info:

+ADMX Info: