mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-23 14:23:38 +00:00
Merge branch 'master' into delete-page
This commit is contained in:
@ -16,7 +16,6 @@ ms.topic: article
|
|||||||
# Create mandatory user profiles
|
# Create mandatory user profiles
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
A mandatory user profile is a roaming user profile that has been pre-configured by an administrator to specify settings for users. Settings commonly defined in a mandatory profile include (but are not limited to): icons that appear on the desktop, desktop backgrounds, user preferences in Control Panel, printer selections, and more. Configuration changes made during a user's session that are normally saved to a roaming user profile are not saved when a mandatory user profile is assigned.
|
A mandatory user profile is a roaming user profile that has been pre-configured by an administrator to specify settings for users. Settings commonly defined in a mandatory profile include (but are not limited to): icons that appear on the desktop, desktop backgrounds, user preferences in Control Panel, printer selections, and more. Configuration changes made during a user's session that are normally saved to a roaming user profile are not saved when a mandatory user profile is assigned.
|
||||||
@ -76,7 +75,7 @@ First, you create a default user profile with the customizations that you want,
|
|||||||
> [!TIP]
|
> [!TIP]
|
||||||
> If you receive an error message that says "Sysprep was not able to validate your Windows installation", open %WINDIR%\\System32\\Sysprep\\Panther\\setupact.log and look for an entry like the following:
|
> If you receive an error message that says "Sysprep was not able to validate your Windows installation", open %WINDIR%\\System32\\Sysprep\\Panther\\setupact.log and look for an entry like the following:
|
||||||
>
|
>
|
||||||
> 
|
> 
|
||||||
>
|
>
|
||||||
> Use the [Remove-AppxProvisionedPackage](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage?view=win10-ps) and [Remove-AppxPackage -AllUsers](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage?view=win10-ps) cmdlet in Windows PowerShell to uninstall the app that is listed in the log.
|
> Use the [Remove-AppxProvisionedPackage](https://docs.microsoft.com/powershell/module/dism/remove-appxprovisionedpackage?view=win10-ps) and [Remove-AppxPackage -AllUsers](https://docs.microsoft.com/powershell/module/appx/remove-appxpackage?view=win10-ps) cmdlet in Windows PowerShell to uninstall the app that is listed in the log.
|
||||||
|
|
||||||
@ -89,11 +88,11 @@ Starting in Windows 10 version (2004) Open the Settings app and click on Advance
|
|||||||
1. In **User Profiles**, click **Default Profile**, and then click **Copy To**.
|
1. In **User Profiles**, click **Default Profile**, and then click **Copy To**.
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. In **Copy To**, under **Permitted to use**, click **Change**.
|
1. In **Copy To**, under **Permitted to use**, click **Change**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. In **Select User or Group**, in the **Enter the object name to select** field, type `everyone` or the group of users that the profile will be assigned to, click **Check Names**, and then click **OK**.
|
1. In **Select User or Group**, in the **Enter the object name to select** field, type `everyone` or the group of users that the profile will be assigned to, click **Check Names**, and then click **OK**.
|
||||||
|
|
||||||
@ -101,13 +100,13 @@ Starting in Windows 10 version (2004) Open the Settings app and click on Advance
|
|||||||
|
|
||||||
- If the device is joined to the domain and you are signed in with an account that has permissions to write to a shared folder on the network, you can enter the shared folder path.
|
- If the device is joined to the domain and you are signed in with an account that has permissions to write to a shared folder on the network, you can enter the shared folder path.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
- If the device is not joined to the domain, you can save the profile locally and then copy it to the shared folder location.
|
- If the device is not joined to the domain, you can save the profile locally and then copy it to the shared folder location.
|
||||||
- Optionally, you can check the **Mandatory profile** checkbox. This step is not required but will set permissions that are more restrictive and we recommend doing so.
|
- Optionally, you can check the **Mandatory profile** checkbox. This step is not required but will set permissions that are more restrictive and we recommend doing so.
|
||||||
|
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. Click **OK** to copy the default user profile.
|
1. Click **OK** to copy the default user profile.
|
||||||
|
|
||||||
|
@ -23,10 +23,10 @@ To help diagnose enrollment or device management issues in Windows 10 devices m
|
|||||||

|

|
||||||
|
|
||||||
1. At the bottom of the **Settings** page, click **Create report**.
|
1. At the bottom of the **Settings** page, click **Create report**.
|
||||||

|

|
||||||
1. A window opens that shows the path to the log files. Click **Export**.
|
1. A window opens that shows the path to the log files. Click **Export**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
1. In File Explorer, navigate to c:\Users\Public\Documents\MDMDiagnostics to see the report.
|
1. In File Explorer, navigate to c:\Users\Public\Documents\MDMDiagnostics to see the report.
|
||||||
|
|
||||||
@ -294,21 +294,21 @@ For best results, ensure that the PC or VM on which you are viewing logs matches
|
|||||||
3. Navigate to the etl file that you got from the device and then open the file.
|
3. Navigate to the etl file that you got from the device and then open the file.
|
||||||
4. Click **Yes** when prompted to save it to the new log format.
|
4. Click **Yes** when prompted to save it to the new log format.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
5. The new view contains traces from the channel. Click on **Filter Current Log** from the **Actions** menu.
|
5. The new view contains traces from the channel. Click on **Filter Current Log** from the **Actions** menu.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
6. Add a filter to Event sources by selecting **DeviceManagement-EnterpriseDiagnostics-Provider** and click **OK**.
|
6. Add a filter to Event sources by selecting **DeviceManagement-EnterpriseDiagnostics-Provider** and click **OK**.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
7. Now you are ready to start reviewing the logs.
|
7. Now you are ready to start reviewing the logs.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Collect device state data
|
## Collect device state data
|
||||||
|
|
||||||
@ -336,9 +336,3 @@ Here's an example of how to collect current MDM device state data using the [Dia
|
|||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -6,7 +6,6 @@ ms.mktglfcycl:
|
|||||||
audience: itpro
|
audience: itpro
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.audience: itpro
|
ms.audience: itpro
|
||||||
ms.date: 09/18/2018
|
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
manager: laurawi
|
manager: laurawi
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
@ -16,7 +15,15 @@ author: jaimeo
|
|||||||
|
|
||||||
# Windows Update - additional resources
|
# Windows Update - additional resources
|
||||||
|
|
||||||
> Applies to: Windows 10
|
**Applies to**:
|
||||||
|
|
||||||
|
- Windows 10
|
||||||
|
- Windows Server 2016
|
||||||
|
- Windows Server 2019
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Windows Server 2016 supports policies available in Windows 10, version 1607. Windows Server 2019 supports policies available in Windows 10, version 1809.
|
||||||
|
|
||||||
|
|
||||||
The following resources provide additional information about using Windows Update.
|
The following resources provide additional information about using Windows Update.
|
||||||
|
|
||||||
|
@ -25,6 +25,14 @@ ms.technology: mde
|
|||||||
|
|
||||||
The following information lists the updates made to the Microsoft Defender for Endpoint APIs and the dates they were made.
|
The following information lists the updates made to the Microsoft Defender for Endpoint APIs and the dates they were made.
|
||||||
|
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> RSS feed: Get notified when this page is updated by copying and pasting the following URL into your feed reader:
|
||||||
|
>```
|
||||||
|
>https://docs.microsoft.com/api/search/rss?search=%22Release+notes+for+updates+made+to+the+Microsoft+Defender+for+Endpoint+set+of+APIs%22&locale=en-us&facet=&%24filter=scopes%2Fany%28t%3A+t+eq+%27Windows+10%27%29
|
||||||
|
>```
|
||||||
|
|
||||||
|
|
||||||
### 10.02.2021
|
### 10.02.2021
|
||||||
<hr>
|
<hr>
|
||||||
|
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 3.1 KiB |
Binary file not shown.
After Width: | Height: | Size: 5.2 KiB |
Binary file not shown.
After Width: | Height: | Size: 3.1 KiB |
@ -38,7 +38,10 @@ Logo |Partner name | Description
|
|||||||
| [CSIS Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2091005) | 24/7 monitoring and analysis of security alerts giving companies actionable insights into what, when and how security incidents have taken place
|
| [CSIS Managed Detection & Response](https://go.microsoft.com/fwlink/?linkid=2091005) | 24/7 monitoring and analysis of security alerts giving companies actionable insights into what, when and how security incidents have taken place
|
||||||
| [Dell Technologies Advanced Threat Protection](https://go.microsoft.com/fwlink/?linkid=2091004) | Professional monitoring service for malicious behavior and anomalies with 24/7 capability
|
| [Dell Technologies Advanced Threat Protection](https://go.microsoft.com/fwlink/?linkid=2091004) | Professional monitoring service for malicious behavior and anomalies with 24/7 capability
|
||||||
| [DXC-Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2090395) | Identify endpoint threats that evade traditional security defenses and contain them in hours or minutes, not days
|
| [DXC-Managed Endpoint Threat Detection and Response](https://go.microsoft.com/fwlink/?linkid=2090395) | Identify endpoint threats that evade traditional security defenses and contain them in hours or minutes, not days
|
||||||
|
 | [eSentire Managed Detection and Response](https://go.microsoft.com/fwlink/?linkid=2154970) | 24x7 threat investigations and response via Microsoft Defender for Endpoint.
|
||||||
| [NTT Security](https://go.microsoft.com/fwlink/?linkid=2095320) | NTT's EDR Service provides 24/7 security monitoring & response across your endpoint and network
|
| [NTT Security](https://go.microsoft.com/fwlink/?linkid=2095320) | NTT's EDR Service provides 24/7 security monitoring & response across your endpoint and network
|
||||||
|
 | [Onevinn MDR](https://go.microsoft.com/fwlink/?linkid=2155203)| 24/7 Managed Detection and Response built on Microsoft Defender and Azure Sentinel, enriched with Onevinn's threat intelligence.
|
||||||
|
 | [Quorum Cyber](https://go.microsoft.com/fwlink/?linkid=2155202)| A cutting-edge Threat Hunting & Security Engineering service.
|
||||||
| [Red Canary](https://go.microsoft.com/fwlink/?linkid=2103852) | Red Canary is a security operations partner for modern teams, MDR deployed in minutes
|
| [Red Canary](https://go.microsoft.com/fwlink/?linkid=2103852) | Red Canary is a security operations partner for modern teams, MDR deployed in minutes
|
||||||
| [SecureWorks Managed Detection and Response Powered by Red Cloak](https://go.microsoft.com/fwlink/?linkid=2133634) | Secureworks combines threat intelligence and 20+ years of experience into SaaS and managed security solutions
|
| [SecureWorks Managed Detection and Response Powered by Red Cloak](https://go.microsoft.com/fwlink/?linkid=2133634) | Secureworks combines threat intelligence and 20+ years of experience into SaaS and managed security solutions
|
||||||
| [sepagoSOC](https://go.microsoft.com/fwlink/?linkid=2090491) | Ensure holistic security through sophisticated automated workflows in your zero trust environment
|
| [sepagoSOC](https://go.microsoft.com/fwlink/?linkid=2090491) | Ensure holistic security through sophisticated automated workflows in your zero trust environment
|
||||||
|
Reference in New Issue
Block a user