From 34ce7667c4bc6aca71fa1a2d3925a8fb039c8243 Mon Sep 17 00:00:00 2001 From: Michael Niehaus Date: Wed, 1 Jul 2020 16:27:10 -0700 Subject: [PATCH] Added MSA policy to the list Added a new row to not set the "Microsoft Account sign-in assistant" setting to disabled. --- windows/deployment/windows-autopilot/policy-conflicts.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/deployment/windows-autopilot/policy-conflicts.md b/windows/deployment/windows-autopilot/policy-conflicts.md index f4abf3e78c..3c4126ff73 100644 --- a/windows/deployment/windows-autopilot/policy-conflicts.md +++ b/windows/deployment/windows-autopilot/policy-conflicts.md @@ -35,6 +35,9 @@ There are a significant number of policy settings available for Windows 10, both
Windows 10 Security Baseline / Require admin approval mode for administrators When modifying user account control (UAC) settings during the OOBE using the device Enrollment Status Page (ESP), additional UAC prompts may result, especially if the device reboots after these policies are applied, enabling them to take effect. To work around this issue, the policies can be targeted to users instead of devices so that they apply later in the process. +Device restrictions / Cloud and Storage / Microsoft Account sign-in assistant +Setting this policy to "disabled" will disable the Microsoft Sign-in Assistant service (wlidsvc). This service is required by Windows Autopilot to obtain the Windows Autopilot profile. + ## Related topics