mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-16 23:37:22 +00:00
Merge remote-tracking branch 'refs/remotes/origin/master' into rs4
This commit is contained in:
commit
c460ee789d
File diff suppressed because it is too large
Load Diff
@ -9,7 +9,7 @@ ms.pagetype: edu
|
|||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
author: CelesteDG
|
author: CelesteDG
|
||||||
ms.author: celested
|
ms.author: celested
|
||||||
ms.date: 03/12/2018
|
ms.date: 04/04/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Technical reference for the Set up School PCs app
|
# Technical reference for the Set up School PCs app
|
||||||
@ -290,7 +290,8 @@ The Set up School PCs app produces a specialized provisioning package that makes
|
|||||||
<tr><td><p>Accounts: Block Microsoft accounts</p><p>**Note** Microsoft accounts can still be used in apps.</p></td><td><p>Enabled</p></td></tr>
|
<tr><td><p>Accounts: Block Microsoft accounts</p><p>**Note** Microsoft accounts can still be used in apps.</p></td><td><p>Enabled</p></td></tr>
|
||||||
<tr> <td> <p> Interactive logon: Do not display last user name </p> </td> <td> <p> Enabled</p> </td>
|
<tr> <td> <p> Interactive logon: Do not display last user name </p> </td> <td> <p> Enabled</p> </td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr> <td> <p> Interactive logon: Sign-in last interactive user automatically after a system-initiated restart</p> </td> <td> <p> Disabled</p> </td>
|
<tr> <td> <p> Interactive logon: Sign-in last interactive user automatically after a system-initiated restart</p> </td> <td> <p> Disabled</p> </td>
|
||||||
|
</tr>
|
||||||
<tr> <td> <p> User Account Control: Behavior of the elevation prompt for standard users </p> </td> <td> <p> Auto deny</p> </td>
|
<tr> <td> <p> User Account Control: Behavior of the elevation prompt for standard users </p> </td> <td> <p> Auto deny</p> </td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
|
@ -92,16 +92,10 @@ Windows Automatic Redeployment is a two-step process: trigger it and then authen
|
|||||||
|
|
||||||
Windows Automatic Redeployment will fail when the [Windows Recovery Environment (WinRE)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference) is not enabled on the device. You will see `Error code: ERROR_NOT_SUPPORTED (0x80070032)`.
|
Windows Automatic Redeployment will fail when the [Windows Recovery Environment (WinRE)](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-recovery-environment--windows-re--technical-reference) is not enabled on the device. You will see `Error code: ERROR_NOT_SUPPORTED (0x80070032)`.
|
||||||
|
|
||||||
To check if WinRE is enabled, use the [REAgentC.exe tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
To make sure WinRE is enabled, use the [REAgentC.exe tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
||||||
|
|
||||||
```
|
```
|
||||||
reagent /info
|
reagentc /enable
|
||||||
```
|
|
||||||
|
|
||||||
If WinRE is not enabled, use the [REAgentC.exe tool](https://docs.microsoft.com/windows-hardware/manufacture/desktop/reagentc-command-line-options) to run the following command:
|
|
||||||
|
|
||||||
```
|
|
||||||
reagent /enable
|
|
||||||
```
|
```
|
||||||
|
|
||||||
If Windows Automatic Reployment fails after enabling WinRE, or if you are unable to enable WinRE, please contact [Microsoft Support](https://support.microsoft.com) for assistance.
|
If Windows Automatic Reployment fails after enabling WinRE, or if you are unable to enable WinRE, please contact [Microsoft Support](https://support.microsoft.com) for assistance.
|
||||||
|
@ -286,6 +286,10 @@ The following table lists the installation prerequisites for the MBAM Administra
|
|||||||
</ul></td>
|
</ul></td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="even">
|
<tr class="even">
|
||||||
|
<td align="left"><p>ASP.NET MVC 4.0</p></td>
|
||||||
|
<td align="left"><p>[ASP.NET MVC 4 download](https://go.microsoft.com/fwlink/?LinkId=392271)</p></td>
|
||||||
|
</tr>
|
||||||
|
<tr class="odd">
|
||||||
<td align="left"><p>Service Principal Name (SPN)</p></td>
|
<td align="left"><p>Service Principal Name (SPN)</p></td>
|
||||||
<td align="left"><p>The web applications require an SPN for the virtual host name under the domain account that you use for the web application pools.</p>
|
<td align="left"><p>The web applications require an SPN for the virtual host name under the domain account that you use for the web application pools.</p>
|
||||||
<p>If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See [Setspn](http://technet.microsoft.com/library/cc731241.aspx) for information about the rights required to create SPNs.</p>
|
<p>If your administrative rights permit you to create SPNs in Active Directory Domain Services, MBAM creates the SPN for you. See [Setspn](http://technet.microsoft.com/library/cc731241.aspx) for information about the rights required to create SPNs.</p>
|
||||||
|
@ -230,6 +230,7 @@
|
|||||||
### [Deploy Windows 10 updates using System Center Configuration Manager](update/waas-manage-updates-configuration-manager.md)
|
### [Deploy Windows 10 updates using System Center Configuration Manager](update/waas-manage-updates-configuration-manager.md)
|
||||||
### [Manage device restarts after updates](update/waas-restart.md)
|
### [Manage device restarts after updates](update/waas-restart.md)
|
||||||
### [Manage additional Windows Update settings](update/waas-wu-settings.md)
|
### [Manage additional Windows Update settings](update/waas-wu-settings.md)
|
||||||
|
### [Determine the source of Windows updates](update/windows-update-sources.md)
|
||||||
### [Windows Insider Program for Business](update/waas-windows-insider-for-business.md)
|
### [Windows Insider Program for Business](update/waas-windows-insider-for-business.md)
|
||||||
#### [Introduction to the Windows Insider Program for Business](update/WIP4Biz-intro.md)
|
#### [Introduction to the Windows Insider Program for Business](update/WIP4Biz-intro.md)
|
||||||
#### [Windows Insider Program for Business Frequently Asked Questions](update/waas-windows-insider-for-business-faq.md)
|
#### [Windows Insider Program for Business Frequently Asked Questions](update/waas-windows-insider-for-business-faq.md)
|
||||||
|
@ -1,16 +1,16 @@
|
|||||||
---
|
---
|
||||||
title: Update Windows 10 in the enterprise (Windows 10)
|
title: Update Windows 10 in enterprise deployments (Windows 10)
|
||||||
description: Windows as a service provides an all-new way to think about building, deploying, and servicing Windows 10.
|
description: Windows as a service provides an all-new way to think about building, deploying, and servicing Windows 10.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
author: DaniHalfin
|
author: Jaimeo
|
||||||
ms.localizationpriority: high
|
ms.localizationpriority: high
|
||||||
ms.author: daniha
|
ms.author: jaimeo
|
||||||
ms.date: 11/17/2017
|
ms.date: 04/06/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Update Windows 10 in the enterprise
|
# Update Windows 10 in enterprise deployments
|
||||||
|
|
||||||
|
|
||||||
**Applies to**
|
**Applies to**
|
||||||
|
37
windows/deployment/update/windows-update-sources.md
Normal file
37
windows/deployment/update/windows-update-sources.md
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
---
|
||||||
|
title: Determine the source of Windows updates
|
||||||
|
description: Determine the source that Windows Update service is currently using.
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl:
|
||||||
|
ms.sitesec: library
|
||||||
|
author: kaushika-msft
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.author: jaimeo
|
||||||
|
ms.date: 04/05/2018
|
||||||
|
---
|
||||||
|
|
||||||
|
# Determine the source of Windows updates
|
||||||
|
|
||||||
|
Windows 10 devices can receive updates from a variety of sources, including Windows Update online, a Windows Server Update Services server, and others. To determine the source of Windows Updates currently being used on a device, follow these steps:
|
||||||
|
|
||||||
|
1. Start Windows PowerShell as an administrator
|
||||||
|
2. Run `\$MUSM = New-Object -ComObject “Microsoft.Update.ServiceManager”`.
|
||||||
|
3. Run `\$MUSM.Services`. Check the resulting output for the **Name** and **OffersWindowsUPdates** parameters, which you can intepret according to this table:
|
||||||
|
|
||||||
|
| Output | Interpretation |
|
||||||
|
|-----------------------------------------------------|-----------------------------------|
|
||||||
|
| - Name: **Microsoft Update**<br>-OffersWindowsUpdates: **True** | - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.)|
|
||||||
|
|- Name: **DCat Flighting Prod** <br>- OffersWindowsUpdates: **False**|- The update source is the Windows Insider Program.<br>- Indicates that the client will not receive or is not configured to receive these updates. |
|
||||||
|
| - Name: **Windows Store (DCat Prod)**<br>- OffersWindowsUpdates: **False** |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client will not receive or is not configured to receive these updates.|
|
||||||
|
|- Name: **Windows Server Update Service**<br>- OffersWindowsUpdates: **True** |- The source is a Windows Server Updates Services server.<br>- The client is configured to receive updates from WSUS.|
|
||||||
|
|- Name: **Windows Update**<br>- OffersWindowsUpdates: **True** |- The source is Windows Update.<br>- The client is configured to receive updates from Windows Update Online.|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
See also:
|
||||||
|
|
||||||
|
[Understanding the Windowsupdate.log file for advanced users](https://support.microsoft.com/help/4035760)
|
||||||
|
|
||||||
|
[You can't install updates on a Windows-based computer](https://support.microsoft.com/help/2509997/you-can-t-install-updates-on-a-windows-based-computer)
|
||||||
|
|
||||||
|
[How to read the Windowsupdate.log file on Windows 7 and earlier OS versions](https://support.microsoft.com/help/902093/how-to-read-the-windowsupdate-log-file)
|
@ -20,7 +20,7 @@ Prefer video? See
|
|||||||
[Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474)
|
[Windows Defender Credential Guard Deployment](https://mva.microsoft.com/en-us/training-courses/deep-dive-into-credential-guard-16651?l=sRcyvLJyC_3304300474)
|
||||||
in the Deep Dive into Windows Defender Credential Guard video series.
|
in the Deep Dive into Windows Defender Credential Guard video series.
|
||||||
|
|
||||||
For Windows Defender Credential Guard to provide protections, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
For Windows Defender Credential Guard to provide protection, the computers you are protecting must meet certain baseline hardware, firmware, and software requirements which we will refer to as [Hardware and software requirements](#hardware-and-software-requirements). Additionally, Windows Defender Credential Guard blocks specific authentication capabilities, so applications that require such capabilities will break. We will refer to this as [Application requirements](#application-requirements). Beyond that, computers can meet additional hardware and firmware qualifications, and receive additional protections. Those computers will be more hardened against certain threats. For detailed information on baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017, refer to the tables in [Security Considerations](#security-considerations).
|
||||||
|
|
||||||
|
|
||||||
## Hardware and software requirements
|
## Hardware and software requirements
|
||||||
|
@ -799,7 +799,7 @@ To create a WDAC policy, copy each of the following commands into an elevated Wi
|
|||||||
|
|
||||||
2. Use [New-CIPolicy](https://docs.microsoft.com/powershell/module/configci/new-cipolicy?view=win10-ps) to create a new WDAC policy by scanning the system for installed applications:
|
2. Use [New-CIPolicy](https://docs.microsoft.com/powershell/module/configci/new-cipolicy?view=win10-ps) to create a new WDAC policy by scanning the system for installed applications:
|
||||||
|
|
||||||
` New-CIPolicy -Level PcaCertificate -FilePath $InitialCIPolicy –UserPEs 3> CIPolicyLog.txt `
|
` New-CIPolicy -Level FilePublisher -FilePath $InitialCIPolicy –UserPEs -FallBack Hash 3> CIPolicyLog.txt `
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
|
|
||||||
@ -841,7 +841,7 @@ When WDAC policies are run in audit mode, it allows administrators to discover a
|
|||||||
|
|
||||||
> - An alternative method to test a policy is to rename the test file to SIPolicy.p7b and drop it into C:\\Windows\\System32\\CodeIntegrity, rather than deploy it by using the Local Group Policy Editor.
|
> - An alternative method to test a policy is to rename the test file to SIPolicy.p7b and drop it into C:\\Windows\\System32\\CodeIntegrity, rather than deploy it by using the Local Group Policy Editor.
|
||||||
|
|
||||||
3. Navigate to **Computer Configuration\\Administrative Templates\\System\\Windows Defender Device Guard**, and then select **Deploy Windows Defender Application Control**. Enable this setting by using the appropriate file path, for example, C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 1.
|
3. Navigate to **Computer Configuration\\Administrative Templates\\System\\Device Guard**, and then select **Deploy Windows Defender Application Control**. Enable this setting by using the appropriate file path, for example, C:\\Windows\\System32\\CodeIntegrity\\DeviceGuardPolicy.bin, as shown in Figure 1.
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
|
|
||||||
@ -889,7 +889,7 @@ Use the following procedure after you have been running a computer with a WDAC p
|
|||||||
|
|
||||||
3. Use [New-CIPolicy](https://docs.microsoft.com/powershell/module/configci/new-cipolicy?view=win10-ps) to generate a new WDAC policy from logged audit events. This example uses a file rule level of **Hash** and includes `3> CIPolicylog.txt`, which redirects warning messages to a text file, **CIPolicylog.txt**.
|
3. Use [New-CIPolicy](https://docs.microsoft.com/powershell/module/configci/new-cipolicy?view=win10-ps) to generate a new WDAC policy from logged audit events. This example uses a file rule level of **Hash** and includes `3> CIPolicylog.txt`, which redirects warning messages to a text file, **CIPolicylog.txt**.
|
||||||
|
|
||||||
` New-CIPolicy -Audit -Level Hash -FilePath $CIAuditPolicy –UserPEs 3> CIPolicylog.txt`
|
` New-CIPolicy -Audit -Level Hash -FilePath $CIAuditPolicy –UserPEs 3 -FallBack Hash > CIPolicylog.txt`
|
||||||
|
|
||||||
> [!Note]
|
> [!Note]
|
||||||
> When you create policies from audit events, you should carefully consider the file rule level that you select to trust. The preceding example uses the **Hash** rule level, which is the most specific. Any change to the file (such as replacing the file with a newer version of the same file) will change the Hash value, and require an update to the policy.
|
> When you create policies from audit events, you should carefully consider the file rule level that you select to trust. The preceding example uses the **Hash** rule level, which is the most specific. Any change to the file (such as replacing the file with a newer version of the same file) will change the Hash value, and require an update to the policy.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user