mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 06:17:22 +00:00
Merge branch 'master' into asr
This commit is contained in:
commit
c58cd058de
@ -390,7 +390,7 @@
|
|||||||
"elizapo@microsoft.com"
|
"elizapo@microsoft.com"
|
||||||
],
|
],
|
||||||
"sync_notification_subscribers": [
|
"sync_notification_subscribers": [
|
||||||
"daniha@microsoft.com"
|
"dstrome@microsoft.com"
|
||||||
],
|
],
|
||||||
"branches_to_filter": [
|
"branches_to_filter": [
|
||||||
""
|
""
|
||||||
@ -431,9 +431,9 @@
|
|||||||
"template_folder": "_themes.pdf"
|
"template_folder": "_themes.pdf"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"need_generate_pdf": false,
|
|
||||||
"need_generate_intellisense": false,
|
|
||||||
"docs_build_engine": {
|
"docs_build_engine": {
|
||||||
"name": "docfx_v3"
|
"name": "docfx_v3"
|
||||||
}
|
},
|
||||||
|
"need_generate_pdf": false,
|
||||||
|
"need_generate_intellisense": false
|
||||||
}
|
}
|
@ -1534,6 +1534,11 @@
|
|||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinegroups-collection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/get-machinegroups-collection.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list",
|
||||||
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/get-machinesecuritystates-collection-windows-defender-advanced-threat-protection.md",
|
||||||
@ -2039,6 +2044,11 @@
|
|||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/supported-response-apis-windows-defender-advanced-threat-protection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/supported-response-apis",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/supported-response-apis.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/exposed-apis-list",
|
||||||
|
"redirect_document_id": false
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/threat-protection/windows-defender-atp/threat-indicator-concepts-windows-defender-advanced-threat-protection.md",
|
||||||
@ -15105,6 +15115,11 @@
|
|||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip",
|
||||||
"redirect_document_id": true
|
"redirect_document_id": true
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-atp/find-machine-info-by-ip.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/find-machines-by-ip",
|
||||||
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
|
"source_path": "windows/security/threat-protection/windows-defender-atp/get-filemachineaction-object-windows-defender-advanced-threat-protection.md",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis",
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/use-apis",
|
||||||
@ -16509,6 +16524,16 @@
|
|||||||
"source_path": "windows/hub/windows-10.yml",
|
"source_path": "windows/hub/windows-10.yml",
|
||||||
"redirect_url": "https://docs.microsoft.com/windows/windows-10",
|
"redirect_url": "https://docs.microsoft.com/windows/windows-10",
|
||||||
"redirect_document_id": false
|
"redirect_document_id": false
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/defender-endpoint-false-positives-negatives",
|
||||||
|
"redirect_document_id": true
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source_path": "windows/security/threat-protection/windows-defender-exploit-guard/troubleshoot-asr.md",
|
||||||
|
"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr",
|
||||||
|
"redirect_document_id": false
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -68,7 +68,7 @@ Additional information on Internet Explorer 11, including a Readiness Toolkit, t
|
|||||||
|
|
||||||
## Availability of Internet Explorer 11
|
## Availability of Internet Explorer 11
|
||||||
|
|
||||||
Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the Microsoft Endpoint Configuration Manager and WSUS.
|
Automatic Updates will start to distribute Internet Explorer 11 shortly after the final release of the product and will distribute it through the Microsoft Endpoint Manager and WSUS.
|
||||||
|
|
||||||
## Prevent automatic installation of Internet Explorer 11 with WSUS
|
## Prevent automatic installation of Internet Explorer 11 with WSUS
|
||||||
|
|
||||||
|
@ -2,9 +2,10 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Week of November 30, 2020
|
## Week of January 11, 2021
|
||||||
|
|
||||||
|
|
||||||
| Published On |Topic title | Change |
|
| Published On |Topic title | Change |
|
||||||
|------|------------|--------|
|
|------|------------|--------|
|
||||||
| 12/4/2020 | [Deploy Windows 10 in a school district (Windows 10)](/education/windows/deploy-windows-10-in-a-school-district) | modified |
|
| 1/14/2021 | [Chromebook migration guide (Windows 10)](/education/windows/chromebook-migration-guide) | modified |
|
||||||
|
| 1/14/2021 | [Deploy Windows 10 in a school district (Windows 10)](/education/windows/deploy-windows-10-in-a-school-district) | modified |
|
||||||
|
@ -457,7 +457,7 @@ Table 5. Select on-premises AD DS, Azure AD, or hybrid
|
|||||||
<td align="left">X</td>
|
<td align="left">X</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="odd">
|
<tr class="odd">
|
||||||
<td align="left">Use Microsoft Endpoint Configuration Manager for management</td>
|
<td align="left">Use Microsoft Endpoint Manager for management</td>
|
||||||
<td align="left">X</td>
|
<td align="left">X</td>
|
||||||
<td align="left"></td>
|
<td align="left"></td>
|
||||||
<td align="left">X</td>
|
<td align="left">X</td>
|
||||||
|
@ -202,7 +202,7 @@ Before you select the deployment and management methods, you need to review the
|
|||||||
|Scenario feature |Cloud-centric|On-premises and cloud|
|
|Scenario feature |Cloud-centric|On-premises and cloud|
|
||||||
|---|---|---|
|
|---|---|---|
|
||||||
|Identity management | Azure AD (stand-alone or integrated with on-premises AD DS) | AD DS integrated with Azure AD |
|
|Identity management | Azure AD (stand-alone or integrated with on-premises AD DS) | AD DS integrated with Azure AD |
|
||||||
|Windows 10 deployment | MDT only | Microsoft Endpoint Configuration Manager with MDT |
|
|Windows 10 deployment | MDT only | Microsoft Endpoint Manager with MDT |
|
||||||
|Configuration setting management | Intune | Group Policy<br/><br/>Intune|
|
|Configuration setting management | Intune | Group Policy<br/><br/>Intune|
|
||||||
|App and update management | Intune |Microsoft Endpoint Configuration Manager<br/><br/>Intune|
|
|App and update management | Intune |Microsoft Endpoint Configuration Manager<br/><br/>Intune|
|
||||||
|
|
||||||
@ -216,14 +216,14 @@ These scenarios assume the need to support:
|
|||||||
Some constraints exist in these scenarios. As you select the deployment and management methods for your device, keep the following constraints in mind:
|
Some constraints exist in these scenarios. As you select the deployment and management methods for your device, keep the following constraints in mind:
|
||||||
|
|
||||||
* You can use Group Policy or Intune to manage configuration settings on a device but not both.
|
* You can use Group Policy or Intune to manage configuration settings on a device but not both.
|
||||||
* You can use Microsoft Endpoint Configuration Manager or Intune to manage apps and updates on a device but not both.
|
* You can use Microsoft Endpoint Manager or Intune to manage apps and updates on a device but not both.
|
||||||
* You cannot manage multiple users on a device with Intune if the device is AD DS domain joined.
|
* You cannot manage multiple users on a device with Intune if the device is AD DS domain joined.
|
||||||
|
|
||||||
Use the cloud-centric scenario and on-premises and cloud scenario as a guide for your district. You may need to customize these scenarios, however, based on your district. As you go through the [Select the deployment methods](#select-the-deployment-methods), [Select the configuration setting management methods](#select-the-configuration-setting-management-methods), and the [Select the app and update management products](#select-the-app-and-update-management-products) sections, remember these scenarios and use them as the basis for your district.
|
Use the cloud-centric scenario and on-premises and cloud scenario as a guide for your district. You may need to customize these scenarios, however, based on your district. As you go through the [Select the deployment methods](#select-the-deployment-methods), [Select the configuration setting management methods](#select-the-configuration-setting-management-methods), and the [Select the app and update management products](#select-the-app-and-update-management-products) sections, remember these scenarios and use them as the basis for your district.
|
||||||
|
|
||||||
### Select the deployment methods
|
### Select the deployment methods
|
||||||
|
|
||||||
To deploy Windows 10 and your apps, you can use MDT by itself or Microsoft Endpoint Configuration Manager and MDT together. For a district, there are a few ways to deploy Windows 10 to devices. Table 2 lists the methods that this guide describes and recommends. Use this information to determine which combination of deployment methods is right for your institution.
|
To deploy Windows 10 and your apps, you can use MDT by itself or Microsoft Endpoint Manager and MDT together. For a district, there are a few ways to deploy Windows 10 to devices. Table 2 lists the methods that this guide describes and recommends. Use this information to determine which combination of deployment methods is right for your institution.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
@ -291,7 +291,7 @@ Select this method when you:</p>
|
|||||||
</ul>
|
</ul>
|
||||||
<p>The disadvantages of this method are that it:</p>
|
<p>The disadvantages of this method are that it:</p>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Carries an additional cost for Microsoft Endpoint Configuration Manager server licenses (if the institution does not have Configuration Manager already).</li>
|
<li>Carries an additional cost for Microsoft Endpoint Manager server licenses (if the institution does not have Configuration Manager already).</li>
|
||||||
<li>Can deploy Windows 10 only to domain-joined (institution-owned devices).</li>
|
<li>Can deploy Windows 10 only to domain-joined (institution-owned devices).</li>
|
||||||
<li>Requires an AD DS infrastructure (if the institution does not have AD DS already).</li>
|
<li>Requires an AD DS infrastructure (if the institution does not have AD DS already).</li>
|
||||||
</ul>
|
</ul>
|
||||||
@ -307,7 +307,7 @@ Record the deployment methods you selected in Table 3.
|
|||||||
|Selection | Deployment method|
|
|Selection | Deployment method|
|
||||||
|--------- | -----------------|
|
|--------- | -----------------|
|
||||||
| |MDT by itself |
|
| |MDT by itself |
|
||||||
| |Microsoft Endpoint Configuration Manager and MDT|
|
| |Microsoft Endpoint Manager and MDT|
|
||||||
|
|
||||||
*Table 3. Deployment methods selected*
|
*Table 3. Deployment methods selected*
|
||||||
|
|
||||||
@ -483,12 +483,12 @@ Select this method when you:</p>
|
|||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td valign="top">Microsoft Endpoint Configuration Manager and Intune (hybrid)</td>
|
<td valign="top">Microsoft Endpoint Manager and Intune (hybrid)</td>
|
||||||
<td><p>Configuration Manager and Intune together extend Configuration Manager from an on-premises management system for domain-joined devices to a solution that can manage devices regardless of their location and connectivity options. This hybrid option provides the benefits of both Configuration Manager and Intune.<br/><br/>
|
<td><p>Configuration Manager and Intune together extend Configuration Manager from an on-premises management system for domain-joined devices to a solution that can manage devices regardless of their location and connectivity options. This hybrid option provides the benefits of both Configuration Manager and Intune.<br/><br/>
|
||||||
Configuration Manager and Intune in the hybrid configuration allow you to support application management throughout the entire application life cycle. You can deploy, upgrade, manage multiple versions, and retire applications by using Configuration Manager, and you can manage Windows desktop and Microsoft Store applications for both institution-owned and personal devices.<br/><br/>
|
Configuration Manager and Intune in the hybrid configuration allow you to support application management throughout the entire application life cycle. You can deploy, upgrade, manage multiple versions, and retire applications by using Configuration Manager, and you can manage Windows desktop and Microsoft Store applications for both institution-owned and personal devices.<br/><br/>
|
||||||
Select this method when you:</p>
|
Select this method when you:</p>
|
||||||
<ul>
|
<ul>
|
||||||
<li>Selected Microsoft Endpoint Configuration Manager to deploy Windows 10.</li>
|
<li>Selected Microsoft Endpoint Manager to deploy Windows 10.</li>
|
||||||
<li>Want to manage institution-owned and personal devices (does not require that the device be domain joined).</li>
|
<li>Want to manage institution-owned and personal devices (does not require that the device be domain joined).</li>
|
||||||
<li>Want to manage domain-joined devices.</li>
|
<li>Want to manage domain-joined devices.</li>
|
||||||
<li>Want to manage Azure AD domain-joined devices.</li>
|
<li>Want to manage Azure AD domain-joined devices.</li>
|
||||||
@ -525,9 +525,9 @@ Record the app and update management methods that you selected in Table 7.
|
|||||||
|
|
||||||
|Selection | Management method|
|
|Selection | Management method|
|
||||||
|----------|------------------|
|
|----------|------------------|
|
||||||
| |Microsoft Endpoint Configuration Manager by itself|
|
| |Microsoft Endpoint Manager by itself|
|
||||||
| |Intune by itself|
|
| |Intune by itself|
|
||||||
| |Microsoft Endpoint Configuration Manager and Intune (hybrid mode)|
|
| |Microsoft Endpoint Manager and Intune (hybrid mode)|
|
||||||
|
|
||||||
*Table 7. App and update management methods selected*
|
*Table 7. App and update management methods selected*
|
||||||
|
|
||||||
@ -570,11 +570,11 @@ For more information about how to create a deployment share, see [Step 3-1: Crea
|
|||||||
### Install the Configuration Manager console
|
### Install the Configuration Manager console
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you selected Microsoft Endpoint Configuration Manager to deploy Windows 10 or manage your devices (in the [Select the deployment methods](#select-the-deployment-methods) and [Select the configuration setting management methods](#select-the-configuration-setting-management-methods) sections, respectively), perform the steps in this section. Otherwise, skip this section and continue to the next.
|
> If you selected Microsoft Endpoint Manager to deploy Windows 10 or manage your devices (in the [Select the deployment methods](#select-the-deployment-methods) and [Select the configuration setting management methods](#select-the-configuration-setting-management-methods) sections, respectively), perform the steps in this section. Otherwise, skip this section and continue to the next.
|
||||||
|
|
||||||
You can use Configuration Manager to manage Windows 10 deployments, Windows desktop apps, Microsoft Store apps, and software updates. To manage Configuration Manager, you use the Configuration Manager console. You must install the Configuration Manager console on every device you use to manage Configuration Manager (specifically, the admin device). The Configuration Manager console is automatically installed when you install Configuration Manager primary site servers.
|
You can use Configuration Manager to manage Windows 10 deployments, Windows desktop apps, Microsoft Store apps, and software updates. To manage Configuration Manager, you use the Configuration Manager console. You must install the Configuration Manager console on every device you use to manage Configuration Manager (specifically, the admin device). The Configuration Manager console is automatically installed when you install Configuration Manager primary site servers.
|
||||||
|
|
||||||
For more information about how to install the Configuration Manager console, see [Install Microsoft Endpoint Configuration Manager consoles](https://technet.microsoft.com/library/mt590197.aspx#bkmk_InstallConsole).
|
For more information about how to install the Configuration Manager console, see [Install Microsoft Endpoint Manager consoles](https://technet.microsoft.com/library/mt590197.aspx#bkmk_InstallConsole).
|
||||||
|
|
||||||
### Configure MDT integration with the Configuration Manager console
|
### Configure MDT integration with the Configuration Manager console
|
||||||
|
|
||||||
@ -733,7 +733,7 @@ The following Azure AD Premium features are not in Azure AD Basic:
|
|||||||
|
|
||||||
* Allow designated users to manage group membership
|
* Allow designated users to manage group membership
|
||||||
* Dynamic group membership based on user metadata
|
* Dynamic group membership based on user metadata
|
||||||
* Azure AD Multi-Factor Authentication authentication (MFA; see [What is Azure AD Multi-Factor Authentication Authentication](https://azure.microsoft.com/documentation/articles/multi-factor-authentication/))
|
* Azure AD Multi-Factor Authentication (MFA; see [What is Azure AD Multi-Factor Authentication](https://azure.microsoft.com/documentation/articles/multi-factor-authentication/))
|
||||||
* Identify cloud apps that your users run
|
* Identify cloud apps that your users run
|
||||||
* Self-service recovery of BitLocker
|
* Self-service recovery of BitLocker
|
||||||
* Add local administrator accounts to Windows 10 devices
|
* Add local administrator accounts to Windows 10 devices
|
||||||
@ -1148,7 +1148,7 @@ At the end of this section, you should know the Windows 10 editions and processo
|
|||||||
|
|
||||||
## Prepare for deployment
|
## Prepare for deployment
|
||||||
|
|
||||||
Before you can deploy Windows 10 and your apps to devices, you need to prepare your MDT environment, Windows Deployment Services, and Microsoft Endpoint Configuration Manager (if you selected it to do operating system deployment in the [Select the deployment methods](#select-the-deployment-methods) section). In this section, you ensure that the deployment methods you selected in the [Select the deployment methods](#select-the-deployment-methods) section have the necessary Windows 10 editions and versions, Windows desktop apps, Microsoft Store apps, and device drivers.
|
Before you can deploy Windows 10 and your apps to devices, you need to prepare your MDT environment, Windows Deployment Services, and Microsoft Endpoint Manager (if you selected it to do operating system deployment in the [Select the deployment methods](#select-the-deployment-methods) section). In this section, you ensure that the deployment methods you selected in the [Select the deployment methods](#select-the-deployment-methods) section have the necessary Windows 10 editions and versions, Windows desktop apps, Microsoft Store apps, and device drivers.
|
||||||
|
|
||||||
### Configure the MDT deployment share
|
### Configure the MDT deployment share
|
||||||
|
|
||||||
@ -1245,7 +1245,7 @@ For more information about how to update a deployment share, see <a href="https:
|
|||||||
### Configure Microsoft Endpoint Configuration Manager
|
### Configure Microsoft Endpoint Configuration Manager
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you have already configured your Microsoft Endpoint Configuration Manager infrastructure to support the operating system deployment feature or if you selected to deploy Windows 10 by using MDT only, then skip this section and continue to the next section.
|
> If you have already configured your Microsoft Endpoint Manager infrastructure to support the operating system deployment feature or if you selected to deploy Windows 10 by using MDT only, then skip this section and continue to the next section.
|
||||||
|
|
||||||
Before you can use Configuration Manager to deploy Windows 10 and manage your apps and devices, you must configure Configuration Manager to support the operating system deployment feature. If you don’t have an existing Configuration Manager infrastructure, you will need to deploy a new infrastructure.
|
Before you can use Configuration Manager to deploy Windows 10 and manage your apps and devices, you must configure Configuration Manager to support the operating system deployment feature. If you don’t have an existing Configuration Manager infrastructure, you will need to deploy a new infrastructure.
|
||||||
|
|
||||||
@ -1255,7 +1255,7 @@ Deploying a new Configuration Manager infrastructure is beyond the scope of this
|
|||||||
* [Start using Configuration Manager](https://technet.microsoft.com/library/mt608544.aspx)
|
* [Start using Configuration Manager](https://technet.microsoft.com/library/mt608544.aspx)
|
||||||
|
|
||||||
|
|
||||||
#### To configure an existing Microsoft Endpoint Configuration Manager infrastructure for operating system deployment
|
#### To configure an existing Microsoft Endpoint Manager infrastructure for operating system deployment
|
||||||
|
|
||||||
1. Perform any necessary infrastructure remediation.
|
1. Perform any necessary infrastructure remediation.
|
||||||
|
|
||||||
@ -1264,12 +1264,12 @@ Deploying a new Configuration Manager infrastructure is beyond the scope of this
|
|||||||
|
|
||||||
You need to add the Windows PE boot images, Windows 10 operating system images, and other deployment content that you will use to deploy Windows 10 with ZTI. To add this content, use the Create MDT Task Sequence Wizard.
|
You need to add the Windows PE boot images, Windows 10 operating system images, and other deployment content that you will use to deploy Windows 10 with ZTI. To add this content, use the Create MDT Task Sequence Wizard.
|
||||||
|
|
||||||
You can add this content by using Microsoft Endpoint Configuration Manager only (without MDT), but the Create MDT Task Sequence Wizard is the preferred method because the wizard prompts you for all the deployment content you need for a task sequence and provides a much more intuitive user experience. For more information, see [Create ZTI Task Sequences Using the Create MDT Task Sequence Wizard in Configuration Manager](https://technet.microsoft.com/library/dn759415.aspx#CreateZTITaskSequencesUsingtheCreateMDTTaskSequenceWizardinConfigurationManager).
|
You can add this content by using Microsoft Endpoint Manager only (without MDT), but the Create MDT Task Sequence Wizard is the preferred method because the wizard prompts you for all the deployment content you need for a task sequence and provides a much more intuitive user experience. For more information, see [Create ZTI Task Sequences Using the Create MDT Task Sequence Wizard in Configuration Manager](https://technet.microsoft.com/library/dn759415.aspx#CreateZTITaskSequencesUsingtheCreateMDTTaskSequenceWizardinConfigurationManager).
|
||||||
3. Add device drivers.
|
3. Add device drivers.
|
||||||
|
|
||||||
You must add device drivers for the different device types in your district. For example, if you have a mixture of Surface, HP Stream, Dell Inspiron, and Lenovo Yoga devices, then you must have the device drivers for each device.
|
You must add device drivers for the different device types in your district. For example, if you have a mixture of Surface, HP Stream, Dell Inspiron, and Lenovo Yoga devices, then you must have the device drivers for each device.
|
||||||
|
|
||||||
Create a Microsoft Endpoint Configuration Manager driver package for each device type in your district. For more information, see [Manage drivers in Configuration Manager](https://technet.microsoft.com/library/mt627934.aspx).
|
Create a Microsoft Endpoint Manager driver package for each device type in your district. For more information, see [Manage drivers in Configuration Manager](https://technet.microsoft.com/library/mt627934.aspx).
|
||||||
4. Add Windows apps.
|
4. Add Windows apps.
|
||||||
|
|
||||||
Install the Windows apps (Windows desktop and Microsoft Store apps) that you want to deploy after the task sequence deploys your customized image (a thick, reference image that include Windows 10 and your core Windows desktop apps). These apps are in addition to the apps included in your reference image. You can only deploy Microsoft Store apps after you deploy Windows 10 because you cannot capture Microsoft Store apps in a reference image. Microsoft Store apps target users, not devices.
|
Install the Windows apps (Windows desktop and Microsoft Store apps) that you want to deploy after the task sequence deploys your customized image (a thick, reference image that include Windows 10 and your core Windows desktop apps). These apps are in addition to the apps included in your reference image. You can only deploy Microsoft Store apps after you deploy Windows 10 because you cannot capture Microsoft Store apps in a reference image. Microsoft Store apps target users, not devices.
|
||||||
@ -1301,7 +1301,7 @@ You can use Windows Deployment Services in conjunction with MDT to automatically
|
|||||||
### Configure Window Deployment Services for Microsoft Endpoint Configuration Manager
|
### Configure Window Deployment Services for Microsoft Endpoint Configuration Manager
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you have already configured your Microsoft Endpoint Configuration Manager infrastructure to support PXE boot or selected to deploy Windows 10 by using MDT only, then skip this section and continue to the next.
|
> If you have already configured your Microsoft Endpoint Manager infrastructure to support PXE boot or selected to deploy Windows 10 by using MDT only, then skip this section and continue to the next.
|
||||||
|
|
||||||
You can use Windows Deployment Services in conjunction with Configuration Manager to automatically initiate boot images on target devices. These boot images are Windows PE images that you use to boot the target devices, and then initiate Windows 10, app, and device driver deployment.
|
You can use Windows Deployment Services in conjunction with Configuration Manager to automatically initiate boot images on target devices. These boot images are Windows PE images that you use to boot the target devices, and then initiate Windows 10, app, and device driver deployment.
|
||||||
|
|
||||||
@ -1328,7 +1328,7 @@ You can use Windows Deployment Services in conjunction with Configuration Manage
|
|||||||
|
|
||||||
#### Summary
|
#### Summary
|
||||||
|
|
||||||
Your MDT deployment share and Microsoft Endpoint Configuration Manager are now ready for deployment. Windows Deployment Services is ready to initiate the LTI or ZTI deployment process. You have set up and configured Windows Deployment Services for MDT and for Configuration Manager. You have also ensured that your boot images are available to Windows Deployment Services (for LTI) or the distribution points (for ZTI and Configuration Manager). Now, you’re ready to capture the reference images for the different devices you have in your district.
|
Your MDT deployment share and Microsoft Endpoint Manager are now ready for deployment. Windows Deployment Services is ready to initiate the LTI or ZTI deployment process. You have set up and configured Windows Deployment Services for MDT and for Configuration Manager. You have also ensured that your boot images are available to Windows Deployment Services (for LTI) or the distribution points (for ZTI and Configuration Manager). Now, you’re ready to capture the reference images for the different devices you have in your district.
|
||||||
|
|
||||||
## Capture the reference image
|
## Capture the reference image
|
||||||
|
|
||||||
@ -1575,7 +1575,7 @@ For more information about Intune, see [Microsoft Intune Documentation](https://
|
|||||||
|
|
||||||
### Deploy and manage apps by using Intune
|
### Deploy and manage apps by using Intune
|
||||||
|
|
||||||
If you selected to deploy and manage apps by using Microsoft Endpoint Configuration Manager and Intune in a hybrid configuration, then skip this section and continue to the [Deploy and manage apps by using Microsoft Endpoint Configuration Manager](#deploy-and-manage-apps-by-using-microsoft-endpoint-configuration-manager) section.
|
If you selected to deploy and manage apps by using Microsoft Endpoint Manager and Intune in a hybrid configuration, then skip this section and continue to the [Deploy and manage apps by using Microsoft Endpoint Configuration Manager](#deploy-and-manage-apps-by-using-microsoft-endpoint-configuration-manager) section.
|
||||||
|
|
||||||
You can use Intune to deploy Microsoft Store and Windows desktop apps. Intune provides improved control over which users receive specific apps. In addition, Intune allows you to deploy apps to companion devices (such as Windows 10 Mobile, iOS, or Android devices). Finally, Intune helps you manage app security and features, such as mobile application management policies that let you manage apps on devices that are not enrolled in Intune or that another solution manages.
|
You can use Intune to deploy Microsoft Store and Windows desktop apps. Intune provides improved control over which users receive specific apps. In addition, Intune allows you to deploy apps to companion devices (such as Windows 10 Mobile, iOS, or Android devices). Finally, Intune helps you manage app security and features, such as mobile application management policies that let you manage apps on devices that are not enrolled in Intune or that another solution manages.
|
||||||
|
|
||||||
@ -1589,7 +1589,7 @@ For more information about how to configure Intune to manage your apps, see the
|
|||||||
|
|
||||||
### Deploy and manage apps by using Microsoft Endpoint Configuration Manager
|
### Deploy and manage apps by using Microsoft Endpoint Configuration Manager
|
||||||
|
|
||||||
You can use Microsoft Endpoint Configuration Manager to deploy Microsoft Store and Windows desktop apps. Configuration Manager allows you to create a Configuration Manager application that you can use to deploy apps to different devices (such as Windows 10 desktop, Windows 10 Mobile, iOS, or Android devices) by using *deployment types*. You can think of a Configuration Manager application as a box. You can think of deployment types as one or more sets of installation files and installation instructions within that box.
|
You can use Microsoft Endpoint Manager to deploy Microsoft Store and Windows desktop apps. Configuration Manager allows you to create a Configuration Manager application that you can use to deploy apps to different devices (such as Windows 10 desktop, Windows 10 Mobile, iOS, or Android devices) by using *deployment types*. You can think of a Configuration Manager application as a box. You can think of deployment types as one or more sets of installation files and installation instructions within that box.
|
||||||
|
|
||||||
For example, you could create a Skype application that contains a deployment type for Windows 10 desktop, Windows 10 Mobile, iOS, and Android. You can deploy the one application to multiple device types.
|
For example, you could create a Skype application that contains a deployment type for Windows 10 desktop, Windows 10 Mobile, iOS, and Android. You can deploy the one application to multiple device types.
|
||||||
|
|
||||||
@ -1627,7 +1627,7 @@ For more information about how to configure Configuration Manager to manage Wind
|
|||||||
|
|
||||||
#### Summary
|
#### Summary
|
||||||
|
|
||||||
In this section, you prepared your institution for device management. You identified the configuration settings that you want to use to manage your users and devices. You configured Group Policy or Intune to manage these configuration settings. You configured Intune or Microsoft Endpoint Configuration Manager to manage your apps. Finally, you configured Intune or Microsoft Endpoint Configuration Manager to manage software updates for Windows 10 and your apps.
|
In this section, you prepared your institution for device management. You identified the configuration settings that you want to use to manage your users and devices. You configured Group Policy or Intune to manage these configuration settings. You configured Intune or Microsoft Endpoint Manager to manage your apps. Finally, you configured Intune or Microsoft Endpoint Manager to manage software updates for Windows 10 and your apps.
|
||||||
|
|
||||||
## Deploy Windows 10 to devices
|
## Deploy Windows 10 to devices
|
||||||
|
|
||||||
|
@ -62,7 +62,7 @@ Before you get started, be sure to review these best practices and requirements:
|
|||||||
|
|
||||||
**Best practices**
|
**Best practices**
|
||||||
|
|
||||||
- **Naming convention** -- Using a naming convention makes it easier to find deployed catalog files. We'll use \*-Contoso.cat as the naming convention in this topic. For more information, see the section Inventorying catalog files by using Microsoft Endpoint Configuration Manager in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
- **Naming convention** -- Using a naming convention makes it easier to find deployed catalog files. We'll use \*-Contoso.cat as the naming convention in this topic. For more information, see the section Inventorying catalog files by using Microsoft Endpoint Manager in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
||||||
- **Where to deploy code integrity policy** -- The [code integrity policy that you created](#create-ci-policy) should be deployed to the system on which you are running Package Inspector. This will ensure that the code integrity policy binaries are trusted.
|
- **Where to deploy code integrity policy** -- The [code integrity policy that you created](#create-ci-policy) should be deployed to the system on which you are running Package Inspector. This will ensure that the code integrity policy binaries are trusted.
|
||||||
|
|
||||||
Copy the commands for each step into an elevated Windows PowerShell session. You'll use Package Inspector to find and trust all binaries in the app.
|
Copy the commands for each step into an elevated Windows PowerShell session. You'll use Package Inspector to find and trust all binaries in the app.
|
||||||
@ -117,4 +117,4 @@ Catalog signing is a vital step to adding your unsigned apps to your code integr
|
|||||||
When you use the Device Guard signing portal to sign a catalog file, the signing certificate is added to the default policy. When you download the signed catalog file, you should also download the default policy and merge this code integrity policy with your existing code integrity policies to protect machines running the catalog file. You need to do this step to trust and run your catalog files. For more information, see the Merging code integrity policies in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
When you use the Device Guard signing portal to sign a catalog file, the signing certificate is added to the default policy. When you download the signed catalog file, you should also download the default policy and merge this code integrity policy with your existing code integrity policies to protect machines running the catalog file. You need to do this step to trust and run your catalog files. For more information, see the Merging code integrity policies in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
||||||
|
|
||||||
6. Open the root certificate that you downloaded, and follow the steps in **Certificate Import wizard** to install the certificate in your machine's certificate store.
|
6. Open the root certificate that you downloaded, and follow the steps in **Certificate Import wizard** to install the certificate in your machine's certificate store.
|
||||||
7. Deploy signed catalogs to your managed devices. For more information, see Deploy catalog files with Group Policy, or Deploy catalog files with Microsoft Endpoint Configuration Manager in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
7. Deploy signed catalogs to your managed devices. For more information, see Deploy catalog files with Group Policy, or Deploy catalog files with Microsoft Endpoint Manager in the [Device Guard deployment guide](https://docs.microsoft.com/windows/device-security/device-guard/device-guard-deployment-guide).
|
||||||
|
@ -18,7 +18,7 @@ ms.date: 10/17/2017
|
|||||||
# Distribute offline apps
|
# Distribute offline apps
|
||||||
|
|
||||||
|
|
||||||
**Applies to**
|
**Applies to:**
|
||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
- Windows 10 Mobile
|
- Windows 10 Mobile
|
||||||
@ -29,7 +29,7 @@ Offline licensing is a new licensing option for Windows 10 with Microsoft Store
|
|||||||
|
|
||||||
Offline-licensed apps offer an alternative to online apps, and provide additional deployment options. Some reasons to use offline-licensed apps:
|
Offline-licensed apps offer an alternative to online apps, and provide additional deployment options. Some reasons to use offline-licensed apps:
|
||||||
|
|
||||||
- **You don't have access to Microsoft Store services** - If your employees don't have access to the internet and Microsoft Store services, downloading offline-licensed apps and deploying them with imaging is an alternative to online-licensed apps.
|
- **You don't have access to Microsoft Store services** - If your employees don't have access to the Internet and Microsoft Store services, downloading offline-licensed apps and deploying them with imaging is an alternative to online-licensed apps.
|
||||||
|
|
||||||
- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD).
|
- **You use imaging to manage devices in your organization** - Offline-licensed apps can be added to images and deployed with Deployment Image Servicing and Management (DISM), or Windows Imaging and Configuration Designer (ICD).
|
||||||
|
|
||||||
@ -45,7 +45,7 @@ You can't distribute offline-licensed apps directly from Microsoft Store. Once y
|
|||||||
|
|
||||||
- **Mobile device management provider or management server.** You can use a mobile device management (MDM) provider or management server to distribute offline apps. For more information, see these topics:
|
- **Mobile device management provider or management server.** You can use a mobile device management (MDM) provider or management server to distribute offline apps. For more information, see these topics:
|
||||||
- [Manage apps from Microsoft Store for Business with Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
|
- [Manage apps from Microsoft Store for Business with Microsoft Endpoint Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business)
|
||||||
- [Manage apps from Microsoft Store for Business with Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/manage-apps-you-purchased-from-the-windows-store-for-business-with-microsoft-intune)<br>
|
- [Manage apps from Microsoft Store for Business with Microsoft Intune](https://docs.microsoft.com/mem/intune/apps/windows-store-for-business)<br>
|
||||||
|
|
||||||
For third-party MDM providers or management servers, check your product documentation.
|
For third-party MDM providers or management servers, check your product documentation.
|
||||||
|
|
||||||
@ -61,8 +61,7 @@ There are several items to download or create for offline-licensed apps. The app
|
|||||||
|
|
||||||
- **App frameworks** - App frameworks are optional. If you already have the required framework, you don't need to download another copy. The Store for Business will select the app framework needed for the app platform and architecture that you selected.
|
- **App frameworks** - App frameworks are optional. If you already have the required framework, you don't need to download another copy. The Store for Business will select the app framework needed for the app platform and architecture that you selected.
|
||||||
|
|
||||||
<a href="" id="download-offline-licensed-app"></a>
|
<a href="" id="download-offline-licensed-app"></a>**To download an offline-licensed app**
|
||||||
**To download an offline-licensed app**
|
|
||||||
|
|
||||||
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
1. Sign in to the [Microsoft Store for Business](https://businessstore.microsoft.com/) or [Microsoft Store for Education](https://educationstore.microsoft.com).
|
||||||
2. Click **Manage**.
|
2. Click **Manage**.
|
||||||
@ -78,16 +77,3 @@ There are several items to download or create for offline-licensed apps. The app
|
|||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You need the framework to support your app package, but if you already have a copy, you don't need to download it again. Frameworks are backward compatible.
|
> You need the framework to support your app package, but if you already have a copy, you don't need to download it again. Frameworks are backward compatible.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -2,20 +2,17 @@
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Week of November 23, 2020
|
## Week of January 25, 2021
|
||||||
|
|
||||||
|
|
||||||
| Published On |Topic title | Change |
|
| Published On |Topic title | Change |
|
||||||
|------|------------|--------|
|
|------|------------|--------|
|
||||||
| 11/23/2020 | [Microsoft Store for Business and Microsoft Store for Education overview (Windows 10)](/microsoft-store/microsoft-store-for-business-overview) | modified |
|
| 1/29/2021 | [Distribute offline apps (Windows 10)](/microsoft-store/distribute-offline-apps) | modified |
|
||||||
| 11/23/2020 | [Prerequisites for Microsoft Store for Business and Education (Windows 10)](/microsoft-store/prerequisites-microsoft-store-for-business) | modified |
|
|
||||||
|
|
||||||
|
|
||||||
## Week of October 26, 2020
|
## Week of January 11, 2021
|
||||||
|
|
||||||
|
|
||||||
| Published On |Topic title | Change |
|
| Published On |Topic title | Change |
|
||||||
|------|------------|--------|
|
|------|------------|--------|
|
||||||
| 10/27/2020 | [Add unsigned app to code integrity policy (Windows 10)](/microsoft-store/add-unsigned-app-to-code-integrity-policy) | modified |
|
| 1/14/2021 | [Add unsigned app to code integrity policy (Windows 10)](/microsoft-store/add-unsigned-app-to-code-integrity-policy) | modified |
|
||||||
| 10/27/2020 | [Device Guard signing (Windows 10)](/microsoft-store/device-guard-signing-portal) | modified |
|
|
||||||
| 10/27/2020 | [Sign code integrity policy with Device Guard signing (Windows 10)](/microsoft-store/sign-code-integrity-policy-with-device-guard-signing) | modified |
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to connect to the Management Console (Windows 10)
|
title: How to connect to the Management Console (Windows 10)
|
||||||
description: In this article, learn the procedure for connecting to the App-V Management Console through your web browser.
|
description: In this article, learn the procedure for connecting to the App-V Management Console through your web browser.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: About the connection group virtual environment (Windows 10)
|
title: About the connection group virtual environment (Windows 10)
|
||||||
description: Learn how the connection group virtual environment works and how package priority is determined.
|
description: Learn how the connection group virtual environment works and how package priority is determined.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to convert a package created in a previous version of App-V (Windows 10)
|
title: How to convert a package created in a previous version of App-V (Windows 10)
|
||||||
description: Use the package converter utility to convert a virtual application package created in a previous version of App-V.
|
description: Use the package converter utility to convert a virtual application package created in a previous version of App-V.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a connection croup with user-published and globally published packages (Windows 10)
|
title: How to create a connection croup with user-published and globally published packages (Windows 10)
|
||||||
description: How to create a connection croup with user-published and globally published packages.
|
description: How to create a connection croup with user-published and globally published packages.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a connection group (Windows 10)
|
title: How to create a connection group (Windows 10)
|
||||||
description: Learn how to create a connection group with the App-V Management Console and where to find information about managing connection groups.
|
description: Learn how to create a connection group with the App-V Management Console and where to find information about managing connection groups.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a custom configuration file by using the App-V Management Console (Windows 10)
|
title: How to create a custom configuration file by using the App-V Management Console (Windows 10)
|
||||||
description: How to create a custom configuration file by using the App-V Management Console.
|
description: How to create a custom configuration file by using the App-V Management Console.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a package accelerator by using Windows PowerShell (Windows 10)
|
title: How to create a package accelerator by using Windows PowerShell (Windows 10)
|
||||||
description: Learn how to create an App-v Package Accelerator by using Windows PowerShell. App-V Package Accelerators automatically sequence large, complex applications.
|
description: Learn how to create an App-v Package Accelerator by using Windows PowerShell. App-V Package Accelerators automatically sequence large, complex applications.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a package accelerator (Windows 10)
|
title: How to create a package accelerator (Windows 10)
|
||||||
description: Learn how to create App-V Package Accelerators to automatically generate new virtual application packages.
|
description: Learn how to create App-V Package Accelerators to automatically generate new virtual application packages.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to create a virtual application package using an App-V Package Accelerator (Windows 10)
|
title: How to create a virtual application package using an App-V Package Accelerator (Windows 10)
|
||||||
description: How to create a virtual application package using an App-V Package Accelerator.
|
description: How to create a virtual application package using an App-V Package Accelerator.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Create and apply an App-V project template to a sequenced App-V package (Windows 10)
|
title: Create and apply an App-V project template to a sequenced App-V package (Windows 10)
|
||||||
description: Steps for how to create and apply an App-V project template (.appvt) to a sequenced App-V package.
|
description: Steps for how to create and apply an App-V project template (.appvt) to a sequenced App-V package.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Creating and managing App-V virtualized applications (Windows 10)
|
title: Creating and managing App-V virtualized applications (Windows 10)
|
||||||
description: Create and manage App-V virtualized applications to monitor and record the installation process for an application to be run as a virtualized application.
|
description: Create and manage App-V virtualized applications to monitor and record the installation process for an application to be run as a virtualized application.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to customize virtual application extensions for a specific AD group by using the Management Console (Windows 10)
|
title: How to customize virtual application extensions for a specific AD group by using the Management Console (Windows 10)
|
||||||
description: How to customize virtual application extensions for a specific AD group by using the Management Console.
|
description: How to customize virtual application extensions for a specific AD group by using the Management Console.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to delete a connection group (Windows 10)
|
title: How to delete a connection group (Windows 10)
|
||||||
description: Learn how to delete an existing App-V connection group in the App-V Management Console and where to find information about managing connection groups.
|
description: Learn how to delete an existing App-V connection group in the App-V Management Console and where to find information about managing connection groups.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to delete a package in the Management Console (Windows 10)
|
title: How to delete a package in the Management Console (Windows 10)
|
||||||
description: Learn how to delete a package in the App-V Management Console and where to find information about operations for App-V.
|
description: Learn how to delete a package in the App-V Management Console and where to find information about operations for App-V.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Deploy the App-V Databases by Using SQL Scripts (Windows 10)
|
title: How to Deploy the App-V Databases by Using SQL Scripts (Windows 10)
|
||||||
description: Learn how to use SQL scripts to install the App-V databases and upgrade the App-V databases to a later version.
|
description: Learn how to use SQL scripts to install the App-V databases and upgrade the App-V databases to a later version.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to deploy App-V packages using electronic software distribution (Windows 10)
|
title: How to deploy App-V packages using electronic software distribution (Windows 10)
|
||||||
description: Learn how use an electronic software distribution (ESD) system to deploy App-V virtual applications to App-V clients.
|
description: Learn how use an electronic software distribution (ESD) system to deploy App-V virtual applications to App-V clients.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Deploy the App-V Server Using a Script (Windows 10)
|
title: How to Deploy the App-V Server Using a Script (Windows 10)
|
||||||
description: 'Learn how to deploy the App-V server by using a script (appv_server_setup.exe) from the command line.'
|
description: 'Learn how to deploy the App-V server by using a script (appv_server_setup.exe) from the command line.'
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Deploy the App-V Server (Windows 10)
|
title: How to Deploy the App-V Server (Windows 10)
|
||||||
description: Use these instructions to deploy the Application Virtualization (App-V) Server in App-V for Windows 10.
|
description: Use these instructions to deploy the Application Virtualization (App-V) Server in App-V for Windows 10.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying App-V (Windows 10)
|
title: Deploying App-V (Windows 10)
|
||||||
description: App-V supports several different deployment options. Learn how to complete App-V deployment at different stages in your App-V deployment.
|
description: App-V supports several different deployment options. Learn how to complete App-V deployment at different stages in your App-V deployment.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying Microsoft Office 2010 by Using App-V (Windows 10)
|
title: Deploying Microsoft Office 2010 by Using App-V (Windows 10)
|
||||||
description: Create Office 2010 packages for Microsoft Application Virtualization (App-V) using the App-V Sequencer or the App-V Package Accelerator.
|
description: Create Office 2010 packages for Microsoft Application Virtualization (App-V) using the App-V Sequencer or the App-V Package Accelerator.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying Microsoft Office 2013 by Using App-V (Windows 10)
|
title: Deploying Microsoft Office 2013 by Using App-V (Windows 10)
|
||||||
description: Use Application Virtualization (App-V) to deliver Microsoft Office 2013 as a virtualized application to computers in your organization.
|
description: Use Application Virtualization (App-V) to deliver Microsoft Office 2013 as a virtualized application to computers in your organization.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying Microsoft Office 2016 by using App-V (Windows 10)
|
title: Deploying Microsoft Office 2016 by using App-V (Windows 10)
|
||||||
description: Use Application Virtualization (App-V) to deliver Microsoft Office 2016 as a virtualized application to computers in your organization.
|
description: Use Application Virtualization (App-V) to deliver Microsoft Office 2016 as a virtualized application to computers in your organization.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying App-V packages by using electronic software distribution (ESD)
|
title: Deploying App-V packages by using electronic software distribution (ESD)
|
||||||
description: Deploying App-V packages by using electronic software distribution (ESD)
|
description: Deploying App-V packages by using electronic software distribution (ESD)
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying the App-V Sequencer and configuring the client (Windows 10)
|
title: Deploying the App-V Sequencer and configuring the client (Windows 10)
|
||||||
description: Learn how to deploy the App-V Sequencer and configure the client by using the ADMX template and Group Policy.
|
description: Learn how to deploy the App-V Sequencer and configure the client by using the ADMX template and Group Policy.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Deploying the App-V Server (Windows 10)
|
title: Deploying the App-V Server (Windows 10)
|
||||||
description: Learn how to deploy the Application Virtualization (App-V) Server in App-V for Windows 10 by using different deployment configurations described in this article.
|
description: Learn how to deploy the Application Virtualization (App-V) Server in App-V for Windows 10 by using different deployment configurations described in this article.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: App-V Deployment Checklist (Windows 10)
|
title: App-V Deployment Checklist (Windows 10)
|
||||||
description: Use the App-V deployment checklist to understand the recommended steps and items to consider when deploying App-V features.
|
description: Use the App-V deployment checklist to understand the recommended steps and items to consider when deploying App-V features.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: About App-V Dynamic Configuration (Windows 10)
|
title: About App-V Dynamic Configuration (Windows 10)
|
||||||
description: Learn how to create or edit an existing Application Virtualization (App-V) dynamic configuration file.
|
description: Learn how to create or edit an existing Application Virtualization (App-V) dynamic configuration file.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Enable Only Administrators to Publish Packages by Using an ESD (Windows 10)
|
title: How to Enable Only Administrators to Publish Packages by Using an ESD (Windows 10)
|
||||||
description: Learn how to enable only administrators to publish packages by bsing an electronic software delivery (ESD).
|
description: Learn how to enable only administrators to publish packages by bsing an electronic software delivery (ESD).
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Enable Reporting on the App-V Client by Using Windows PowerShell (Windows 10)
|
title: How to Enable Reporting on the App-V Client by Using Windows PowerShell (Windows 10)
|
||||||
description: How to Enable Reporting on the App-V Client by Using Windows PowerShell
|
description: How to Enable Reporting on the App-V Client by Using Windows PowerShell
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Enable the App-V in-box client (Windows 10)
|
title: Enable the App-V in-box client (Windows 10)
|
||||||
description: Learn how to enable the Microsoft Application Virtualization (App-V) in-box client installed with Windows 10.
|
description: Learn how to enable the Microsoft Application Virtualization (App-V) in-box client installed with Windows 10.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Evaluating App-V (Windows 10)
|
title: Evaluating App-V (Windows 10)
|
||||||
description: Learn how to evaluate App-V for Windows 10 in a lab environment before deploying into a production environment.
|
description: Learn how to evaluate App-V for Windows 10 in a lab environment before deploying into a production environment.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Application Virtualization (App-V) (Windows 10)
|
title: Application Virtualization (App-V) (Windows 10)
|
||||||
description: See various topics that can help you administer Application Virtualization (App-V) and its components.
|
description: See various topics that can help you administer Application Virtualization (App-V) and its components.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Getting Started with App-V (Windows 10)
|
title: Getting Started with App-V (Windows 10)
|
||||||
description: Get started with Microsoft Application Virtualization (App-V) for Windows 10. App-V for Windows 10 delivers Win32 applications to users as virtual applications.
|
description: Get started with Microsoft Application Virtualization (App-V) for Windows 10. App-V for Windows 10 delivers Win32 applications to users as virtual applications.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: High-level architecture for App-V (Windows 10)
|
title: High-level architecture for App-V (Windows 10)
|
||||||
description: Use the information in this article to simplify your Microsoft Application Virtualization (App-V) deployment.
|
description: Use the information in this article to simplify your Microsoft Application Virtualization (App-V) deployment.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell (Windows 10)
|
title: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell (Windows 10)
|
||||||
description: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell
|
description: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Install the Management and Reporting Databases on separate computers from the Management and Reporting Services (Windows 10)
|
title: How to Install the Management and Reporting Databases on separate computers from the Management and Reporting Services (Windows 10)
|
||||||
description: How to install the Management and Reporting Databases on separate computers from the Management and Reporting Services.
|
description: How to install the Management and Reporting Databases on separate computers from the Management and Reporting Services.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to install the Management Server on a Standalone Computer and Connect it to the Database (Windows 10)
|
title: How to install the Management Server on a Standalone Computer and Connect it to the Database (Windows 10)
|
||||||
description: How to install the Management Server on a Standalone Computer and Connect it to the Database
|
description: How to install the Management Server on a Standalone Computer and Connect it to the Database
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Install the Publishing Server on a Remote Computer (Windows 10)
|
title: Install the Publishing Server on a Remote Computer (Windows 10)
|
||||||
description: Use the procedures in this article to install the Microsoft Application Virtualization (App-V) publishing server on a separate computer.
|
description: Use the procedures in this article to install the Microsoft Application Virtualization (App-V) publishing server on a separate computer.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to install the Reporting Server on a standalone computer and connect it to the database (Windows 10)
|
title: How to install the Reporting Server on a standalone computer and connect it to the database (Windows 10)
|
||||||
description: How to install the App-V Reporting Server on a Standalone Computer and Connect it to the Database
|
description: How to install the App-V Reporting Server on a Standalone Computer and Connect it to the Database
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Install the App-V Sequencer (Windows 10)
|
title: Install the App-V Sequencer (Windows 10)
|
||||||
description: Learn how to install the App-V Sequencer to convert Win32 applications into virtual packages for deployment to user devices.
|
description: Learn how to install the App-V Sequencer to convert Win32 applications into virtual packages for deployment to user devices.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help (Windows 10)
|
title: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help (Windows 10)
|
||||||
description: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help
|
description: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Maintaining App-V (Windows 10)
|
title: Maintaining App-V (Windows 10)
|
||||||
description: After you have deployed App-V for Windows 10, you can use the following information to maintain the App-V infrastructure.
|
description: After you have deployed App-V for Windows 10, you can use the following information to maintain the App-V infrastructure.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to manage App-V packages running on a stand-alone computer by using Windows PowerShell (Windows 10)
|
title: How to manage App-V packages running on a stand-alone computer by using Windows PowerShell (Windows 10)
|
||||||
description: How to manage App-V packages running on a stand-alone computer by using Windows PowerShell.
|
description: How to manage App-V packages running on a stand-alone computer by using Windows PowerShell.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell (Windows 10)
|
title: How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell (Windows 10)
|
||||||
description: How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell
|
description: How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Managing Connection Groups (Windows 10)
|
title: Managing Connection Groups (Windows 10)
|
||||||
description: Connection groups can allow administrators to manage packages independently and avoid having to add the same application multiple times to a client computer.
|
description: Connection groups can allow administrators to manage packages independently and avoid having to add the same application multiple times to a client computer.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Migrating to App-V from a Previous Version (Windows 10)
|
title: Migrating to App-V from a Previous Version (Windows 10)
|
||||||
description: Learn how to migrate to Microsoft Application Virtualization (App-V) for Windows 10 from a previous version.
|
description: Learn how to migrate to Microsoft Application Virtualization (App-V) for Windows 10 from a previous version.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Modify an Existing Virtual Application Package (Windows 10)
|
title: How to Modify an Existing Virtual Application Package (Windows 10)
|
||||||
description: Learn how to modify an existing virtual application package and add a new application to an existing virtual application package.
|
description: Learn how to modify an existing virtual application package and add a new application to an existing virtual application package.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Modify Client Configuration by Using Windows PowerShell (Windows 10)
|
title: How to Modify Client Configuration by Using Windows PowerShell (Windows 10)
|
||||||
description: Learn how to modify the Application Virtualization (App-V) client configuration by using Windows PowerShell.
|
description: Learn how to modify the Application Virtualization (App-V) client configuration by using Windows PowerShell.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: How to Move the App-V Server to Another Computer (Windows 10)
|
title: How to Move the App-V Server to Another Computer (Windows 10)
|
||||||
description: Learn how to create a new management server console in your environment and learn how to connect it to the App-V database.
|
description: Learn how to create a new management server console in your environment and learn how to connect it to the App-V database.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Operations for App-V (Windows 10)
|
title: Operations for App-V (Windows 10)
|
||||||
description: Learn about the various types of App-V administration and operating tasks that are typically performed by an administrator.
|
description: Learn about the various types of App-V administration and operating tasks that are typically performed by an administrator.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Performance Guidance for Application Virtualization (Windows 10)
|
title: Performance Guidance for Application Virtualization (Windows 10)
|
||||||
description: Learn how to configure App-V for optimal performance, optimize virtual app packages, and provide a better user experience with RDS and VDI.
|
description: Learn how to configure App-V for optimal performance, optimize virtual app packages, and provide a better user experience with RDS and VDI.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: App-V Planning Checklist (Windows 10)
|
title: App-V Planning Checklist (Windows 10)
|
||||||
description: Learn about the recommended steps and items to consider when planning an Application Virtualization (App-V) deployment.
|
description: Learn about the recommended steps and items to consider when planning an Application Virtualization (App-V) deployment.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning to Use Folder Redirection with App-V (Windows 10)
|
title: Planning to Use Folder Redirection with App-V (Windows 10)
|
||||||
description: Learn about folder redirection with App-V. Folder redirection enables users and administrators to redirect the path of a folder to a new location.
|
description: Learn about folder redirection with App-V. Folder redirection enables users and administrators to redirect the path of a folder to a new location.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning for the App-V Server Deployment (Windows 10)
|
title: Planning for the App-V Server Deployment (Windows 10)
|
||||||
description: Learn what you need to know so you can plan for the Microsoft Application Virtualization (App-V) 5.1 server deployment.
|
description: Learn what you need to know so you can plan for the Microsoft Application Virtualization (App-V) 5.1 server deployment.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning for App-V (Windows 10)
|
title: Planning for App-V (Windows 10)
|
||||||
description: Use the information in this article to plan to deploy App-V without disrupting your existing network or user experience.
|
description: Use the information in this article to plan to deploy App-V without disrupting your existing network or user experience.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning for High Availability with App-V Server
|
title: Planning for High Availability with App-V Server
|
||||||
description: Learn what you need to know so you can plan for high availability with Application Virtualization (App-V) server.
|
description: Learn what you need to know so you can plan for high availability with Application Virtualization (App-V) server.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning for the App-V Sequencer and Client Deployment (Windows 10)
|
title: Planning for the App-V Sequencer and Client Deployment (Windows 10)
|
||||||
description: Learn what you need to do to plan for the App-V Sequencer and Client deployment, and where to find additional information about the deployment process.
|
description: Learn what you need to do to plan for the App-V Sequencer and Client deployment, and where to find additional information about the deployment process.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning for Deploying App-V with Office (Windows 10)
|
title: Planning for Deploying App-V with Office (Windows 10)
|
||||||
description: Use the information in this article to plan how to deploy Office within Microsoft Application Virtualization (App-V).
|
description: Use the information in this article to plan how to deploy Office within Microsoft Application Virtualization (App-V).
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning to Deploy App-V with an Electronic Software Distribution System (Windows 10)
|
title: Planning to Deploy App-V with an Electronic Software Distribution System (Windows 10)
|
||||||
description: Planning to Deploy App-V with an Electronic Software Distribution System
|
description: Planning to Deploy App-V with an Electronic Software Distribution System
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Planning to Deploy App-V (Windows 10)
|
title: Planning to Deploy App-V (Windows 10)
|
||||||
description: Learn about the different deployment configurations and requirements to consider before you deploy App-V for Windows 10.
|
description: Learn about the different deployment configurations and requirements to consider before you deploy App-V for Windows 10.
|
||||||
author: lomayor
|
author: dansimp
|
||||||
ms.pagetype: mdop, appcompat, virtualization
|
ms.pagetype: mdop, appcompat, virtualization
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
|
@ -44,7 +44,7 @@ Each method accomplishes essentially the same task, but some methods may be bett
|
|||||||
|
|
||||||
To add a locally installed application to a package or to a connection group’s virtual environment, you add a subkey to the `RunVirtual` registry key in the Registry Editor, as described in the following sections.
|
To add a locally installed application to a package or to a connection group’s virtual environment, you add a subkey to the `RunVirtual` registry key in the Registry Editor, as described in the following sections.
|
||||||
|
|
||||||
There is no Group Policy setting available to manage this registry key, so you have to use Microsoft Endpoint Configuration Manager or another electronic software distribution (ESD) system, or manually edit the registry.
|
There is no Group Policy setting available to manage this registry key, so you have to use Microsoft Endpoint Manager or another electronic software distribution (ESD) system, or manually edit the registry.
|
||||||
|
|
||||||
Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages globally or to the user.
|
Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages globally or to the user.
|
||||||
|
|
||||||
|
@ -22,14 +22,15 @@ ms.topic: article
|
|||||||
|
|
||||||
- Windows 10
|
- Windows 10
|
||||||
|
|
||||||
From its release, Windows 10 has supported remote connections to PCs joined to Active Directory. Starting in Windows 10, version 1607, you can also connect to a remote PC that is [joined to Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/user-help/device-management-azuread-joined-devices-setup). Starting in Windows 10, version 1809, you can [use biometrics to authenticate to a remote desktop session](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809#remote-desktop-with-biometrics).
|
From its release, Windows 10 has supported remote connections to PCs joined to Active Directory. Starting in Windows 10, version 1607, you can also connect to a remote PC that is [joined to Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/devices/concept-azure-ad-join). Starting in Windows 10, version 1809, you can [use biometrics to authenticate to a remote desktop session](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809#remote-desktop-with-biometrics).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
## Set up
|
## Set up
|
||||||
|
|
||||||
- Both PCs (local and remote) must be running Windows 10, version 1607 or later. Remote connections to an Azure AD-joined PC running earlier versions of Windows 10 are not supported.
|
- Both PCs (local and remote) must be running Windows 10, version 1607 or later. Remote connections to an Azure AD-joined PC running earlier versions of Windows 10 are not supported.
|
||||||
- Your local PC (where you are connecting from) must be either Azure AD joined or Hybrid Azure AD joined if using Windows 10 version 1607 and above, or Azure AD registered if using Windows 10 version 2004 and above. Remote connections to an Azure AD joined PC from an unjoined device or a non-Windows 10 device are not supported.
|
- Your local PC (where you are connecting from) must be either Azure AD-joined or Hybrid Azure AD-joined if using Windows 10, version 1607 and above, or [Azure AD registered](https://docs.microsoft.com/azure/active-directory/devices/concept-azure-ad-register) if using Windows 10, version 2004 and above. Remote connections to an Azure AD-joined PC from an unjoined device or a non-Windows 10 device are not supported.
|
||||||
|
- The local PC and remote PC must be in the same Azure AD tenant. Azure AD B2B guests are not supported for Remote desktop.
|
||||||
|
|
||||||
Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC you are using to connect to the remote PC.
|
Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC you are using to connect to the remote PC.
|
||||||
|
|
||||||
@ -41,57 +42,45 @@ Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-gu
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users or groups to connect to the PC, you must allow remote connections for the specified users or groups. Click **Select Users -> Add** and enter the name of the user or group.
|
3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users or groups to connect to the PC, you must allow remote connections for the specified users or groups. Users can be added either manually or through MDM policies:
|
||||||
|
|
||||||
|
- Adding users manually
|
||||||
|
|
||||||
|
You can specify individual Azure AD accounts for remote connections by running the following PowerShell cmdlet:
|
||||||
|
```powershell
|
||||||
|
net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"
|
||||||
|
```
|
||||||
|
where *the-UPN-attribute-of-your-user* is the name of the user profile in C:\Users\, which is created based on the DisplayName attribute in Azure AD.
|
||||||
|
|
||||||
|
This command only works for AADJ device users already added to any of the local groups (administrators).
|
||||||
|
Otherwise this command throws the below error. For example:
|
||||||
|
- for cloud only user: "There is no such global user or group : *name*"
|
||||||
|
- for synced user: "There is no such global user or group : *name*" </br>
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once, and then running the following PowerShell cmdlet:
|
> For devices running Windows 10, version 1703 or earlier, the user must sign in to the remote device first before attempting remote connections.
|
||||||
> ```powershell
|
|
||||||
> net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"
|
|
||||||
> ```
|
|
||||||
> where *the-UPN-attribute-of-your-user* is the name of the user profile in C:\Users\, which is created based on the DisplayName attribute in Azure AD.
|
|
||||||
>
|
>
|
||||||
> This command only works for AADJ device users already added to any of the local groups (administrators).
|
> Starting in Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices.
|
||||||
> Otherwise this command throws the below error. For example:
|
|
||||||
> - for cloud only user: "There is no such global user or group : *name*"
|
|
||||||
> - for synced user: "There is no such global user or group : *name*" </br>
|
|
||||||
|
|
||||||
> [!NOTE]
|
- Adding users using policy
|
||||||
> In Windows 10, version 1709, the user does not have to sign in to the remote device first.
|
|
||||||
>
|
|
||||||
> In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices.
|
|
||||||
|
|
||||||
4. Click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC.
|
Starting in Windows 10, version 2004, you can add users or Azure AD groups to the Remote Desktop Users using MDM policies as described in [How to manage the local administrators group on Azure AD joined devices](https://docs.microsoft.com/azure/active-directory/devices/assign-local-admin#manage-administrator-privileges-using-azure-ad-groups-preview).
|
||||||
|
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
> When you connect to the remote PC, enter your account name in this format: AzureAD\yourloginid@domain.com. The local PC must either be domain-joined or Azure AD-joined. The local PC and remote PC must be in the same Azure AD tenant.
|
> When you connect to the remote PC, enter your account name in this format: AzureAD\yourloginid@domain.com.
|
||||||
|
|
||||||
> [!Note]
|
> [!NOTE]
|
||||||
> If you cannot connect using Remote Desktop Connection 6.0, you must turn off the new features of RDP 6.0 and revert back to RDP 5.0 by making a few changes in the RDP file. See the details in the [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e).
|
> If you cannot connect using Remote Desktop Connection 6.0, you must turn off the new features of RDP 6.0 and revert back to RDP 5.0 by making a few changes in the RDP file. See the details in this [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e).
|
||||||
|
|
||||||
## Supported configurations
|
## Supported configurations
|
||||||
|
|
||||||
In organizations using integrated Active Directory and Azure AD, you can connect from a Hybrid-joined PC to an Azure AD-joined PC by using any of the following:
|
The table below lists the supported configurations for remotely connecting to an Azure AD-joined PC:
|
||||||
|
|
||||||
- Password
|
| Criteria | RDP from Azure AD registered device| RDP from Azure AD joined device| RDP from hybrid Azure AD joined device |
|
||||||
- Smartcards
|
| - | - | - | - |
|
||||||
- Windows Hello for Business, if the domain is managed by Microsoft Endpoint Configuration Manager.
|
| **Client operating systems**| Windows 10, version 2004 and above| Windows 10, version 1607 and above | Windows 10, version 1607 and above |
|
||||||
|
| **Supported credentials**| Password, smartcard| Password, smartcard, Windows Hello for Business certificate trust | Password, smartcard, Windows Hello for Business certificate trust |
|
||||||
|
|
||||||
In organizations using integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to an AD-joined PC when the Azure AD-joined PC is on the corporate network by using any of the following:
|
|
||||||
|
|
||||||
- Password
|
|
||||||
- Smartcards
|
|
||||||
- Windows Hello for Business, if the organization has a mobile device management (MDM) subscription.
|
|
||||||
|
|
||||||
In organizations using integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC by using any of the following:
|
|
||||||
|
|
||||||
- Password
|
|
||||||
- Smartcards
|
|
||||||
- Windows Hello for Business, with or without an MDM subscription.
|
|
||||||
|
|
||||||
In organizations using only Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC by using any of the following:
|
|
||||||
|
|
||||||
- Password
|
|
||||||
- Windows Hello for Business, with or without an MDM subscription.
|
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If the RDP client is running Windows Server 2016 or Windows Server 2019, to be able to connect to Azure Active Directory-joined PCs, it must [allow Public Key Cryptography Based User-to-User (PKU2U) authentication requests to use online identities](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities).
|
> If the RDP client is running Windows Server 2016 or Windows Server 2019, to be able to connect to Azure Active Directory-joined PCs, it must [allow Public Key Cryptography Based User-to-User (PKU2U) authentication requests to use online identities](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities).
|
||||||
|
@ -231,6 +231,7 @@
|
|||||||
#### [ADMX_OfflineFiles](policy-csp-admx-offlinefiles.md)
|
#### [ADMX_OfflineFiles](policy-csp-admx-offlinefiles.md)
|
||||||
#### [ADMX_PeerToPeerCaching](policy-csp-admx-peertopeercaching.md)
|
#### [ADMX_PeerToPeerCaching](policy-csp-admx-peertopeercaching.md)
|
||||||
#### [ADMX_PerformanceDiagnostics](policy-csp-admx-performancediagnostics.md)
|
#### [ADMX_PerformanceDiagnostics](policy-csp-admx-performancediagnostics.md)
|
||||||
|
#### [ADMX_Power](policy-csp-admx-power.md)
|
||||||
#### [ADMX_PowerShellExecutionPolicy](policy-csp-admx-powershellexecutionpolicy.md)
|
#### [ADMX_PowerShellExecutionPolicy](policy-csp-admx-powershellexecutionpolicy.md)
|
||||||
#### [ADMX_Printing](policy-csp-admx-printing.md)
|
#### [ADMX_Printing](policy-csp-admx-printing.md)
|
||||||
#### [ADMX_Printing2](policy-csp-admx-printing2.md)
|
#### [ADMX_Printing2](policy-csp-admx-printing2.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Deploy and configure App-V apps using MDM
|
title: Deploy and configure App-V apps using MDM
|
||||||
description: Configure, deploy, and manage Microsoft Application Virtualization (App-V) apps using Microsoft Endpoint Configuration Manager or App-V server.
|
description: Configure, deploy, and manage Microsoft Application Virtualization (App-V) apps using Microsoft Endpoint Manager or App-V server.
|
||||||
ms.author: dansimp
|
ms.author: dansimp
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -15,7 +15,7 @@ manager: dansimp
|
|||||||
|
|
||||||
## Executive summary
|
## Executive summary
|
||||||
|
|
||||||
<p>Microsoft Application Virtualization (App-V) apps have typically been configured, deployed, and managed through on-premises group policies using Microsoft Endpoint Configuration Manager or App-V server. In Windows 10, version 1703, App-V apps can be configured, deployed, and managed using mobile device management (MDM), matching their on-premises counterparts.</p>
|
<p>Microsoft Application Virtualization (App-V) apps have typically been configured, deployed, and managed through on-premises group policies using Microsoft Endpoint Manager or App-V server. In Windows 10, version 1703, App-V apps can be configured, deployed, and managed using mobile device management (MDM), matching their on-premises counterparts.</p>
|
||||||
|
|
||||||
<p>MDM services can be used to publish App-V packages to clients running Windows 10, version 1703 (or later). All capabilities such as App-V enablement, configuration, and publishing can be completed using the EnterpriseAppVManagement CSP.</p>
|
<p>MDM services can be used to publish App-V packages to clients running Windows 10, version 1703 (or later). All capabilities such as App-V enablement, configuration, and publishing can be completed using the EnterpriseAppVManagement CSP.</p>
|
||||||
|
|
||||||
|
@ -300,6 +300,10 @@ If you disable or do not configure this setting, users can configure only basic
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption setup wizard.
|
> If you want to require the use of a startup PIN and a USB flash drive, you must configure BitLocker settings using the command-line tool manage-bde instead of the BitLocker Drive Encryption setup wizard.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Devices that pass Hardware Security Testability Specification (HSTI) validation or Modern
|
||||||
|
> Standby devices will not be able to configure a Startup PIN using this CSP. Users are required to manually configure the PIN.
|
||||||
|
|
||||||
Sample value for this node to enable this policy is:
|
Sample value for this node to enable this policy is:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
|
@ -35,7 +35,7 @@ On the desktop and mobile devices, you can use an enrollment certificate or enro
|
|||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> - Bulk-join is not supported in Azure Active Directory Join.
|
> - Bulk-join is not supported in Azure Active Directory Join.
|
||||||
> - Bulk enrollment does not work in Intune standalone environment.
|
> - Bulk enrollment does not work in Intune standalone environment.
|
||||||
> - Bulk enrollment works in Microsoft Endpoint Configuration Manager where the ppkg is generated from the Configuration Manager console.
|
> - Bulk enrollment works in Microsoft Endpoint Manager where the ppkg is generated from the Configuration Manager console.
|
||||||
> - To change bulk enrollment settings, login to **AAD**, then **Devices**, and then click **Device Settings**. Change the number under **Maximum number of devices per user**.
|
> - To change bulk enrollment settings, login to **AAD**, then **Devices**, and then click **Device Settings**. Change the number under **Maximum number of devices per user**.
|
||||||
|
|
||||||
## What you need
|
## What you need
|
||||||
|
@ -390,6 +390,26 @@ Intune tamper protection setting UX supports three states:
|
|||||||
|
|
||||||
When enabled or disabled exists on the client and admin moves the setting to not configured, it will not have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.
|
When enabled or disabled exists on the client and admin moves the setting to not configured, it will not have any impact on the device state. To change the state to either enabled or disabled would require to be set explicitly.
|
||||||
|
|
||||||
|
<a href="" id="configuration-disablelocaladminmerge"></a>**Configuration/DisableLocalAdminMerge**<br>
|
||||||
|
This policy setting controls whether or not complex list settings configured by a local administrator are merged with managed settings. This setting applies to lists such as threats and exclusions.
|
||||||
|
|
||||||
|
If you disable or do not configure this setting, unique items defined in preference settings configured by the local administrator will be merged into the resulting effective policy. In the case of conflicts, management settings will override preference settings.
|
||||||
|
|
||||||
|
If you enable this setting, only items defined by management will be used in the resulting effective policy. Managed settings will override preference settings configured by the local administrator.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> Applying this setting will not remove exclusions from the device registry, it will only prevent them from being applied/used. This is reflected in **Get-MpPreference**.
|
||||||
|
|
||||||
|
Supported OS versions: Windows 10
|
||||||
|
|
||||||
|
The data type is integer.
|
||||||
|
|
||||||
|
Supported operations are Add, Delete, Get, Replace.
|
||||||
|
|
||||||
|
Valid values are:
|
||||||
|
- 1 – Enable.
|
||||||
|
- 0 (default) – Disable.
|
||||||
|
|
||||||
<a href="" id="configuration-enablefilehashcomputation"></a>**Configuration/EnableFileHashComputation**
|
<a href="" id="configuration-enablefilehashcomputation"></a>**Configuration/EnableFileHashComputation**
|
||||||
Enables or disables file hash computation feature.
|
Enables or disables file hash computation feature.
|
||||||
When this feature is enabled Windows defender will compute hashes for files it scans.
|
When this feature is enabled Windows defender will compute hashes for files it scans.
|
||||||
|
@ -199,8 +199,111 @@ A Get to the above URI will return the results of the data gathering for the las
|
|||||||
|
|
||||||
Each data gathering node is annotated with the HRESULT of the action and the collection is also annotated with an overall HRESULT. In this example, note that the mdmdiagnosticstool.exe command failed.
|
Each data gathering node is annotated with the HRESULT of the action and the collection is also annotated with an overall HRESULT. In this example, note that the mdmdiagnosticstool.exe command failed.
|
||||||
|
|
||||||
The zip file which is created also contains a results.xml file whose contents align to the Data section in the SyncML for ArchiveResults. Accordingly, an IT admin using the zip file for troubleshooting can determine the order and success of each directive without needing a permanent record of the SyncML value for DiagnosticArchive/ArchiveResults.
|
### Making use of the uploaded data
|
||||||
|
The zip archive which is created and uploaded by the CSP contains a folder structure like the following:
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
PS C:\> dir C:\DiagArchiveExamples\DiagLogs-MYDEVICE-20201202T182748Z
|
||||||
|
|
||||||
|
Directory: C:\DiagArchiveExamples\DiagLogs-MYDEVICE-20201202T182748Z
|
||||||
|
|
||||||
|
Mode LastWriteTime Length Name
|
||||||
|
---- ------------- ------ ----
|
||||||
|
la--- 1/4/2021 2:45 PM 1
|
||||||
|
la--- 1/4/2021 2:45 PM 2
|
||||||
|
la--- 12/2/2020 6:27 PM 2701 results.xml
|
||||||
|
```
|
||||||
|
Each data gathering directive from the original `Collection` XML corresponds to a folder in the output. For example, if the first directive was <RegistryKey HRESULT="0">HKLM\Software\Policies</RegistryKey> then folder `1` will contain the corresponding `export.reg` file.
|
||||||
|
|
||||||
|
The `results.xml` file is the authoritative map to the output. It includes a status code for each directive. The order of the directives in the file corresponds to the order of the output folders. Using `results.xml` the administrator can see what data was gathered, what failures may have occurred, and which folders contain which output. For example, the following `results.xml` content indicates that registry export of HKLM\Software\Policies was successful and the data can be found in folder `1`. It also indicates that `netsh.exe wlan show profiles` command failed.
|
||||||
|
|
||||||
|
```xml
|
||||||
|
<Collection HRESULT="0">
|
||||||
|
<ID>268b3056-8c15-47c6-a1bd-4bc257aef7b2</ID>
|
||||||
|
<RegistryKey HRESULT="0">HKLM\Software\Policies</RegistryKey>
|
||||||
|
<Command HRESULT="-2147024895">%windir%\system32\netsh.exe wlan show profiles</Command>
|
||||||
|
</Collection>
|
||||||
|
```
|
||||||
|
|
||||||
|
Administrators can apply automation to 'results.xml' to create their own preferred views of the data. For example, the following PowerShell one-liner extracts from the XML an ordered list of the directives with status code and details.
|
||||||
|
```powershell
|
||||||
|
Select-XML -Path results.xml -XPath '//RegistryKey | //Command | //Events | //FoldersFiles' | Foreach-Object -Begin {$i=1} -Process { [pscustomobject]@{DirectiveNumber=$i; DirectiveHRESULT=$_.Node.HRESULT; DirectiveInput=$_.Node.('#text')} ; $i++}
|
||||||
|
```
|
||||||
|
This example produces output similar to the following:
|
||||||
|
```
|
||||||
|
DirectiveNumber DirectiveHRESULT DirectiveInput
|
||||||
|
--------------- ---------------- --------------
|
||||||
|
1 0 HKLM\Software\Policies
|
||||||
|
2 0 HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall
|
||||||
|
3 0 HKLM\Software\Microsoft\IntuneManagementExtension
|
||||||
|
4 0 HKLM\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall
|
||||||
|
5 0 %windir%\system32\ipconfig.exe /all
|
||||||
|
6 0 %windir%\system32\netsh.exe advfirewall show allprofiles
|
||||||
|
7 0 %windir%\system32\netsh.exe advfirewall show global
|
||||||
|
8 -2147024895 %windir%\system32\netsh.exe wlan show profiles
|
||||||
|
```
|
||||||
|
|
||||||
|
The next example extracts the zip archive into a customized flattened file structure. Each file name includes the directive number, HRESULT, and so on. This example could be customized to make different choices about what information to include in the file names and what formatting choices to make for special characters.
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
param( $DiagnosticArchiveZipPath = "C:\DiagArchiveExamples\DiagLogs-MYDEVICE-20201202T182748Z.zip" )
|
||||||
|
|
||||||
|
#region Formatting Choices
|
||||||
|
$flatFileNameTemplate = '({0:D2}) ({3}) (0x{2:X8})'
|
||||||
|
$maxLengthForInputTextPassedToOutput = 80
|
||||||
|
#endregion
|
||||||
|
|
||||||
|
#region Create Output Folders and Expand Zip
|
||||||
|
$diagnosticArchiveTempUnzippedPath = $DiagnosticArchiveZipPath + "_expanded"
|
||||||
|
if(-not (Test-Path $diagnosticArchiveTempUnzippedPath)){mkdir $diagnosticArchiveTempUnzippedPath}
|
||||||
|
$reformattedArchivePath = $DiagnosticArchiveZipPath + "_formatted"
|
||||||
|
if(-not (Test-Path $reformattedArchivePath)){mkdir $reformattedArchivePath}
|
||||||
|
Expand-Archive -Path $DiagnosticArchiveZipPath -DestinationPath $diagnosticArchiveTempUnzippedPath
|
||||||
|
#endregion
|
||||||
|
|
||||||
|
#region Discover and Move/rename Files
|
||||||
|
$resultElements = ([xml](Get-Content -Path (Join-Path -Path $diagnosticArchiveTempUnzippedPath -ChildPath "results.xml"))).Collection.ChildNodes | Foreach-Object{ $_ }
|
||||||
|
$n = 0
|
||||||
|
foreach( $element in $resultElements )
|
||||||
|
{
|
||||||
|
$directiveNumber = $n
|
||||||
|
$n++
|
||||||
|
if($element.Name -eq 'ID'){ continue }
|
||||||
|
$directiveType = $element.Name
|
||||||
|
$directiveStatus = [int]$element.Attributes.ItemOf('HRESULT').psbase.Value
|
||||||
|
$directiveUserInputRaw = $element.InnerText
|
||||||
|
$directiveUserInputFileNameCompatible = $directiveUserInputRaw -replace '[\\|/\[\]<>\:"\?\*%\.\s]','_'
|
||||||
|
$directiveUserInputTrimmed = $directiveUserInputFileNameCompatible.substring(0, [System.Math]::Min($maxLengthForInputTextPassedToOutput, $directiveUserInputFileNameCompatible.Length))
|
||||||
|
$directiveSummaryString = $flatFileNameTemplate -f $directiveNumber,$directiveType,$directiveStatus,$directiveUserInputTrimmed
|
||||||
|
$directiveOutputFolder = Join-Path -Path $diagnosticArchiveTempUnzippedPath -ChildPath $directiveNumber
|
||||||
|
$directiveOutputFiles = Get-ChildItem -Path $directiveOutputFolder -File
|
||||||
|
foreach( $file in $directiveOutputFiles)
|
||||||
|
{
|
||||||
|
$leafSummaryString = $directiveSummaryString,$file.Name -join ' '
|
||||||
|
Copy-Item $file.FullName -Destination (Join-Path -Path $reformattedArchivePath -ChildPath $leafSummaryString)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endregion
|
||||||
|
Remove-Item -Path $diagnosticArchiveTempUnzippedPath -Force -Recurse
|
||||||
|
```
|
||||||
|
That example script produces a set of files similar to the following, which can be a useful view for an administrator interactively browsing the results without needing to navigate any sub-folders or refer to `results.xml` repeatedly:
|
||||||
|
|
||||||
|
```powershell
|
||||||
|
PS C:\> dir C:\DiagArchiveExamples\DiagLogs-MYDEVICE-20201202T182748Z.zip_formatted | format-table Length,Name
|
||||||
|
|
||||||
|
Length Name
|
||||||
|
------ ----
|
||||||
|
46640 (01) (HKLM_Software_Policies) (0x00000000) export.reg
|
||||||
|
203792 (02) (HKLM_Software_Microsoft_Windows_CurrentVersion_Uninstall) (0x00000000) export.reg
|
||||||
|
214902 (03) (HKLM_Software_Microsoft_IntuneManagementExtension) (0x00000000) export.reg
|
||||||
|
212278 (04) (HKLM_SOFTWARE_WOW6432Node_Microsoft_Windows_CurrentVersion_Uninstall) (0x00000000) export.reg
|
||||||
|
2400 (05) (_windir__system32_ipconfig_exe__all) (0x00000000) output.log
|
||||||
|
2147 (06) (_windir__system32_netsh_exe_advfirewall_show_allprofiles) (0x00000000) output.log
|
||||||
|
1043 (07) (_windir__system32_netsh_exe_advfirewall_show_global) (0x00000000) output.log
|
||||||
|
59 (08) (_windir__system32_netsh_exe_wlan_show_profiles) (0x80070001) output.log
|
||||||
|
1591 (09) (_windir__system32_ping_exe_-n_50_localhost) (0x00000000) output.log
|
||||||
|
5192 (10) (_windir__system32_Dsregcmd_exe__status) (0x00000000) output.log
|
||||||
|
```
|
||||||
|
|
||||||
## Policy area
|
## Policy area
|
||||||
|
|
||||||
|
@ -44,7 +44,8 @@ In Windows, after the user confirms the account deletion command and before the
|
|||||||
|
|
||||||
This action utilizes the OMA DM generic alert 1226 function to send a user an MDM unenrollment user alert to the MDM server after the device accepts the user unenrollment request, but before it deletes any enterprise data. The server should set the expectation that unenrollment may succeed or fail, and the server can check whether the device is unenrolled by either checking whether the device calls back at scheduled time or by sending a push notification to the device to see whether it responds back. If the server plans to send a push notification, it should allow for some delay to give the device the time to complete the unenrollment work.
|
This action utilizes the OMA DM generic alert 1226 function to send a user an MDM unenrollment user alert to the MDM server after the device accepts the user unenrollment request, but before it deletes any enterprise data. The server should set the expectation that unenrollment may succeed or fail, and the server can check whether the device is unenrolled by either checking whether the device calls back at scheduled time or by sending a push notification to the device to see whether it responds back. If the server plans to send a push notification, it should allow for some delay to give the device the time to complete the unenrollment work.
|
||||||
|
|
||||||
> **Note** The user unenrollment is an OMA DM standard. For more information about the 1226 generic alert, refer to the OMA Device Management Protocol specification (OMA-TS-DM\_Protocol-V1\_2\_1-20080617-A), available from the [OMA website](https://go.microsoft.com/fwlink/p/?LinkId=267526).
|
> [!NOTE]
|
||||||
|
> The user unenrollment is an OMA DM standard. For more information about the 1226 generic alert, refer to the OMA Device Management Protocol specification (OMA-TS-DM\_Protocol-V1\_2\_1-20080617-A), available from the [OMA website](https://www.openmobilealliance.org/release/DM/V1_1_2-20031209-A/).
|
||||||
|
|
||||||
|
|
||||||
The vendor uses the Type attribute to specify what type of generic alert it is. For device initiated MDM unenrollment, the alert type is **com.microsoft:mdm.unenrollment.userrequest**.
|
The vendor uses the Type attribute to specify what type of generic alert it is. For device initiated MDM unenrollment, the alert type is **com.microsoft:mdm.unenrollment.userrequest**.
|
||||||
@ -157,4 +158,3 @@ When the disconnection is completed, the user is notified that the device has be
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -138,10 +138,11 @@ There are two ways to retrieve this file from the device; one pre-GDR1 and one p
|
|||||||
2. Set a baseline for this configuration item with a “dummy” value (such as zzz), and ensure that you do not remediate it.
|
2. Set a baseline for this configuration item with a “dummy” value (such as zzz), and ensure that you do not remediate it.
|
||||||
|
|
||||||
The dummy value is not set; it is only used for comparison.
|
The dummy value is not set; it is only used for comparison.
|
||||||
3. After the report XML is sent to the device, Microsoft Endpoint Configuration Manager displays a compliance log that contains the report information. The log can contain significant amount of data.
|
3. After the report XML is sent to the device, Microsoft Endpoint Manager displays a compliance log that contains the report information. The log can contain significant amount of data.
|
||||||
4. Parse this log for the report XML content.
|
4. Parse this log for the report XML content.
|
||||||
|
|
||||||
For a step-by-step walkthrough, see [Retrieve a device update report using Microsoft Endpoint Configuration Manager logs](#retrieve-a-device-update-report-using-microsoft-endpoint-configuration-manager-logs).
|
For a step-by-step walkthrough, see [Retrieve a device update report using Microsoft Endpoint Manager logs](#retrieve-a-device-update-report-using-microsoft-endpoint-manager-logs).
|
||||||
|
|
||||||
|
|
||||||
**Post-GDR1: Retrieve the report xml file using an SD card**
|
**Post-GDR1: Retrieve the report xml file using an SD card**
|
||||||
|
|
||||||
@ -460,7 +461,7 @@ DownloadFiles $inputFile $downloadCache $localCacheURL
|
|||||||
```
|
```
|
||||||
|
|
||||||
<a href="" id="how-to-retrieve"></a>
|
<a href="" id="how-to-retrieve"></a>
|
||||||
## Retrieve a device update report using Microsoft Endpoint Configuration Manager logs
|
## Retrieve a device update report using Microsoft Endpoint Manager logs
|
||||||
|
|
||||||
**For pre-GDR1 devices**
|
**For pre-GDR1 devices**
|
||||||
Use this procedure for pre-GDR1 devices:
|
Use this procedure for pre-GDR1 devices:
|
||||||
|
@ -14,16 +14,13 @@ ms.date: 06/26/2017
|
|||||||
|
|
||||||
# FileSystem CSP
|
# FileSystem CSP
|
||||||
|
|
||||||
|
|
||||||
The FileSystem configuration service provider is used to query, add, modify, and delete files, file directories, and file attributes on the mobile device. It can retrieve information about or manage files in ROM, files in persistent store and files on any removable storage card that is present in the device. It works for files that are hidden from the user as well as those that are visible to the user.
|
The FileSystem configuration service provider is used to query, add, modify, and delete files, file directories, and file attributes on the mobile device. It can retrieve information about or manage files in ROM, files in persistent store and files on any removable storage card that is present in the device. It works for files that are hidden from the user as well as those that are visible to the user.
|
||||||
|
|
||||||
> **Note** FileSystem CSP is only supported in Windows 10 Mobile.
|
> [!NOTE]
|
||||||
>
|
> FileSystem CSP is only supported in Windows 10 Mobile.
|
||||||
>
|
|
||||||
>
|
|
||||||
> **Note** This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_OEM capabilities to be accessed from a network configuration application.
|
|
||||||
|
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> This configuration service provider requires the ID\_CAP\_CSP\_FOUNDATION and ID\_CAP\_CSP\_OEM capabilities to be accessed from a network configuration application.
|
||||||
|
|
||||||
The following diagram shows the FileSystem configuration service provider management object in tree format as used by OMA DM. The OMA Client Provisioning protocol is not supported by this configuration service provider.
|
The following diagram shows the FileSystem configuration service provider management object in tree format as used by OMA DM. The OMA Client Provisioning protocol is not supported by this configuration service provider.
|
||||||
|
|
||||||
@ -63,7 +60,7 @@ The following properties are supported for file directories:
|
|||||||
|
|
||||||
- `Name`: The file directory name. The Get command is the only supported command.
|
- `Name`: The file directory name. The Get command is the only supported command.
|
||||||
|
|
||||||
- `Type`: The MIME type of the file, which an empty string for directories that are not the root node. The Get command is the only supported command.
|
- `Type`: The MIME type of the file, which is an empty string for directories that are not the root node. The Get command is the only supported command.
|
||||||
|
|
||||||
- `Format`: The format, which is `node`. The Get command is the only supported command.
|
- `Format`: The format, which is `node`. The Get command is the only supported command.
|
||||||
|
|
||||||
@ -71,7 +68,7 @@ The following properties are supported for file directories:
|
|||||||
|
|
||||||
- `Size`: Not supported.
|
- `Size`: Not supported.
|
||||||
|
|
||||||
- `msft:SystemAttributes`: A custom property that contains file directory attributes. This value is an integer bit mask that corresponds to the FILE\_ATTRIBUTE values and flags defined in the header file winnt.h. This supports the Get command and the Replace command.
|
- `msft:SystemAttributes`: A custom property that contains file directory attributes. This value is an integer bit mask that corresponds to the FILE\_ATTRIBUTE values and flags defined in the header file `winnt.h`. This supports the Get command and the Replace command.
|
||||||
|
|
||||||
<a href="" id="file-name"></a>***file name***
|
<a href="" id="file-name"></a>***file name***
|
||||||
Optional. Return a file in binary format. If the file is too large for the configuration service to return, it returns error code 413 (Request entity too large) instead.
|
Optional. Return a file in binary format. If the file is too large for the configuration service to return, it returns error code 413 (Request entity too large) instead.
|
||||||
@ -90,7 +87,7 @@ The following properties are supported for files:
|
|||||||
|
|
||||||
- `Type`: The MIME type of the file. This value is always set to the generic MIME type: `application/octet-stream`. The Get command is the only supported command.
|
- `Type`: The MIME type of the file. This value is always set to the generic MIME type: `application/octet-stream`. The Get command is the only supported command.
|
||||||
|
|
||||||
- `Format`: The format, which is b64 encoded for binary data is sent over XML, and bin format for binary data sent over wbxml. The Get command is the only supported command.
|
- `Format`: The format, which is b64 encoded for binary data is sent over XML, and bin format for binary data sent over WBXML. The Get command is the only supported command.
|
||||||
|
|
||||||
- `TStamp`: A standard OMA property that indicates the last time the file was changed. The value is represented by a string containing a UTC based, ISO 8601 basic format, complete representation of a date and time value, e.g. 20010711T163817Z means July 11, 2001 at 16 hours, 38 minutes and 17 seconds. The Get command is the only supported command.
|
- `TStamp`: A standard OMA property that indicates the last time the file was changed. The value is represented by a string containing a UTC based, ISO 8601 basic format, complete representation of a date and time value, e.g. 20010711T163817Z means July 11, 2001 at 16 hours, 38 minutes and 17 seconds. The Get command is the only supported command.
|
||||||
|
|
||||||
@ -100,15 +97,4 @@ The following properties are supported for files:
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
|
|
||||||
[Configuration service provider reference](configuration-service-provider-reference.md)
|
[Configuration service provider reference](configuration-service-provider-reference.md)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -789,6 +789,31 @@ ms.date: 10/08/2020
|
|||||||
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_2](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-2)
|
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_2](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-2)
|
||||||
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_3](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-3)
|
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_3](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-3)
|
||||||
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_4](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-4)
|
- [ADMX_PerformanceDiagnostics/WdiScenarioExecutionPolicy_4](./policy-csp-admx-performancediagnostics.md#admx-performancediagnostics-wdiscenarioexecutionpolicy-4)
|
||||||
|
- [ADMX_Power/ACConnectivityInStandby_2](./policy-csp-admx-power.md#admx-power-acconnectivityinstandby-2)
|
||||||
|
- [ADMX_Power/ACCriticalSleepTransitionsDisable_2](./policy-csp-admx-power.md#admx-power-accriticalsleeptransitionsdisable-2)
|
||||||
|
- [ADMX_Power/ACStartMenuButtonAction_2](./policy-csp-admx-power.md#admx-power-acstartmenubuttonaction-2)
|
||||||
|
- [ADMX_Power/AllowSystemPowerRequestAC](./policy-csp-admx-power.md#admx-power-allowsystempowerrequestac)
|
||||||
|
- [ADMX_Power/AllowSystemPowerRequestDC](./policy-csp-admx-power.md#admx-power-allowsystempowerrequestdc)
|
||||||
|
- [ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC](./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopenac)
|
||||||
|
- [ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC](./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopendc)
|
||||||
|
- [ADMX_Power/CustomActiveSchemeOverride_2](./policy-csp-admx-power.md#admx-power-customactiveschemeoverride-2)
|
||||||
|
- [ADMX_Power/DCBatteryDischargeAction0_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction0-2)
|
||||||
|
- [ADMX_Power/DCBatteryDischargeAction1_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction1-2)
|
||||||
|
- [ADMX_Power/DCBatteryDischargeLevel0_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel0-2)
|
||||||
|
- [ADMX_Power/DCBatteryDischargeLevel1UINotification_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1uinotification-2)
|
||||||
|
- [ADMX_Power/DCBatteryDischargeLevel1_2](./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1-2)
|
||||||
|
- [ADMX_Power/DCConnectivityInStandby_2](./policy-csp-admx-power.md#admx-power-dcconnectivityinstandby-2)
|
||||||
|
- [ADMX_Power/DCCriticalSleepTransitionsDisable_2](./policy-csp-admx-power.md#admx-power-dccriticalsleeptransitionsdisable-2)
|
||||||
|
- [ADMX_Power/DCStartMenuButtonAction_2](./policy-csp-admx-power.md#admx-power-dcstartmenubuttonaction-2)
|
||||||
|
- [ADMX_Power/DiskACPowerDownTimeOut_2](./policy-csp-admx-power.md#admx-power-diskacpowerdowntimeout-2)
|
||||||
|
- [ADMX_Power/DiskDCPowerDownTimeOut_2](./policy-csp-admx-power.md#admx-power-diskdcpowerdowntimeout-2)
|
||||||
|
- [ADMX_Power/Dont_PowerOff_AfterShutdown](./policy-csp-admx-power.md#admx-power-dont-poweroff-aftershutdown)
|
||||||
|
- [ADMX_Power/EnableDesktopSlideShowAC](./policy-csp-admx-power.md#admx-power-enabledesktopslideshowac)
|
||||||
|
- [ADMX_Power/EnableDesktopSlideShowDC](./policy-csp-admx-power.md#admx-power-enabledesktopslideshowdc)
|
||||||
|
- [ADMX_Power/InboxActiveSchemeOverride_2](./policy-csp-admx-power.md#admx-power-inboxactiveschemeoverride-2)
|
||||||
|
- [ADMX_Power/PW_PromptPasswordOnResume](./policy-csp-admx-power.md#admx-power-pw-promptpasswordonresume)
|
||||||
|
- [ADMX_Power/PowerThrottlingTurnOff](./policy-csp-admx-power.md#admx-power-powerthrottlingturnoff)
|
||||||
|
- [ADMX_Power/ReserveBatteryNotificationLevel](./policy-csp-admx-power.md#admx-power-reservebatterynotificationlevel)
|
||||||
- [ADMX_PowerShellExecutionPolicy/EnableModuleLogging](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablemodulelogging)
|
- [ADMX_PowerShellExecutionPolicy/EnableModuleLogging](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablemodulelogging)
|
||||||
- [ADMX_PowerShellExecutionPolicy/EnableScripts](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablescripts)
|
- [ADMX_PowerShellExecutionPolicy/EnableScripts](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enablescripts)
|
||||||
- [ADMX_PowerShellExecutionPolicy/EnableTranscripting](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enabletranscripting)
|
- [ADMX_PowerShellExecutionPolicy/EnableTranscripting](./policy-csp-admx-powershellexecutionpolicy.md#admx-powershellexecutionpolicy-enabletranscripting)
|
||||||
|
@ -2749,6 +2749,86 @@ The following diagram shows the Policy configuration service provider in tree fo
|
|||||||
</dd>
|
</dd>
|
||||||
</dl>
|
</dl>
|
||||||
|
|
||||||
|
### ADMX_Power policies
|
||||||
|
|
||||||
|
<dl>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-acconnectivityinstandby-2" id="admx-power-acconnectivityinstandby-2">ADMX_Power/ACConnectivityInStandby_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-accriticalsleeptransitionsdisable-2" id="admx-power-accriticalsleeptransitionsdisable-2">ADMX_Power/ACCriticalSleepTransitionsDisable_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-acstartmenubuttonaction-2" id="admx-power-acstartmenubuttonaction-2">ADMX_Power/ACStartMenuButtonAction_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-allowsystempowerrequestac" id="admx-power-allowsystempowerrequestac">ADMX_Power/AllowSystemPowerRequestAC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-allowsystempowerrequestdc" id="admx-power-allowsystempowerrequestdc">ADMX_Power/AllowSystemPowerRequestDC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopenac" id="admx-power-allowsystemsleepwithremotefilesopenac">ADMX_Power/AllowSystemSleepWithRemoteFilesOpenAC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-allowsystemsleepwithremotefilesopendc" id="admx-power-allowsystemsleepwithremotefilesopendc">ADMX_Power/AllowSystemSleepWithRemoteFilesOpenDC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-customactiveschemeoverride-2" id="admx-power-customactiveschemeoverride-2">ADMX_Power/CustomActiveSchemeOverride_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction0-2" id="admx-power-dcbatterydischargeaction0-2">ADMX_Power/DCBatteryDischargeAction0_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcbatterydischargeaction1-2" id="admx-power-dcbatterydischargeaction1-2">ADMX_Power/DCBatteryDischargeAction1_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel0-2" id="admx-power-dcbatterydischargelevel0-2">ADMX_Power/DCBatteryDischargeLevel0_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1uinotification-2" id="admx-power-dcbatterydischargelevel1uinotification-2">ADMX_Power/DCBatteryDischargeLevel1UINotification_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcbatterydischargelevel1-2" id="admx-power-dcbatterydischargelevel1-2">ADMX_Power/DCBatteryDischargeLevel1_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcconnectivityinstandby-2" id="admx-power-dcconnectivityinstandby-2">ADMX_Power/DCConnectivityInStandby_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dccriticalsleeptransitionsdisable-2" id="admx-power-dccriticalsleeptransitionsdisable-2">ADMX_Power/DCCriticalSleepTransitionsDisable_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dcstartmenubuttonaction-2" id="admx-power-dcstartmenubuttonaction-2">ADMX_Power/DCStartMenuButtonAction_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-diskacpowerdowntimeout-2" id="admx-power-diskacpowerdowntimeout-2">ADMX_Power/DiskACPowerDownTimeOut_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-diskdcpowerdowntimeout-2" id="admx-power-diskdcpowerdowntimeout-2">ADMX_Power/DiskDCPowerDownTimeOut_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-dont-poweroff-aftershutdown" id="admx-power-dont-poweroff-aftershutdown">ADMX_Power/Dont_PowerOff_AfterShutdown</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-enabledesktopslideshowac" id="admx-power-enabledesktopslideshowac">ADMX_Power/EnableDesktopSlideShowAC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-enabledesktopslideshowdc" id="admx-power-enabledesktopslideshowdc">ADMX_Power/EnableDesktopSlideShowDC</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-inboxactiveschemeoverride-2" id="admx-power-inboxactiveschemeoverride-2">ADMX_Power/InboxActiveSchemeOverride_2</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-pw-promptpasswordonresume" id="admx-power-pw-promptpasswordonresume">ADMX_Power/PW_PromptPasswordOnResume</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-powerthrottlingturnoff" id="admx-power-powerthrottlingturnoff">ADMX_Power/PowerThrottlingTurnOff</a>
|
||||||
|
</dd>
|
||||||
|
<dd>
|
||||||
|
<a href="./policy-csp-admx-power.md#admx-power-reservebatterynotificationlevel" id="admx-power-reservebatterynotificationlevel">ADMX_Power/ReserveBatteryNotificationLevel</a>
|
||||||
|
</dd>
|
||||||
|
</dl>
|
||||||
|
|
||||||
### ADMX_PowerShellExecutionPolicy policies
|
### ADMX_PowerShellExecutionPolicy policies
|
||||||
|
|
||||||
<dl>
|
<dl>
|
||||||
|
@ -106,7 +106,7 @@ manager: dansimp
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. The policy setting specifies the category of programs that appears when users open the "Add New Programs" page. If you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. You can use the Category box on the "Add New Programs" page to display programs in other categories.
|
Available in the latest Windows 10 Insider Preview Build. The policy setting specifies the category of programs that appears when users open the "Add New Programs" page. If you enable this setting, only the programs in the category you specify are displayed when the "Add New Programs" page opens. You can use the Category box on the "Add New Programs" page to display programs in other categories.
|
||||||
|
|
||||||
To use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation.
|
To use this setting, type the name of a category in the Category box for this setting. You must enter a category that is already defined in Add or Remove Programs. To define a category, use Software Installation.
|
||||||
|
|
||||||
@ -189,7 +189,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Add a program from CD-ROM or floppy disk" section from the Add New Programs page. This prevents users from using Add or Remove Programs to install programs from removable media.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users. This setting does not prevent users from using other tools and methods to add or remove program components.
|
If you disable this setting or do not configure it, the "Add a program from CD-ROM or floppy disk" option is available to all users. This setting does not prevent users from using other tools and methods to add or remove program components.
|
||||||
|
|
||||||
@ -270,7 +270,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the "Add programs from Microsoft" section from the Add New Programs page. This setting prevents users from using Add or Remove Programs to connect to Windows Update.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users. This setting does not prevent users from using other tools and methods to connect to Windows Update.
|
If you disable this setting or do not configure it, "Add programs from Microsoft" is available to all users. This setting does not prevent users from using other tools and methods to connect to Windows Update.
|
||||||
|
|
||||||
@ -351,7 +351,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from viewing or installing published programs. This setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them. Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from viewing or installing published programs. This setting removes the "Add programs from your network" section from the Add New Programs page. The "Add programs from your network" section lists published programs and provides an easy way to install them. Published programs are those programs that the system administrator has explicitly made available to the user with a tool such as Windows Installer. Typically, system administrators publish programs to notify users that the programs are available, to recommend their use, or to enable users to install them without having to search for installation files.
|
||||||
|
|
||||||
If you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu.
|
If you enable this setting, users cannot tell which programs have been published by the system administrator, and they cannot use Add or Remove Programs to install published programs. However, they can still install programs by using other methods, and they can view and install assigned (partially installed) programs that are offered on the desktop or on the Start menu.
|
||||||
|
|
||||||
@ -433,7 +433,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Add New Programs button lets users install programs published or assigned by a system administrator.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Add New Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Add New Programs button lets users install programs published or assigned by a system administrator.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the Add New Programs button is available to all users. This setting does not prevent users from using other tools and methods to install programs.
|
If you disable this setting or do not configure it, the Add New Programs button is available to all users. This setting does not prevent users from using other tools and methods to install programs.
|
||||||
|
|
||||||
@ -511,7 +511,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from using Add or Remove Programs. This setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus. Add or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from using Add or Remove Programs. This setting removes Add or Remove Programs from Control Panel and removes the Add or Remove Programs item from menus. Add or Remove Programs lets users install, uninstall, repair, add, and remove features and components of Windows 2000 Professional and a wide variety of Windows programs. Programs published or assigned to the user appear in Add or Remove Programs.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, Add or Remove Programs is available to all users. When enabled, this setting takes precedence over the other settings in this folder. This setting does not prevent users from using other tools and methods to install or uninstall programs.
|
If you disable this setting or do not configure it, Add or Remove Programs is available to all users. When enabled, this setting takes precedence over the other settings in this folder. This setting does not prevent users from using other tools and methods to install or uninstall programs.
|
||||||
|
|
||||||
@ -589,7 +589,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Set Program Access and Defaults button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Set Program Access and Defaults button lets administrators specify default programs for certain activities, such as Web browsing or sending e-mail, as well as which programs are accessible from the Start menu, desktop, and other locations.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the Set Program Access and Defaults button is available to all users. This setting does not prevent users from using other tools and methods to change program access or defaults. This setting does not prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting.
|
If you disable this setting or do not configure it, the Set Program Access and Defaults button is available to all users. This setting does not prevent users from using other tools and methods to change program access or defaults. This setting does not prevent the Set Program Access and Defaults icon from appearing on the Start menu. See the "Remove Set Program Access and Defaults from Start menu" setting.
|
||||||
|
|
||||||
@ -668,7 +668,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Change or Remove Programs button from the Add or Remove Programs bar. As a result, users cannot view or change the attached page. The Change or Remove Programs button lets users uninstall, repair, add, or remove features of installed programs.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the Change or Remove Programs page is available to all users. This setting does not prevent users from using other tools and methods to delete or uninstall programs.
|
If you disable this setting or do not configure it, the Change or Remove Programs page is available to all users. This setting does not prevent users from using other tools and methods to delete or uninstall programs.
|
||||||
|
|
||||||
@ -746,7 +746,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from using Add or Remove Programs to configure installed services. This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from using Add or Remove Programs to configure installed services. This setting removes the "Set up services" section of the Add/Remove Windows Components page. The "Set up services" section lists system services that have not been configured and offers users easy access to the configuration tools.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. If you enable this setting, "Set up services" never appears. This setting does not prevent users from using other methods to configure services.
|
If you disable this setting or do not configure it, "Set up services" appears only when there are unconfigured system services. If you enable this setting, "Set up services" never appears. This setting does not prevent users from using other methods to configure services.
|
||||||
|
|
||||||
@ -827,7 +827,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes links to the Support Info dialog box from programs on the Change or Remove Programs page. Programs listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes links to the Support Info dialog box from programs on the Change or Remove Programs page. Programs listed on the Change or Remove Programs page can include a "Click here for support information" hyperlink. When clicked, the hyperlink opens a dialog box that displays troubleshooting information, including a link to the installation files and data that users need to obtain product support, such as the Product ID and version number of the program. The dialog box also includes a hyperlink to support information on the Internet, such as the Microsoft Product Support Services Web page.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the Support Info hyperlink appears.
|
If you disable this setting or do not configure it, the Support Info hyperlink appears.
|
||||||
|
|
||||||
@ -908,7 +908,7 @@ ADMX Info:
|
|||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
|
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting removes the Add/Remove Windows Components button from the Add or Remove Programs bar. As a result, users cannot view or change the associated page. The Add/Remove Windows Components button lets users configure installed services and use the Windows Component Wizard to add, remove, and configure components of Windows from the installation files.
|
||||||
|
|
||||||
If you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users. This setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard.
|
If you disable this setting or do not configure it, the Add/Remove Windows Components button is available to all users. This setting does not prevent users from using other tools and methods to configure services or add or remove program components. However, this setting blocks user access to the Windows Component Wizard.
|
||||||
|
|
||||||
|
@ -108,7 +108,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether to prevent the MS-DOS subsystem (**ntvdm.exe**) from running on this computer. This setting affects the launching of 16-bit applications in the operating system.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether to prevent the MS-DOS subsystem (**ntvdm.exe**) from running on this computer. This setting affects the launching of 16-bit applications in the operating system.
|
||||||
|
|
||||||
You can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, **ntvdm.exe** must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the MS-DOS subsystem is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased.
|
You can use this setting to turn off the MS-DOS subsystem, which will reduce resource usage and prevent users from running 16-bit applications. To run any 16-bit application or any application with 16-bit components, **ntvdm.exe** must be allowed to run. The MS-DOS subsystem starts when the first 16-bit application is launched. While the MS-DOS subsystem is running, any subsequent 16-bit applications launch faster, but overall resource usage on the system is increased.
|
||||||
|
|
||||||
@ -185,7 +185,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the visibility of the Program Compatibility property page shell extension. This shell extension is visible on the property context-menu of any program shortcut or executable file.
|
||||||
|
|
||||||
The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications.
|
The compatibility property page displays a list of options that can be selected and applied to the application to resolve the most common issues affecting legacy applications.
|
||||||
|
|
||||||
@ -256,7 +256,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. The policy setting controls the state of the Application Telemetry engine in the system.
|
Available in the latest Windows 10 Insider Preview Build. The policy setting controls the state of the Application Telemetry engine in the system.
|
||||||
|
|
||||||
Application Telemetry is a mechanism that tracks anonymous usage of specific Windows system components by applications.
|
Application Telemetry is a mechanism that tracks anonymous usage of specific Windows system components by applications.
|
||||||
|
|
||||||
@ -331,7 +331,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. The policy setting controls the state of the Switchback compatibility engine in the system.
|
Available in the latest Windows 10 Insider Preview Build. The policy setting controls the state of the Switchback compatibility engine in the system.
|
||||||
|
|
||||||
Switchback is a mechanism that provides generic compatibility mitigations to older applications by providing older behavior to old applications and new behavior to new applications.
|
Switchback is a mechanism that provides generic compatibility mitigations to older applications by providing older behavior to old applications and new behavior to new applications.
|
||||||
|
|
||||||
@ -407,7 +407,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the application compatibility engine in the system.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the application compatibility engine in the system.
|
||||||
|
|
||||||
The engine is part of the loader and looks through a compatibility database every time an application is started on the system. If a match for the application is found it provides either run-time solutions or compatibility fixes, or displays an Application Help message if the application has a know problem.
|
The engine is part of the loader and looks through a compatibility database every time an application is started on the system. If a match for the application is found it provides either run-time solutions or compatibility fixes, or displays an Application Help message if the application has a know problem.
|
||||||
|
|
||||||
@ -485,7 +485,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting exists only for backward compatibility, and is not valid for this version of Windows. To configure the Program Compatibility Assistant, use the 'Turn off Program Compatibility Assistant' setting under Computer Configuration\Administrative Templates\Windows Components\Application Compatibility.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
|
|
||||||
@ -552,7 +552,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the Program Compatibility Assistant (PCA). The PCA monitors applications run by the user. When a potential compatibility issue with an application is detected, the PCA will prompt the user with recommended solutions. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the Program Compatibility Assistant (PCA). The PCA monitors applications run by the user. When a potential compatibility issue with an application is detected, the PCA will prompt the user with recommended solutions. To configure the diagnostic settings for the PCA, go to System->Troubleshooting and Diagnostics->Application Compatibility Diagnostics.
|
||||||
|
|
||||||
If you enable this policy setting, the PCA will be turned off. The user will not be presented with solutions to known compatibility issues when running applications. Turning off the PCA can be useful for system administrators who require better performance and are already aware of application compatibility issues.
|
If you enable this policy setting, the PCA will be turned off. The user will not be presented with solutions to known compatibility issues when running applications. Turning off the PCA can be useful for system administrators who require better performance and are already aware of application compatibility issues.
|
||||||
|
|
||||||
@ -626,7 +626,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of Steps Recorder.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of Steps Recorder.
|
||||||
|
|
||||||
Steps Recorder keeps a record of steps taken by the user. The data generated by Steps Recorder can be used in feedback systems such as Windows Error Reporting to help developers understand and fix problems. The data includes user actions such as keyboard input and mouse input, user interface data, and screenshots. Steps Recorder includes an option to turn on and off data collection.
|
Steps Recorder keeps a record of steps taken by the user. The data generated by Steps Recorder can be used in feedback systems such as Windows Error Reporting to help developers understand and fix problems. The data includes user actions such as keyboard input and mouse input, user interface data, and screenshots. Steps Recorder includes an option to turn on and off data collection.
|
||||||
|
|
||||||
@ -699,7 +699,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the state of the Inventory Collector.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the state of the Inventory Collector.
|
||||||
|
|
||||||
The Inventory Collector inventories applications, files, devices, and drivers on the system and sends the information to Microsoft. This information is used to help diagnose compatibility problems.
|
The Inventory Collector inventories applications, files, devices, and drivers on the system and sends the information to Microsoft. This information is used to help diagnose compatibility problems.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting determines what information is logged in security audit events when a new process has been created. This setting only applies when the Audit Process Creation policy is enabled.
|
||||||
|
|
||||||
If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied.
|
If you enable this policy setting, the command line information for every process will be logged in plain text in the security event log as part of the Audit Process Creation event 4688, "a new process has been created," on the workstations and servers on which this policy setting is applied.
|
||||||
|
|
||||||
|
@ -78,7 +78,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting determines the cipher suites used by the Secure Socket Layer (SSL).
|
Available in the latest Windows 10 Insider Preview Build. This policy setting determines the cipher suites used by the Secure Socket Layer (SSL).
|
||||||
|
|
||||||
If you enable this policy setting, SSL cipher suites are prioritized in the order specified.
|
If you enable this policy setting, SSL cipher suites are prioritized in the order specified.
|
||||||
|
|
||||||
@ -151,7 +151,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting determines the priority order of ECC curves used with ECDHE cipher suites.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting determines the priority order of ECC curves used with ECDHE cipher suites.
|
||||||
|
|
||||||
If you enable this policy setting, ECC curves are prioritized in the order specified. Enter one curve name per line.
|
If you enable this policy setting, ECC curves are prioritized in the order specified. Enter one curve name per line.
|
||||||
|
|
||||||
|
@ -78,7 +78,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.
|
||||||
|
|
||||||
Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components.
|
Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components.
|
||||||
|
|
||||||
@ -153,7 +153,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting directs the system to search Active Directory for missing Component Object Model (COM) components that a program requires.
|
||||||
|
|
||||||
Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components.
|
Many Windows programs, such as the MMC snap-ins, use the interfaces provided by the COM components. These programs cannot perform all their functions unless Windows has internally registered the required components.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows an administrator to standardize the account pictures for all users on a system to the default account picture. One application for this policy setting is to standardize the account pictures to a company logo.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows an administrator to standardize the account pictures for all users on a system to the default account picture. One application for this policy setting is to standardize the account pictures to a company logo.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> The default account picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\user.jpg. The default guest picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\guest.jpg. If the default pictures do not exist, an empty frame is displayed.
|
> The default account picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\user.jpg. The default guest picture is stored at %PROGRAMDATA%\Microsoft\User Account Pictures\guest.jpg. If the default pictures do not exist, an empty frame is displayed.
|
||||||
|
@ -83,7 +83,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from changing their Windows password on demand.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from changing their Windows password on demand.
|
||||||
|
|
||||||
If you enable this policy setting, the 'Change Password' button on the Windows Security dialog box will not appear when you press Ctrl+Alt+Del.
|
If you enable this policy setting, the 'Change Password' button on the Windows Security dialog box will not appear when you press Ctrl+Alt+Del.
|
||||||
|
|
||||||
@ -153,7 +153,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from locking the system.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from locking the system.
|
||||||
|
|
||||||
While locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it.
|
While locked, the desktop is hidden and the system cannot be used. Only the user who locked the system or the system administrator can unlock it.
|
||||||
|
|
||||||
@ -226,7 +226,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents users from starting Task Manager.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents users from starting Task Manager.
|
||||||
|
|
||||||
Task Manager (**taskmgr.exe**) lets users start and stop programs, monitor the performance of their computers, view and monitor all programs running on their computers, including system services, find the executable names of programs, and change the priority of the process in which programs run.
|
Task Manager (**taskmgr.exe**) lets users start and stop programs, monitor the performance of their computers, view and monitor all programs running on their computers, including system services, find the executable names of programs, and change the priority of the process in which programs run.
|
||||||
|
|
||||||
@ -297,7 +297,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting disables or removes all menu items and buttons that log the user off the system.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting disables or removes all menu items and buttons that log the user off the system.
|
||||||
|
|
||||||
If you enable this policy setting, users will not see the Log off menu item when they press Ctrl+Alt+Del. This will prevent them from logging off unless they restart or shutdown the computer, or clicking Log off from the Start menu.
|
If you enable this policy setting, users will not see the Log off menu item when they press Ctrl+Alt+Del. This will prevent them from logging off unless they restart or shutdown the computer, or clicking Log off from the Start menu.
|
||||||
|
|
||||||
|
@ -77,7 +77,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether Digital Locker can run.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether Digital Locker can run.
|
||||||
|
|
||||||
Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker.
|
Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker.
|
||||||
|
|
||||||
@ -148,7 +148,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether Digital Locker can run.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether Digital Locker can run.
|
||||||
|
|
||||||
Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker.
|
Digital Locker is a dedicated download manager associated with Windows Marketplace and a feature of Windows that can be used to manage and download products acquired and stored in the user's Windows Marketplace Digital Locker.
|
||||||
|
|
||||||
|
@ -137,7 +137,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualified domain names.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that NetBIOS over TCP/IP (NetBT) queries are issued for fully qualified domain names.
|
||||||
|
|
||||||
If you enable this policy setting, NetBT queries will be issued for multi-label and fully qualified domain names, such as "www.example.com" in addition to single-label names.
|
If you enable this policy setting, NetBT queries will be issued for multi-label and fully qualified domain names, such as "www.example.com" in addition to single-label names.
|
||||||
|
|
||||||
@ -205,7 +205,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that computers may attach suffixes to an unqualified multi-label name before sending subsequent DNS queries if the original name query fails.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that computers may attach suffixes to an unqualified multi-label name before sending subsequent DNS queries if the original name query fails.
|
||||||
|
|
||||||
A name containing dots, but not dot-terminated, is called an unqualified multi-label name, for example "server.corp" is an unqualified multi-label name. The name "server.corp.contoso.com." is an example of a fully qualified name because it contains a terminating dot.
|
A name containing dots, but not dot-terminated, is called an unqualified multi-label name, for example "server.corp" is an unqualified multi-label name. The name "server.corp.contoso.com." is an example of a fully qualified name because it contains a terminating dot.
|
||||||
|
|
||||||
@ -282,7 +282,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies a connection-specific DNS suffix. This policy setting supersedes local connection-specific DNS suffixes, and those configured using DHCP. To use this policy setting, click Enabled, and then enter a string value representing the DNS suffix.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies a connection-specific DNS suffix. This policy setting supersedes local connection-specific DNS suffixes, and those configured using DHCP. To use this policy setting, click Enabled, and then enter a string value representing the DNS suffix.
|
||||||
|
|
||||||
If you enable this policy setting, the DNS suffix that you enter will be applied to all network connections used by computers that receive this policy setting.
|
If you enable this policy setting, the DNS suffix that you enter will be applied to all network connections used by computers that receive this policy setting.
|
||||||
|
|
||||||
@ -351,7 +351,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if the devolution level that DNS clients will use if they perform primary DNS suffix devolution during the name resolution process.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if the devolution level that DNS clients will use if they perform primary DNS suffix devolution during the name resolution process.
|
||||||
|
|
||||||
With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name.
|
With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name.
|
||||||
|
|
||||||
@ -438,7 +438,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to Punycode when the computer is on non-domain networks with no WINS servers configured.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to Punycode when the computer is on non-domain networks with no WINS servers configured.
|
||||||
|
|
||||||
If this policy setting is enabled, IDNs are not converted to Punycode.
|
If this policy setting is enabled, IDNs are not converted to Punycode.
|
||||||
|
|
||||||
@ -507,7 +507,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to the Nameprep form, a canonical Unicode representation of the string.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether the DNS client should convert internationalized domain names (IDNs) to the Nameprep form, a canonical Unicode representation of the string.
|
||||||
|
|
||||||
If this policy setting is enabled, IDNs are converted to the Nameprep form.
|
If this policy setting is enabled, IDNs are converted to the Nameprep form.
|
||||||
|
|
||||||
@ -576,7 +576,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting defines the DNS servers to which a computer sends queries when it attempts to resolve names. This policy setting supersedes the list of DNS servers configured locally and those configured using DHCP.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting defines the DNS servers to which a computer sends queries when it attempts to resolve names. This policy setting supersedes the list of DNS servers configured locally and those configured using DHCP.
|
||||||
|
|
||||||
To use this policy setting, click Enabled, and then enter a space-delimited list of IP addresses in the available field. To use this policy setting, you must enter at least one IP address.
|
To use this policy setting, click Enabled, and then enter a space-delimited list of IP addresses in the available field. To use this policy setting, you must enter at least one IP address.
|
||||||
|
|
||||||
@ -647,7 +647,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that responses from link local name resolution protocols received over a network interface that is higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT).
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that responses from link local name resolution protocols received over a network interface that is higher in the binding order are preferred over DNS responses from network interfaces lower in the binding order. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT).
|
||||||
|
|
||||||
If you enable this policy setting, responses from link local protocols will be preferred over DNS responses if the local responses are from a network with a higher binding order.
|
If you enable this policy setting, responses from link local protocols will be preferred over DNS responses if the local responses are from a network with a higher binding order.
|
||||||
|
|
||||||
@ -720,7 +720,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the primary DNS suffix used by computers in DNS name registration and DNS name resolution.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the primary DNS suffix used by computers in DNS name registration and DNS name resolution.
|
||||||
|
|
||||||
To use this policy setting, click Enabled and enter the entire primary DNS suffix you want to assign. For example: microsoft.com.
|
To use this policy setting, click Enabled and enter the entire primary DNS suffix you want to assign. For example: microsoft.com.
|
||||||
|
|
||||||
@ -795,7 +795,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if a computer performing dynamic DNS registration will register A and PTR resource records with a concatenation of its computer name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its computer name and the primary DNS suffix.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if a computer performing dynamic DNS registration will register A and PTR resource records with a concatenation of its computer name and a connection-specific DNS suffix, in addition to registering these records with a concatenation of its computer name and the primary DNS suffix.
|
||||||
|
|
||||||
By default, a DNS client performing dynamic DNS registration registers A and PTR resource records with a concatenation of its computer name and the primary DNS suffix. For example, a computer name of mycomputer and a primary DNS suffix of microsoft.com will be registered as: mycomputer.microsoft.com.
|
By default, a DNS client performing dynamic DNS registration registers A and PTR resource records with a concatenation of its computer name and the primary DNS suffix. For example, a computer name of mycomputer and a primary DNS suffix of microsoft.com will be registered as: mycomputer.microsoft.com.
|
||||||
|
|
||||||
@ -869,7 +869,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if DNS client computers will register PTR resource records.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if DNS client computers will register PTR resource records.
|
||||||
|
|
||||||
By default, DNS clients configured to perform dynamic DNS registration will attempt to register PTR resource record only if they successfully registered the corresponding A resource record.
|
By default, DNS clients configured to perform dynamic DNS registration will attempt to register PTR resource record only if they successfully registered the corresponding A resource record.
|
||||||
|
|
||||||
@ -945,7 +945,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic update automatically register and update their DNS resource records with a DNS server.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if DNS dynamic update is enabled. Computers configured for DNS dynamic update automatically register and update their DNS resource records with a DNS server.
|
||||||
|
|
||||||
If you enable this policy setting, or you do not configure this policy setting, computers will attempt to use dynamic DNS registration on all network connections that have connection-specific dynamic DNS registration enabled. For a dynamic DNS registration to be enabled on a network connection, the connection-specific configuration must allow dynamic DNS registration, and this policy setting must not be disabled.
|
If you enable this policy setting, or you do not configure this policy setting, computers will attempt to use dynamic DNS registration on all network connections that have connection-specific dynamic DNS registration enabled. For a dynamic DNS registration to be enabled on a network connection, the connection-specific configuration must allow dynamic DNS registration, and this policy setting must not be disabled.
|
||||||
|
|
||||||
@ -1014,7 +1014,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether dynamic updates should overwrite existing resource records that contain conflicting IP addresses.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether dynamic updates should overwrite existing resource records that contain conflicting IP addresses.
|
||||||
|
|
||||||
This policy setting is designed for computers that register address (A) resource records in DNS zones that do not use Secure Dynamic Updates. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers.
|
This policy setting is designed for computers that register address (A) resource records in DNS zones that do not use Secure Dynamic Updates. Secure Dynamic Update preserves ownership of resource records and does not allow a DNS client to overwrite records that are registered by other computers.
|
||||||
|
|
||||||
@ -1087,7 +1087,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the interval used by DNS clients to refresh registration of A and PTR resource. This policy setting only applies to computers performing dynamic DNS updates.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the interval used by DNS clients to refresh registration of A and PTR resource. This policy setting only applies to computers performing dynamic DNS updates.
|
||||||
|
|
||||||
Computers configured to perform dynamic DNS registration of A and PTR resource records periodically reregister their records with DNS servers, even if the record has not changed. This reregistration is required to indicate to DNS servers that records are current and should not be automatically removed (scavenged) when a DNS server is configured to delete stale records.
|
Computers configured to perform dynamic DNS registration of A and PTR resource records periodically reregister their records with DNS servers, even if the record has not changed. This reregistration is required to indicate to DNS servers that records are current and should not be automatically removed (scavenged) when a DNS server is configured to delete stale records.
|
||||||
|
|
||||||
@ -1163,7 +1163,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the value of the time to live (TTL) field in A and PTR resource records that are registered by computers to which this policy setting is applied.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the value of the time to live (TTL) field in A and PTR resource records that are registered by computers to which this policy setting is applied.
|
||||||
|
|
||||||
To specify the TTL, click Enabled and then enter a value in seconds (for example, 900 is 15 minutes).
|
To specify the TTL, click Enabled and then enter a value in seconds (for example, 900 is 15 minutes).
|
||||||
|
|
||||||
@ -1234,7 +1234,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the DNS suffixes to attach to an unqualified single-label name before submission of a DNS query for that name.
|
||||||
|
|
||||||
An unqualified single-label name contains no dots. The name "example" is a single-label name. This is different from a fully qualified domain name such as "example.microsoft.com."
|
An unqualified single-label name contains no dots. The name "example" is a single-label name. This is different from a fully qualified domain name such as "example.microsoft.com."
|
||||||
|
|
||||||
@ -1310,7 +1310,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that a multi-homed DNS client should optimize name resolution across networks. The setting improves performance by issuing parallel DNS, link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT) queries across all networks. In the event that multiple positive responses are received, the network binding order is used to determine which response to accept.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that a multi-homed DNS client should optimize name resolution across networks. The setting improves performance by issuing parallel DNS, link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT) queries across all networks. In the event that multiple positive responses are received, the network binding order is used to determine which response to accept.
|
||||||
|
|
||||||
If you enable this policy setting, the DNS client will not perform any optimizations. DNS queries will be issued across all networks first. LLMNR queries will be issued if the DNS queries fail, followed by NetBT queries if LLMNR queries fail.
|
If you enable this policy setting, the DNS client will not perform any optimizations. DNS queries will be issued across all networks first. LLMNR queries will be issued if the DNS queries fail, followed by NetBT queries if LLMNR queries fail.
|
||||||
|
|
||||||
@ -1379,7 +1379,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that the DNS client should prefer responses from link local name resolution protocols on non-domain networks over DNS responses when issuing queries for flat names. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT).
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that the DNS client should prefer responses from link local name resolution protocols on non-domain networks over DNS responses when issuing queries for flat names. Examples of link local name resolution protocols include link local multicast name resolution (LLMNR) and NetBIOS over TCP/IP (NetBT).
|
||||||
|
|
||||||
If you enable this policy setting, the DNS client will prefer DNS responses, followed by LLMNR, followed by NetBT for all networks.
|
If you enable this policy setting, the DNS client will prefer DNS responses, followed by LLMNR, followed by NetBT for all networks.
|
||||||
|
|
||||||
@ -1451,7 +1451,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies the security level for dynamic DNS updates.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies the security level for dynamic DNS updates.
|
||||||
|
|
||||||
To use this policy setting, click Enabled and then select one of the following values:
|
To use this policy setting, click Enabled and then select one of the following values:
|
||||||
|
|
||||||
@ -1526,7 +1526,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com."
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if computers may send dynamic updates to zones with a single label name. These zones are also known as top-level domain zones, for example: "com."
|
||||||
|
|
||||||
By default, a DNS client that is configured to perform dynamic DNS update will update the DNS zone that is authoritative for its DNS resource records unless the authoritative zone is a top-level domain or root zone.
|
By default, a DNS client that is configured to perform dynamic DNS update will update the DNS zone that is authoritative for its DNS resource records unless the authoritative zone is a top-level domain or root zone.
|
||||||
|
|
||||||
@ -1597,7 +1597,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies if the DNS client performs primary DNS suffix devolution during the name resolution process.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies if the DNS client performs primary DNS suffix devolution during the name resolution process.
|
||||||
|
|
||||||
With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name.
|
With devolution, a DNS client creates queries by appending a single-label, unqualified domain name with the parent suffix of the primary DNS suffix name, and the parent of that suffix, and so on, stopping if the name is successfully resolved or at a level determined by devolution settings. Devolution can be used when a user or application submits a query for a single-label domain name.
|
||||||
|
|
||||||
@ -1684,7 +1684,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies that link local multicast name resolution (LLMNR) is disabled on client computers.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies that link local multicast name resolution (LLMNR) is disabled on client computers.
|
||||||
|
|
||||||
LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent using multicast over a local network link on a single subnet from a client computer to another client computer on the same subnet that also has LLMNR enabled. LLMNR does not require a DNS server or DNS client configuration, and provides name resolution in scenarios in which conventional DNS name resolution is not possible.
|
LLMNR is a secondary name resolution protocol. With LLMNR, queries are sent using multicast over a local network link on a single subnet from a client computer to another client computer on the same subnet that also has LLMNR enabled. LLMNR does not require a DNS server or DNS client configuration, and provides name resolution in scenarios in which conventional DNS name resolution is not possible.
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the default color for window frames when the user does not specify a color.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the default color for window frames when the user does not specify a color.
|
||||||
|
|
||||||
If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color.
|
If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color.
|
||||||
|
|
||||||
@ -162,7 +162,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the default color for window frames when the user does not specify a color.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the default color for window frames when the user does not specify a color.
|
||||||
|
|
||||||
If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color.
|
If you enable this policy setting and specify a default color, this color is used in glass window frames, if the user does not specify a color.
|
||||||
|
|
||||||
@ -234,7 +234,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows.
|
||||||
|
|
||||||
If you enable this policy setting, window animations are turned off.
|
If you enable this policy setting, window animations are turned off.
|
||||||
|
|
||||||
@ -305,7 +305,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the appearance of window animations such as those found when restoring, minimizing, and maximizing windows.
|
||||||
|
|
||||||
If you enable this policy setting, window animations are turned off.
|
If you enable this policy setting, window animations are turned off.
|
||||||
|
|
||||||
@ -376,7 +376,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the ability to change the color of window frames.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the ability to change the color of window frames.
|
||||||
|
|
||||||
If you enable this policy setting, you prevent users from changing the default window frame color.
|
If you enable this policy setting, you prevent users from changing the default window frame color.
|
||||||
|
|
||||||
@ -448,7 +448,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls the ability to change the color of window frames.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls the ability to change the color of window frames.
|
||||||
|
|
||||||
If you enable this policy setting, you prevent users from changing the default window frame color.
|
If you enable this policy setting, you prevent users from changing the default window frame color.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting prevents File Explorer from encrypting files that are moved to an encrypted folder.
|
||||||
|
|
||||||
If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder.
|
If you enable this policy setting, File Explorer will not automatically encrypt files that are moved to an encrypted folder.
|
||||||
|
|
||||||
|
@ -78,7 +78,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls resource usage for the forwarder (source computer) by controlling the events/per second sent to the Event Collector.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls resource usage for the forwarder (source computer) by controlling the events/per second sent to the Event Collector.
|
||||||
|
|
||||||
If you enable this policy setting, you can control the volume of events sent to the Event Collector by the source computer. This may be required in high volume environments.
|
If you enable this policy setting, you can control the volume of events sent to the Event Collector by the source computer. This may be required in high volume environments.
|
||||||
|
|
||||||
@ -151,7 +151,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure the server address, refresh interval, and issuer certificate authority (CA) of a target Subscription Manager.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure the server address, refresh interval, and issuer certificate authority (CA) of a target Subscription Manager.
|
||||||
|
|
||||||
If you enable this policy setting, you can configure the Source Computer to contact a specific FQDN (Fully Qualified Domain Name) or IP Address and request subscription specifics.
|
If you enable this policy setting, you can configure the Source Computer to contact a specific FQDN (Fully Qualified Domain Name) or IP Address and request subscription specifics.
|
||||||
|
|
||||||
|
@ -74,7 +74,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting determines whether the RPC protocol messages used by VSS for SMB2 File Shares feature is enabled.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting determines whether the RPC protocol messages used by VSS for SMB2 File Shares feature is enabled.
|
||||||
|
|
||||||
VSS for SMB2 File Shares feature enables VSS aware backup applications to perform application consistent backup and restore of VSS aware applications storing data on SMB2 File Shares.
|
VSS for SMB2 File Shares feature enables VSS aware backup applications to perform application consistent backup and restore of VSS aware applications storing data on SMB2 File Shares.
|
||||||
|
|
||||||
|
@ -93,7 +93,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of compressed files.
|
Available in the latest Windows 10 Insider Preview Build. Compression can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of compressed files.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
@ -157,7 +157,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Delete notification is a feature that notifies the underlying storage device of clusters that are freed due to a file delete operation.
|
Available in the latest Windows 10 Insider Preview Build. Delete notification is a feature that notifies the underlying storage device of clusters that are freed due to a file delete operation.
|
||||||
|
|
||||||
A value of 0, the default, will enable delete notifications for all volumes.
|
A value of 0, the default, will enable delete notifications for all volumes.
|
||||||
|
|
||||||
@ -224,7 +224,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Encryption can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of encrypted files.
|
Available in the latest Windows 10 Insider Preview Build. Encryption can add to the processing overhead of filesystem operations. Enabling this setting will prevent access to and creation of encrypted files.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
@ -287,7 +287,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Encrypting the page file prevents malicious users from reading data that has been paged to disk, but also adds processing overhead for filesystem operations. Enabling this setting will cause the page files to be encrypted.
|
Available in the latest Windows 10 Insider Preview Build. Encrypting the page file prevents malicious users from reading data that has been paged to disk, but also adds processing overhead for filesystem operations. Enabling this setting will cause the page files to be encrypted.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
@ -350,7 +350,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Enabling Win32 long paths will allow manifested win32 applications and Windows Store applications to access paths beyond the normal 260 character limit per node on file systems that support it. Enabling this setting will cause the long paths to be accessible within the process.
|
Available in the latest Windows 10 Insider Preview Build. Enabling Win32 long paths will allow manifested win32 applications and Windows Store applications to access paths beyond the normal 260 character limit per node on file systems that support it. Enabling this setting will cause the long paths to be accessible within the process.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
@ -413,7 +413,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting provides control over whether or not short names are generated during file creation. Some applications require short names for compatibility, but short names have a negative performance impact on the system.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting provides control over whether or not short names are generated during file creation. Some applications require short names for compatibility, but short names have a negative performance impact on the system.
|
||||||
|
|
||||||
If you enable short names on all volumes then short names will always be generated. If you disable them on all volumes then they will never be generated. If you set short name creation to be configurable on a per volume basis then an on-disk flag will determine whether or not short names are created on a given volume. If you disable short name creation on all data volumes then short names will only be generated for files created on the system volume.
|
If you enable short names on all volumes then short names will always be generated. If you disable them on all volumes then they will never be generated. If you set short name creation to be configurable on a per volume basis then an on-disk flag will determine whether or not short names are created on a given volume. If you disable short name creation on all data volumes then short names will only be generated for files created on the system volume.
|
||||||
|
|
||||||
@ -479,7 +479,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Symbolic links can introduce vulnerabilities in certain applications. To mitigate this issue, you can selectively enable or disable the evaluation of these types of symbolic links:
|
Available in the latest Windows 10 Insider Preview Build. Symbolic links can introduce vulnerabilities in certain applications. To mitigate this issue, you can selectively enable or disable the evaluation of these types of symbolic links:
|
||||||
|
|
||||||
- Local Link to a Local Target
|
- Local Link to a Local Target
|
||||||
- Local Link to a Remote Target
|
- Local Link to a Remote Target
|
||||||
@ -552,7 +552,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. TXF deprecated features included savepoints, secondary RM, miniversion and roll forward. Enable it if you want to use the APIs.
|
Available in the latest Windows 10 Insider Preview Build. TXF deprecated features included savepoints, secondary RM, miniversion and roll forward. Enable it if you want to use the APIs.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
> [!TIP]
|
> [!TIP]
|
||||||
|
@ -91,7 +91,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether all redirected shell folders, such as Contacts, Documents, Desktop, Favorites, Music, Pictures, Videos, Start Menu, and AppData\Roaming, are available offline by default.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether all redirected shell folders, such as Contacts, Documents, Desktop, Favorites, Music, Pictures, Videos, Start Menu, and AppData\Roaming, are available offline by default.
|
||||||
|
|
||||||
If you enable this policy setting, users must manually select the files they wish to make available offline.
|
If you enable this policy setting, users must manually select the files they wish to make available offline.
|
||||||
|
|
||||||
@ -166,7 +166,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to control whether individual redirected shell folders are available offline by default.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to control whether individual redirected shell folders are available offline by default.
|
||||||
|
|
||||||
For the folders affected by this setting, users must manually select the files they wish to make available offline.
|
For the folders affected by this setting, users must manually select the files they wish to make available offline.
|
||||||
|
|
||||||
@ -240,7 +240,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether the contents of redirected folders is copied from the old location to the new location or simply renamed in the Offline Files cache when a folder is redirected to a new location.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether the contents of redirected folders is copied from the old location to the new location or simply renamed in the Offline Files cache when a folder is redirected to a new location.
|
||||||
|
|
||||||
If you enable this policy setting, when the path to a redirected folder is changed from one network location to another and Folder Redirection is configured to move the content to the new location, instead of copying the content to the new location, the cached content is renamed in the local cache and not copied to the new location. To use this policy setting, you must move or restore the server content to the new network location using a method that preserves the state of the files, including their timestamps, before updating the Folder Redirection location.
|
If you enable this policy setting, when the path to a redirected folder is changed from one network location to another and Folder Redirection is configured to move the content to the new location, instead of copying the content to the new location, the cached content is renamed in the local cache and not copied to the new location. To use this policy setting, you must move or restore the server content to the new network location using a method that preserves the state of the files, including their timestamps, before updating the Folder Redirection location.
|
||||||
|
|
||||||
@ -309,7 +309,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively.
|
||||||
|
|
||||||
If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder.
|
If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder.
|
||||||
|
|
||||||
@ -381,7 +381,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows the administrator to define whether Folder Redirection should use localized names for the All Programs, Startup, My Music, My Pictures, and My Videos subfolders when redirecting the parent Start Menu and legacy My Documents folder respectively.
|
||||||
|
|
||||||
If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder.
|
If you enable this policy setting, Windows Vista, Windows 7, Windows 8, and Windows Server 2012 will use localized folder names for these subfolders when redirecting the Start Menu or legacy My Documents folder.
|
||||||
|
|
||||||
@ -452,7 +452,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office.
|
||||||
|
|
||||||
To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function.
|
To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function.
|
||||||
|
|
||||||
@ -525,7 +525,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether folders are redirected on a user's primary computers only. This policy setting is useful to improve logon performance and to increase security for user data on computers where the user might not want to download private data, such as on a meeting room computer or on a computer in a remote office.
|
||||||
|
|
||||||
To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function.
|
To designate a user's primary computers, an administrator must use management software or a script to add primary computer attributes to the user's account in Active Directory Domain Services (AD DS). This policy setting also requires the Windows Server 2012 version of the Active Directory schema to function.
|
||||||
|
|
||||||
|
@ -83,7 +83,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to exclude HTML Help Executable from being monitored by software-enforced Data Execution Prevention.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to exclude HTML Help Executable from being monitored by software-enforced Data Execution Prevention.
|
||||||
|
|
||||||
Data Execution Prevention (DEP) is designed to block malicious code that takes advantage of exception-handling mechanisms in Windows by monitoring your programs to make sure that they use system memory safely.
|
Data Execution Prevention (DEP) is designed to block malicious code that takes advantage of exception-handling mechanisms in Windows by monitoring your programs to make sure that they use system memory safely.
|
||||||
|
|
||||||
@ -154,7 +154,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy setting.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict certain HTML Help commands to function only in HTML Help (.chm) files within specified folders and their subfolders. Alternatively, you can disable these commands on the entire system. It is strongly recommended that only folders requiring administrative privileges be added to this policy setting.
|
||||||
|
|
||||||
If you enable this policy setting, the commands function only for .chm files in the specified folders and their subfolders.
|
If you enable this policy setting, the commands function only for .chm files in the specified folders and their subfolders.
|
||||||
|
|
||||||
@ -237,7 +237,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict programs from being run from online Help.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict programs from being run from online Help.
|
||||||
|
|
||||||
If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas.
|
If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas.
|
||||||
|
|
||||||
@ -311,7 +311,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to restrict programs from being run from online Help.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to restrict programs from being run from online Help.
|
||||||
|
|
||||||
If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas.
|
If you enable this policy setting, you can prevent specified programs from being run from Help. When you enable this policy setting, enter the file names names of the programs you want to restrict, separated by commas.
|
||||||
|
|
||||||
|
@ -83,7 +83,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether active content links in trusted assistance content are rendered. By default, the Help viewer renders trusted assistance content with active elements such as ShellExecute links and Guided Help links.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether active content links in trusted assistance content are rendered. By default, the Help viewer renders trusted assistance content with active elements such as ShellExecute links and Guided Help links.
|
||||||
|
|
||||||
If you enable this policy setting, active content links are not rendered. The text is displayed, but there are no clickable links for these elements.
|
If you enable this policy setting, active content links are not rendered. The text is displayed, but there are no clickable links for these elements.
|
||||||
|
|
||||||
@ -152,7 +152,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can provide ratings for Help content.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can provide ratings for Help content.
|
||||||
|
|
||||||
If you enable this policy setting, ratings controls are not added to Help content.
|
If you enable this policy setting, ratings controls are not added to Help content.
|
||||||
|
|
||||||
@ -222,7 +222,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can participate in the Help Experience Improvement program. The Help Experience Improvement program collects information about how customers use Windows Help so that Microsoft can improve it.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can participate in the Help Experience Improvement program. The Help Experience Improvement program collects information about how customers use Windows Help so that Microsoft can improve it.
|
||||||
|
|
||||||
If you enable this policy setting, users cannot participate in the Help Experience Improvement program.
|
If you enable this policy setting, users cannot participate in the Help Experience Improvement program.
|
||||||
|
|
||||||
@ -291,7 +291,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting specifies whether users can search and view content from Windows Online in Help and Support. Windows Online provides the most up-to-date Help content for Windows.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting specifies whether users can search and view content from Windows Online in Help and Support. Windows Online provides the most up-to-date Help content for Windows.
|
||||||
|
|
||||||
If you enable this policy setting, users are prevented from accessing online assistance content from Windows Online.
|
If you enable this policy setting, users are prevented from accessing online assistance content from Windows Online.
|
||||||
|
|
||||||
|
@ -89,7 +89,7 @@ manager: dansimp
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure a domain controller to support claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure a domain controller to support claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication.
|
||||||
|
|
||||||
If you enable this policy setting, client computers that support claims and compound authentication for Dynamic Access Control and are Kerberos armor-aware will use this feature for Kerberos authentication messages. This policy should be applied to all domain controllers to ensure consistent application of this policy in the domain.
|
If you enable this policy setting, client computers that support claims and compound authentication for Dynamic Access Control and are Kerberos armor-aware will use this feature for Kerberos authentication messages. This policy should be applied to all domain controllers to ensure consistent application of this policy in the domain.
|
||||||
|
|
||||||
@ -185,7 +185,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting to resolve two-part service principal names (SPNs).
|
Available in the latest Windows 10 Insider Preview Build. This policy setting defines the list of trusting forests that the Key Distribution Center (KDC) searches when attempting to resolve two-part service principal names (SPNs).
|
||||||
|
|
||||||
If you enable this policy setting, the KDC will search the forests in this list if it is unable to resolve a two-part SPN in the local forest. The forest search is performed by using a global catalog or name suffix hints. If a match is found, the KDC will return a referral ticket to the client for the appropriate domain.
|
If you enable this policy setting, the KDC will search the forests in this list if it is unable to resolve a two-part SPN in the local forest. The forest search is performed by using a global catalog or name suffix hints. If a match is found, the KDC will return a referral ticket to the client for the appropriate domain.
|
||||||
|
|
||||||
@ -256,7 +256,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller’s domain is not at Windows Server 2016 DFL or higher this policy will not be applied.
|
Available in the latest Windows 10 Insider Preview Build. Support for PKInit Freshness Extension requires Windows Server 2016 domain functional level (DFL). If the domain controller’s domain is not at Windows Server 2016 DFL or higher this policy will not be applied.
|
||||||
|
|
||||||
This policy setting allows you to configure a domain controller (DC) to support the PKInit Freshness Extension.
|
This policy setting allows you to configure a domain controller (DC) to support the PKInit Freshness Extension.
|
||||||
|
|
||||||
@ -331,7 +331,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure a domain controller to request compound authentication.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure a domain controller to request compound authentication.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> For a domain controller to request compound authentication, the policy "KDC support for claims, compound authentication, and Kerberos armoring" must be configured and enabled.
|
> For a domain controller to request compound authentication, the policy "KDC support for claims, compound authentication, and Kerberos armoring" must be configured and enabled.
|
||||||
@ -403,7 +403,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting allows you to configure at what size Kerberos tickets will trigger the warning event issued during Kerberos authentication. The ticket size warnings are logged in the System log.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting allows you to configure at what size Kerberos tickets will trigger the warning event issued during Kerberos authentication. The ticket size warnings are logged in the System log.
|
||||||
|
|
||||||
If you enable this policy setting, you can set the threshold limit for Kerberos ticket which trigger the warning events. If set too high, then authentication failures might be occurring even though warning events are not being logged. If set too low, then there will be too many ticket warnings in the log to be useful for analysis. This value should be set to the same value as the Kerberos policy "Set maximum Kerberos SSPI context token buffer size" or the smallest MaxTokenSize used in your environment if you are not configuring using Group Policy.
|
If you enable this policy setting, you can set the threshold limit for Kerberos ticket which trigger the warning events. If set too high, then authentication failures might be occurring even though warning events are not being logged. If set too low, then there will be too many ticket warnings in the log to be useful for analysis. This value should be set to the same value as the Kerberos policy "Set maximum Kerberos SSPI context token buffer size" or the smallest MaxTokenSize used in your environment if you are not configuring using Group Policy.
|
||||||
|
|
||||||
@ -472,7 +472,7 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
Available in Windows 10 Insider Preview Build 20185. This policy setting controls whether the domain controller provides information about previous logons to client computers.
|
Available in the latest Windows 10 Insider Preview Build. This policy setting controls whether the domain controller provides information about previous logons to client computers.
|
||||||
|
|
||||||
If you enable this policy setting, the domain controller provides the information message about previous logons.
|
If you enable this policy setting, the domain controller provides the information message about previous logons.
|
||||||
|
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user