From c7c7b0cc7f313a861dc3f814bacd4ff81e0b9923 Mon Sep 17 00:00:00 2001 From: Daniel Breedeveld Date: Mon, 24 Jul 2017 15:20:03 +0200 Subject: [PATCH 001/115] Update microsoft-surface-data-eraser.md Just a very small typo fixed --- devices/surface/microsoft-surface-data-eraser.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index ef8103d135..cfda08e435 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -34,7 +34,7 @@ Compatible Surface devices include: - Surface Pro 4 -- Surface Pro3 +- Surface Pro 3 - Surface 3 From 1f6447febad131ac9c5dd7dc0bddd8c78b97d80c Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Wed, 13 Sep 2017 17:09:23 -0700 Subject: [PATCH 002/115] update default options in ep --- .../customize-exploit-protection.md | 57 ++++++++++++++++-- .../images/check-no.png | Bin 0 -> 201 bytes .../images/ep-default.png | Bin 0 -> 14180 bytes 3 files changed, 52 insertions(+), 5 deletions(-) create mode 100644 windows/threat-protection/windows-defender-exploit-guard/images/check-no.png create mode 100644 windows/threat-protection/windows-defender-exploit-guard/images/ep-default.png diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 86c947101d..0567af3379 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -50,7 +50,54 @@ It also describes how to enable or configure the mitigations using Windows Defen All mitigations can be configured for individual apps. Some mitigations can also be applied at the operating system level. -You can set each of the mitigations to on, off, or to their default value as indicated in the following table. Some mitigations have additional options, these are indicated in the description in the table. + +You can set each of the mitigations to on, off, or to their default value as indicated in the table below. Some mitigations have additional options, these are indicated in the description in the table. + +>[!IMPORTANT] +>If you add an app to the **Program settings** section and configure individual mitigation settings there, they will be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work: +> +> +>Enabled in **Program settings** | Enabled in **System settings** | Behavior +>:-: | :-: | :-: +> | | As defined in **Program settings** +> | | As defined in **Program settings** +> | | As defined in **System settings** +> | | Default as defined in **Use default** option +>![](images/check-no.png)|XX|XX +> +> +> +>- **Example 1** +> +> You configure **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. +> +> You then add the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)** you enable the **Override system settings** option and set the switch to **On**. You don't have any other apps listed in the **Program settings** section. +> +>The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. +> +> +>- **Example 2** +> +> You configure **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. +> +> You then add the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)** you enable the **Override system settings** option and set the switch to **On**. +> +> You also add the app *miles.exe* to the **Program settings** section and configure **Control flow guard (CFG)** to **On**. You don't enable the **Override system settings** option for DEP or any other mitigation for that app. +> +>The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*. + +Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On". + + + + + + + + +![](images/ep-default.png) + +The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults. For the associated PowerShell cmdlets for each mitigation, see the [PowerShell reference table](#cmdlets-table) at the bottom of this topic. @@ -89,10 +136,10 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi ![](images/wdsc-exp-prot.png) -3. Under the **System settings** section, find the mitigation you want to configure and select either: - - **On by default** - - **Off by default** - -**Use default** +3. Under the **System settings** section, find the mitigation you want to configure and select one of the following. Apps that aren't configured individually in the **Program settings** section will use the settings configured here: + - **On by default** - The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section + - **Off by default** - The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section + - **Use default** - The mitigation is either enabled or disabled, depending on the default configuration for Windows 10; the default value (**On** or **Off**) is always specified next to the **Use default** label for each of the mitigations >[!NOTE] >You may see a User Account Control window when changing some settings. Enter administrator credentials to apply the setting. diff --git a/windows/threat-protection/windows-defender-exploit-guard/images/check-no.png b/windows/threat-protection/windows-defender-exploit-guard/images/check-no.png new file mode 100644 index 0000000000000000000000000000000000000000..040c7d2f6362b5dd9013b55be714357696838b97 GIT binary patch literal 201 zcmeAS@N?(olHy`uVBq!ia0vp^0wB!61|;P_|4#%`oCO|{#S9FL`#_jcJgiLwC|K?3 z;uvCadhO(kybTIGF7a~?1WFtglsG7O=SZN;!9baZe;Qj{7KZLXgIY5R zJvMMSN#0-;nj_{S5d2n^gTsmIM3cy~n!czFVdQ&MBb@079rq0wSd#N=PFhUD6GT2-1y!fQU4k z?mYMYJfx!QU{>6x8!KZ*hY?r6<64F7C!o<_LYq3-smJ|M_w&XH#2axYP+z-BJ++ z!&lM6n#NA{R`$;jEffnOFoylF`(2$(%@KPSL974!GI0kxJ9B#%#C~^NGmK%OFH^H} zu{B5Jt`9OG5O)wykz#5d$*3t`CADX%?3?V>3nfLdm!02}Q&3LZ^W=43qDOt(U*RL+ z;YxUo=`k5#nGik^D^2k57LVpt3%xN{kFMh9KXB87@0&Eu@rR3%6jQT%I5VW+k ziRBm3OE@Cp=Xc8I0}({}vU6--1|+=C=lPf0?%fw8fi#FEBaGi;r1{2rTkQvHstk{`R`h#Y<) zSTMiX;`2S`I-jLE$0%vszpYVX@L+MK!PD7be`ah9JHG2mT3=40p}Kl-cefm(C5)Is z$SL#Hkr8%qx5GtDmTt?g|)hWvN z94j#-_|UU}c=4idF(N7t{`E^QL1((w`I(+;-SastQg(ya zZ4qQ$sk57#58+O;aQR{7tT|>D77k(IVrFq~+|0~Ov3bib(q_yTUGpkM1@elkDDi{^ zwYYlcMTJ^}LX^{t@4*-A%1*23Q9;MwFKiv=IX|btjvIM+kn`IAdOIYOafYl<5%$%I zi-%3c#K!M%mGE+LakBuCUUzPM@KxD>WrdZ#!pzKk32~{hvGMtc)b4$x z!%yo9KG&vb2=m{~fzWB6M0&Q6Xw-YMNeMt+~E4oTr-aG&DGPiG+kCzY2FOX~-tNqJoQG zakpgeZ`D>gwwGri4QL&m$$M zkSPrYCBL!@3S_C%s;ZavyfCe-tOAmglSMT(HPZ_USl-6P-Cw=c)3h7vy1TGkS?Q)- zD5Q?!zjnEae5XL(oj>od?~;oFp>|u(=*WE#!xSDdj{@$2HPKxjPZC4 z35nqR6!8&;VNT_yZK-kU=-#joB`H$K9Xeyo*srw*)7}`}*;U8K$D8Z*8($Z9jLpn0 zBODjHZ;c>s7KxnB67adLk$-P*pLME5AZYv!jemZTn+T98&?tJ>TwPU_k)Dp|6Wqat z4gPy4r7NBt^M#x^i|^Uqm{V11l7)0B+I_U8@fBicPy zHFfpbU@`-xqMcz?#UC>zdbO8~c<9*&OTQNBR&Rd2&VJ{?1H6r<6E^VFt;v~l4R!yt zK5RgX2?m7E-iT)YaxH$$Z5o=8aa&0@x2j}@;ymZY-nPb)lBQ#3%YJ1p(g!+Oi5mE7 zgZPONE(+hy9j59?oP|Oy?Mc;?NH%1?SAsDB~_P zWT9b9O-(Jms*1FvVLRNuf2gyk2k({(*#n)I;9tKQJc;3Yd>y})VWzC??ED3x4bTYcSy6Ob?5v4B6Dv0t8A^`z``OuBP%NySXj7tKQgHuTE<F+@!1SGJ?;Sj*j&y@`)bS6u9vD&6M`p1dnm7< z@aorkh{);P#{vQaqoY^=6#M&bwXCo?baZsaj|e4ez>mN~9tsPyc^8=6P&GC-{x#2L z*hJYLMH6MMAJU2e_Y@Zwf7mBnP6ns)M<4|Ef0}Z{$|9ZPOVhoU2kH3}T_NVAq@=(p zZFTV5p%}N(2AmZ>+f}`F$Iy3AUHw+ZqVu0`*I0F{aHE8ebJw0$RaVXl%p66oyrQ!6 zeMu$Y_PZqj)3H`>359BVuP7Wg*B&)jyO`SgNjBc7e0+1ei@kN$@%Q$8msX`U37bJf z=)iz7AY_Y0`Rs_MVcR}x^7+xWx!~Tg>LJR(KO!g93kM#=2oTagI2dT&6*mj_@_B3; zDK!FknNh%&V_k9hOrVVYyqniyIwmu3QPt0{$r`!({S5_&kkA|686RRyOiYBuP~M-P zfKO`e!~Oj)j*q=!Vq(xvh1fhl+33PfuncusX7@jm)obujJ_uNtk2n0jHP^1Jr}w(i z``{A7z;m7?>(i%?fUoOw7rpLHm`3}?3X?&CZfhTW93Mlx^$||9e@rFXUujuBu9mmr z_^ov@GfMcj^I4c>B+(WvSz-XWMY(pQhx)cxBOn!5;LI&dOv4k6fSf%> zA*6dHgf$~LotsBK$_H$3I0Xe?bK8tUR9LFY=?`Nh4`Lp$yK~MLBJJ510-4V5t#%qI z06@wRQRGgZa_6hlg`J^YikemsK0>UW_vwq^45C*yT^#Fq`b09AzCH=ISl4#(V=;#s?1`I8m85 z#+(e;vk&Hc>|9@79(bUdS6GNk9fb|Sr>r;Qz=0>p+?%nBGpT12ZsLqVjSLNCK3Fv+}zxF=sg8YZb`} zQG13UmR+J&ZPTH?0F^uiOUX0y@rfOERaMNKp|J1Yzo)MXPB^o44%91T+KE(8QmH*d zc`C2Vj^9Ur|4zvRk-B?~D>(HMkXaJV~%3;*hrD^0LY5!#FtW5B^@x!PMCJMb$0$AoLQIz~djI69`@+@7r zV+uMG$MEoi(MHGFCwlGqMdezW-hP#+;s*TK6QV^?+mc3$*or-()$lqnK7F5Xm03hL zdUS+%{dVNAU+4bdN#P2rx~}eVZqE~63tD}{tvKTKosU9njaKH9Ob40nhD0%A3Rycv zjlD2qOtyGgd#SM4&D8v{)!?CJwKH+^kk-5YH00!>s;cjkryD#U37;RDBFZmJog5u+ zw5$;)LM*SrLky3OcB(l;MPZ$gYBN?GtiSH^SbYOKA|k?dQRHN;9AS~RIc3kwN*YlZ z^26-ig~&~WLaJccRK0uGvfX6W?Amy_@#@D4`17qf$<3Ppym{x#^;-6v32#$V*{aEg zW+y~p6TQAW;qoNOSLrG%6ADrjAdt2>((Tl5#ti-S2zBb5nWQ^(KT@5!&t3fZBGT3Gvx?TM>V+ZMe0_#i-`rS zcqvuc7#L7zXJ;dj!ZQ=A-4ISrk9M3MkAHvp%Zg}UK|MioWn)9rw}sl{H^x!@%tkyD z>s=ussuo*OL6@Z)slNN#$%39L({inL#0BT)e&B= z)^8mt(EM!D7XJ1mB{4B@%3ialT#HqC>;wXaX6&bA(qeOkN5wunB zsT)lj^<&zFg@lSI7{B!h7-$yjg&ne0XJ<p_m<^a7Ft#cIY5(wnHmAbZq2_2-NM<1Ex*HEkDiJ`CRxB24Atd16``Wi`e zPKAcxBl0mA;2X=xOulj4Bq0g5%aM*_)efwl@zYhH7|He;Eit6wvP2%0l9edvRl2-lDkm0?rRu%5 zwl+S`?W}x1S|K~G#yRec93>^C7w~Y;2Rf{z>PAj{lx4mECMy;XglVAkU)tCps4q@M z&p13hTuDbKe0_brrfQ6H}J%#q&_&*GcI>%9JE+!p_2x(q&$jc0qaVk`{t z{I>06)ti}l#Y@+P&t$W*cy*HBwSE*2q1|75Cjm46N!TsvR6n)pA&8s%)Z|N!|MGe^ z)!l23YNlm`K~7-(-Nq^;vDMfl_f_eNcp_{{dV*~KfBHka?Ehuw=fBr1di(NJ>faN1N~R_h;`ZlFxOqMe9iPpZ(VuSbS1}}=8`G;V>#dySCSmM1 ze9GaFv$)F6HV1zm9!GRJvqgl42GXzf-TdCFU5}L~%lUc!kXOtY?)Jzux#hPR)%+zW zs!-Yp_4=Ux;Bj=_J>shUkCQ6rV}^RK%H6naQLS3L=^O+MNThpt*0uapaRKx-ZEvL1 zcgi)+t|A@|E4xnyDrTIHRa#*Q&}Q6w$F)2oQWr(*?_0E9R;VuWbkEg$ z!e;Lh)$Gtr`Lwzuo-RAV5Vy`F2Q}8~G6WavjS4V>m#nh27fP#42RVA}V6MLlO&iUW zl={hNc5`f=UgOOwOYFuvejCjT^ZJojp9aE0*DanBs!5dM#!qw4m$b#Fz3H&JSdv1# zc+k#n+O^fS8Rd6#D`mO)!iIZ$Y^>And`XxYbC9krX)DKHG4gmlyGLvHH)m}m(}g$Z;p9Zfru3GDpi09n-AKdpuAo-)5sn1j zM%*!Wo?xMDrSp9$_0md$3v zQS4;Ls|TE%h@8=%@61GEAj&S>6L5!H)=oM~nh(q6L~PzPjJ&2fopboR3wzT-*EX{o z*L*mq-L04M(tMKrZ^Opv=9NP!5gh)vmIFauYOBwL&$*h;|MVG0!I4-{9Bfd1!|jp9 z_CrnnV()DE@buu>SNol@i=nK<^MW>lA7{dc9XM#yKJe{Om%%Q+PfJ$0^3+wIz00n` z^+wnE$%StunBv@RrO8nvEfBR~5Ee?r&J?&}_(|xhQI$Ix^OZH4GseFHW3@{AZ!Z=$ zc>b)=2#by8)6Ak*6qc|j&sOz(B0WHJHZ-P;yr_W8C@hrm`8(RP`lT=C9$6lbBxmf$ z^v}WNJ}-T7=sRNJzHpr?Nj%>!CsdE(-Py|7k~$c8E2M1h8{jZ~<$7o8w&4Rm=~#ux z?~BbMK^qsl@nxqMO-I4jo-6OV(@j6rKE5?192&~#2kwB;QidW!?>twy=I(T%z)a$f zu;jFL9L5eD3{%)!^$mAeHlt3%>wOMf9^{pIv3f$WxpARWbo*geJ6M!oCk)QBAkSXlRZz8m_lWHM<@w+D8#z-d3t+O! zwd>3Nhayf#Gv~QDX&2|OS^FB6%|C39y((G+e>J~Fi6MvN;zjq#AI=B}xvx|D&3hX) zx!Z)!G>(P!`TO6`cK?WsN%niULyvR)IU4DHkR=lYB=^Y0hO=dX~OL7}0f=~*%t z_urMf;i28-p@SFyUw758(53b7>9;=#pf+%b38S|@od0)P>i@>2YbU8I&BCq@8E*2( zo3VYuC!7Q7>GxVw|LcDIe@5kZP(_T4+~ww0-^*-YcIlj_j$*LX73y?#h=Fu| znMmktAX@(Zy@&YyF@*Zv>d~2>nYnq7qB$NH2S-4q&Dj0A+eqZi;H>35H+Of__DHI_ zE?XW7u;lla$8VR%(ed%vh>orcI>Jpkw-^Ij*nC7T+4Ne zoCM~Z;8eMx5%6uP7VF(HCT8ZZ3~4@>l6qc!{>*`Bfo`p&l+pa)Go2Blc@btF`;DNll?FAPCtCZQicDGeJ?y^r>Nnn2?+^^ z7w`b6TCg1&_ec>&L)r4=l$0^6UV_xHoXc1zKYl!g{mE=@Hta1Qw`F8zRoG&N7|d@-Ul-gCh}{wUif*AvN2y z&dJ9Y+D_wtTD2x3AfS70Up=|?gCPy^LH;Z*Hnt~kEhB?=#L{9b6YqPV2Lbaa@v<&0 ztxQAK)qI#^=_Jb1#%4&r$^YW~t<_I0@RgC>gh$WR8oTf)cz(a(oqo|iC#I~d-0}OM zU!1_$#DtddO@SOulHC0f7cMMpZ1n&&-I>C|!gSA_kuC<>x=DHor7ITLBd`-#c%9?T z{vv2U@N(xT)2+6TZI0Ne0y?MDlh(1iveFoq^lld+W|H52d0O5|KCUBa#1+_XvG$u* zE@ewhHmldW_kAvw)6SVz%8;aYh6VHh!3+j3t0T6fco>@%w!c$2yp)gsE_2EeHax5b zyal>KE~~a35B%~)?1*YyY1(s<>UC69LDR8G^`!dh>&VFb(Wl^_uka|I#Ep-P&^MdB zhb%AVoFpjq+qQavMljW1`oQMHV?yu;c69G)!8>QMH>I_eKtyn+p8NIE*;Hh+BNBPN z{aKpttFK?b0zkc!9()au^-a^9Pc$?%w1QmC^o~kR2muX`nbJ+*1hrw{t(<=-`q&$) z;Hd#8sMGNuNx%OLGXEF1yt|(p7awnWaegMY!@$50otPN@Q zDV#n}ZzbS9ae`Lt?gf4oClHG1_X4PcU23OP!bq>ExaqyW_9cS7DL1hhAmArzzs9R4 z+RVZNYPQVA#;MJ+uu%IP0nS|Jp_qvzzZ&!C&OzCf@YLi(LMvH71*n%0qEM)B@9ema zX^wsYG~T-$)lOU{1$8PE4fb$oL*x_uwtq0dDUgmjTsts9Iw__cyOv;*H9Ayy2ry~0BSn+X1rD(jBEo;{GFfwvAf>gjr%X)y7q6ND_`zLL$#>4w*V~7-{YyN zsprj$$q5MoQ}!WK_U!;aaO?)8Xl9|8Nua9%cnlVq2?dNB>8YvRbfSpv)o5awuCyU@ zTl*ORK?CjmTePW?S9s(xu+f`3O zf17IROPiICkDwWj&MtF(T^+arafKiY3rn`|ILd9D`d>#GifQGdonCwVqbNDU2A;fvFq5BrM97-@GsrK$2~1ce$l{Y%48lXY?B9gf$z+H^PpiSQcYRsI4~ z(A|d=E$)CM%+AmsAzanc)MQw{`0j>4kkX;G0Am~L>)+?Q;xk1=gV6KH%gg&&VWs+0 zObw>b5nIrWix72lbL$9s1uG72d54>un-L|CjCsBOA)WcsG^`n;x88)iSEpL>p>nps z+($Wvh%^YR41bR^p4}g737^r4B%u$W7UaFt6 zPuualL#uNY&Rns6Jt>Xvu5$k=)Sy!bej5!t_z>Y)y(57&ADR-r*|=A^fhaF41F|h4 zw`X==vXI}BKq--T8F z>%9oveGN4ZQjzL|Z;et_$l$kc$gffg#Ds0MR)N+4qx~%z;Co;zNfM9UyPXO;uQma( zMwAe>Vu#ohXbEhiCaViZ2{R32SNT$UOEDc|f*g_+a`G7%y?iu{j$;lK~P01X`QX0Nm*koCZa|ZQ|X%y`EX=4#u@SBEq(1;JJcFtl_5( z2qyI|$gu#z`+xonjf})!`}rADz-_H%y!@HzL_4vf;N5DH3yf6=dof)X=NlK)K<2@A zAO0c;U3d*_3L`$K7J!OjWM`N1^yK#urcp=}eh|;DQ*jmXd*=vu#vM4>)5fwgBE+Bb z=58}qbl>C8=BnYvZN%n3obX2Tg|Odd5Dnr3o)1v>Xthbx@d``Bb|;HgqnB&wnDP5}gUChrpGRT`DK=aXoZe@IYyrZ{QQb9qX-@B)& zNw}h_>g&9daZe&QBNJ1Yr&4s+{1abap_SFu=b)vSRrEi8pPz$+2o4TD+#OO}^pWFo zM+CeFU_%0_TzeJD9NFo5Rb_$VXO z(|uM)9{@4d_WYh17cf&9L2cY$9mDk{oPgNrCd`~=Mux#;LHTWoK|gt^FgyY&zj%0pkNre)fN*VW=*w|Q)`B=^V;o+CisQ=+!kmh&H1TOblP%fMp z{9PFr>2(0C{Z*a)IhqS{XaOI_`yY`VHI4uacGOg!k#UK=`P8XjG_$u?VZ_D8#-^jC z4xTHx)BWgh(f|AzP_Ag5QjO=%eZSK=n!cl-mg|R#onfI*q+j`~7^tXRLXeY_OFPP6 zl{Qk`gVQTJTnzn^tJwIIEjej^;nC62NX_7L+PgyP8TI&8J}S5t$*M#H*d9&o%C<+tps zy}t~H1=dd4f9SD5lrLsON>l7)ZEgK~&ugw&N?smMM@Ppc9&%@Gsf>EDCxQ9nwi;(I zk42~D8w}Xty1y=BVi=N=l17{f3zgKgZzEs7POquas$^Amm5BjjZg+S0Ufu1xBxGdl zq3mbP=f|s-mX?Tz6v#Qeb(zkP%cwKpGCY0VG`AWW=22c|YoXY3fQxN9ZXbjkHWdfo91x zx7d5q;(!1QK1zK4shJt}4KgUOASc)k$ocpYLm@}C@@ybeYQEV7^99(KOFez&Cjt%h zhuqvGWe381eB@kxt9vGpN7|0l_A_nxF7~CxciHhIB{w_G%S>ShE4f0L3TmBwJ1Ibk zuP*9fZLNZew@8sg$-p;1q@6qcY7!NvSlgK+V@_4U)Ni?h z)ckyvGtJW#C8l#4XhfdfO02j^&Tsps1@3Ffhd75MPVw( z);tC2i^Nfh$z;{l#zqNOE{b{TO}LolI_Ldj8-DMrt(_pJyIMq+_h4djvb8Fw%)Zl^ z2<6H;q3yXIgJRn+(u}L|+p{boGf(JryI$E?hKd>L>p#To4;%P%ZZ1kh!*0WoZxhW$%Q+L^66n88JnIGRafwJ zvPkEu^GF|FQIe=WbJ3Y_UK-Hh|Nj@%#(WB_PMJP zp2^V@x=%e%O$6pWiBCW>61SI@nyN7(o}8nUh9@-PrkP6o32q;GCP%3W9Bu!ziFv1G z>iT^hc7RJyUvA)V`$Ecmo_BZdd@ORevdUZMV2sk%CY%2(peL8ewJ4tTrN#~cF+?o|wX;(FH3r4h zZ|hU_^8f?^>l~7@73Cf>r0oYkO{0u~)3OvY+Go<+O~%5)Qqt9Bi3cEPHTm4JEWOB? zD5eT!!S(^DG`eCY^(MZ8hs|wW*7qOKYlp3L@-#3=UAf)e)pcElj(HVe)xzg=tKE1t zyU`$K%sp#gqqD2){n$@vngDY%-_#BznEg~;>7J4o2oNy3{Yd}Ce|EiHZ93bZgeFFK zzMgXAVPRE8#pOMfE6@GJ_hKa2HGDK4kVe>N=L0PSw3X8_@JIP-m8oDssE}0jU7}lv z`9&d>soS@2L+H54X@geWsk;R(*o!r&J^*S7vUs3lKGql4JO_@wU;%g{Z2eplee?cN z*|Dpgz6SMf^4Z1TqW1OQXtC?*1J9O`)Pym-EZJDLr`PC30*nk^BF!>YWNKa>(=Y#v zv$~U-l$hn_@82c)XEqM#*x41`lN=WZ%{V{S*HeJYK97=4mDSaQujM6|aHeXP(UqES z4NnE&%eU_bIgCAVabqQrM1Nb+DUW&j&dC{{_kJPsl;zEmu?Wy<bqxRm3gIg~L-n&?=eJ(uZ}}bIf}N{A%gAZQaJI+R5Eiz$A0=@O1jNt5n0EXeu)MEc!WVwpMky`u`3>jP%ycR`FV#wlLZa4>l%Po!GsCh0zZ z&H<&#%CgtN`V_~fnU}7sqj`g21|_^J45(TqVFV-QN}cPfnvf<$Mlawr^_U$BKZj;N zCMJiCRMJ>9 zi*ak^vr=972J|8fO32*m^1iAt9ehBAg4~JPyt*vo@om9S3+>^u$ z?FpeJ9sJmE*ZL_=Vlw%u3W6nQ%x&5EDrNVR$|;h3@ZC_+(72!W9W)3()g;8lgH{AA z|9t=S0Q&>gJDQ&Nd%&bp#AFPwVgwfyaB}DUx`5pBAE}P=w55d6!=#?vq9Qz*fxUx+ zg3f}XqBkrzNXf|N0DbZaYao1c#1pRy3p{?Tw)phdW}9lIQvzqv?G-&ZU3f5wUR6I| z+BmOZn+RwL!WMj8cFCx(7hv?TS-tPY`q`j8npM9}ZA3WQ{*TvKTCRB3{;1d5=XP|3 z0LdW6hem~*oE-6{=^Gm-AR>a6F^|JE<=*rC-QAaKdrVRELPEa1hSvxD@N&Q>dF}Kd znX8{Fo?O5W5$6rcYB%GA-1pv+jz-gl`{R`S$6=d7i>5X;l+j3|vUYf( zX7z=Mg{8H`Z;!=qiNiayLD&9;;D!r>*285(+TTexg&hjr$v_h{grLs|wif#Yoa>xh zy}DJNC06)AN={A9VO8@OLn49P#XqWhxat3k1poiO8#g2KO@V+~@I&Yn)Lv^xi)o5z za<&wz7NptRm%D0LgfWN)p0vHb-4-PDKX^^xor~DWtRuR_+{?@!H znrxeOY?*cZ_HU-)7L0qIB7uE*N}>kA64d6AqId52gQVXzX!cQ`V9>{pcOg{(S?KN7 z*4Cx9wU|lz>mjY6iD!mkNYu#$yl!=}lq|6o6c)bh zTWke6JV=ktHoJfP5VN;uqr}Hf^<21h=+l%tmRarY3_*hxy|PgKPsTm?-*v1l?-T26mugPVUR_fUMN9 zeu{9+xqb>JnH+L^V2Y6`F#jqM1Oxn9s2tj$;cfQf3Ib%R5NAGSW@5tpI)3~J`yii%E$yq5wHP!&S;2;UvDwq^@$2ucArxk|qpBS`Pev;#yDPzdVvhtxuVgj&=o1%U6C z4`u)YidG#E{#va;q5h;8-g6+~$qgBT;tv+Twgev6rj9@Gq#u-_JBxiGc!l=W6p%aGlyS3oRA?1HSyWp$3S1#fjcde)0(A|`CB_+#xVb<{Hx z+M;;Kum2Is)l$rI2wS4){Kpa|ra)^qHy)@oOQBkvnuixF?hciHPK4}F{-WLgG=#au z?pF;VHUafFm@l*nJAPM#kQ$sNovV0z84RRii)YC`h8j)%&d4Y)^tvsny~|v9iT<%q z73?!|Q+m@ik8?X_2-+~--CyH-u69V@ba&oW2Yn>`1*G3fJx@H1AX14ACf-muP|SRhDt|>abwX2PfkwS zbfh!V($8~R;rxaOAz@E**6m#AX;r-C_)qUDNk5Ug2xr$M20r83PgOM4D*fbK t?k*wWKuYNU1i$|Oc{A#N1k0!Xwm1v%3^q3c;bk(!QwarR@e`xK{{<=GoLv9_ literal 0 HcmV?d00001 From eb64ac3b3cc13be229ba789b7f925eb67ecc8ff4 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Wed, 13 Sep 2017 18:12:49 -0700 Subject: [PATCH 003/115] further updates to using add/set mppref PS for ASR rules --- .../customize-exploit-protection.md | 85 ++++++++---------- .../enable-attack-surface-reduction.md | 19 +++- .../images/Untitled-1.png | Bin 0 -> 193 bytes 3 files changed, 57 insertions(+), 47 deletions(-) create mode 100644 windows/threat-protection/windows-defender-exploit-guard/images/Untitled-1.png diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index 0567af3379..ae69caa22c 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -53,48 +53,9 @@ All mitigations can be configured for individual apps. Some mitigations can also You can set each of the mitigations to on, off, or to their default value as indicated in the table below. Some mitigations have additional options, these are indicated in the description in the table. ->[!IMPORTANT] ->If you add an app to the **Program settings** section and configure individual mitigation settings there, they will be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work: -> -> ->Enabled in **Program settings** | Enabled in **System settings** | Behavior ->:-: | :-: | :-: -> | | As defined in **Program settings** -> | | As defined in **Program settings** -> | | As defined in **System settings** -> | | Default as defined in **Use default** option ->![](images/check-no.png)|XX|XX -> -> -> ->- **Example 1** -> -> You configure **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. -> -> You then add the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)** you enable the **Override system settings** option and set the switch to **On**. You don't have any other apps listed in the **Program settings** section. -> ->The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. -> -> ->- **Example 2** -> -> You configure **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. -> -> You then add the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)** you enable the **Override system settings** option and set the switch to **On**. -> -> You also add the app *miles.exe* to the **Program settings** section and configure **Control flow guard (CFG)** to **On**. You don't enable the **Override system settings** option for DEP or any other mitigation for that app. -> ->The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. CFG will be enabled for *miles.exe*. Default values are always specified in brackets at the **Use default** option for each mitigation. In the following example, the default for Data Execution Prevention is "On". - - - - - - - ![](images/ep-default.png) The **Use default** configuration for each of the mitigation settings indicates our recommendation for a base level of protection for everyday usage for home users. Enterprise deployments should consider the protection required for their individual needs and may need to modify configuration away from the defaults. @@ -103,12 +64,12 @@ For the associated PowerShell cmdlets for each mitigation, see the [PowerShell r Mitigation | Description | Can be applied to, and default value for system mitigations | Audit mode available - | - | - | - -Control flow guard (CFG) | Ensures control flow integrity for indirect calls. Can optionally suppress exports and use strict CFG. | System and app-level (system default: **On** | No -Data Execution Prevention (DEP) | Prevents code from being run from data-only memory pages such as the heap and stacks. Only configurable for 32-bit (x86) apps, permanently enabled for all other architectures. Can optionally enable ATL thunk emulation. | System and app-level (system default: **On** | No -Force randomization for images (Mandatory ASLR) | Forcibly relocates images not compiled with /DYNAMICBASE. Can optionally fail loading images that don't have relocation information. | System and app-level (system default: **Off** | No -Randomize memory allocations (Bottom-Up ASLR) | Randomizes locations for virtual memory allocations including those for system structures heaps, stacks, TEBs, and PEBs. Can optionally use a wider randomization variance for 64-bit processes. | System and app-level (system default: **On** | No -Validate exception chains (SEHOP) | Ensures the integrity of an exception chain during exception dispatch. Only configurable for 32-bit (x86) applications. | System and app-level (system default: **On** | No -Validate heap integrity | Terminates a process when heap corruption is detected. | System and app-level (system default: **Off** | No +Control flow guard (CFG) | Ensures control flow integrity for indirect calls. Can optionally suppress exports and use strict CFG. | System and app-level (system default: **On**) | No +Data Execution Prevention (DEP) | Prevents code from being run from data-only memory pages such as the heap and stacks. Only configurable for 32-bit (x86) apps, permanently enabled for all other architectures. Can optionally enable ATL thunk emulation. | System and app-level (system default: **On**) | No +Force randomization for images (Mandatory ASLR) | Forcibly relocates images not compiled with /DYNAMICBASE. Can optionally fail loading images that don't have relocation information. | System and app-level (system default: **Off**) | No +Randomize memory allocations (Bottom-Up ASLR) | Randomizes locations for virtual memory allocations including those for system structures heaps, stacks, TEBs, and PEBs. Can optionally use a wider randomization variance for 64-bit processes. | System and app-level (system default: **On**) | No +Validate exception chains (SEHOP) | Ensures the integrity of an exception chain during exception dispatch. Only configurable for 32-bit (x86) applications. | System and app-level (system default: **On**) | No +Validate heap integrity | Terminates a process when heap corruption is detected. | System and app-level (system default: **Off**) | No Arbitrary code guard (ACG) | Prevents the introduction of non-image-backed executable code and prevents code pages from being modified. Can optionally allow thread opt-out and allow remote downgrade (configurable only with PowerShell). | App-level only | Yes Block low integrity images | Prevents the loading of images marked with Low Integrity. | App-level only | Yes Block remote images | Prevents loading of images from remote devices. | App-level only | Yes @@ -125,6 +86,38 @@ Validate handle usage | Causes an exception to be raised on any invalid handle r Validate image dependency integrity | Enforces code signing for Windows image dependency loading. | App-level only | Yes Validate stack integrity (StackPivot) | Ensures that the stack has not been redirected for sensitive APIs. | App-level only | Yes +>[!IMPORTANT] +>If you add an app to the **Program settings** section and configure individual mitigation settings there, they will be honored above the configuration for the same mitigations specified in the **System settings** section. The following matrix and examples help to illustrate how defaults work: +> +> +>Enabled in **Program settings** | Enabled in **System settings** | Behavior +>:-: | :-: | :-: +> | | As defined in **Program settings** +> | | As defined in **Program settings** +> | | As defined in **System settings** +>![](images/untitled-1.png) | ![](images/untitled-1.png) | Default as defined in **Use default** option +> +> +> +>- **Example 1** +> +> Mikael configures **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. +> +> Mikael then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, he enables the **Override system settings** option and sets the switch to **On**. There are no other apps listed in the **Program settings** section. +> +>The result will be that DEP only will be enabled for *test.exe*. All other apps will not have DEP applied. +> +> +>- **Example 2** +> +> Josie configures **Data Execution Prevention (DEP)** in the **System settings** section to be **Off by default**. +> +> Josie then adds the app *test.exe* to the **Program settings** section. In the options for that app, under **Data Execution Prevention (DEP)**, she enables the **Override system settings** option and sets the switch to **On**. +> +> Josie also adds the app *miles.exe* to the **Program settings** section and configures **Control flow guard (CFG)** to **On**. She doesn't enable the **Override system settings** option for DEP or any other mitigations for that app. +> +>The result will be that DEP will be enabled for *test.exe*. DEP will not be enabled for any other app, including *miles.exe*. +>CFG will be enabled for *miles.exe*. @@ -139,7 +132,7 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi 3. Under the **System settings** section, find the mitigation you want to configure and select one of the following. Apps that aren't configured individually in the **Program settings** section will use the settings configured here: - **On by default** - The mitigation is *enabled* for apps that don't have this mitigation set in the app-specific **Program settings** section - **Off by default** - The mitigation is *disabled* for apps that don't have this mitigation set in the app-specific **Program settings** section - - **Use default** - The mitigation is either enabled or disabled, depending on the default configuration for Windows 10; the default value (**On** or **Off**) is always specified next to the **Use default** label for each of the mitigations + - **Use default** - The mitigation is either enabled or disabled, depending on the default configuration that is set up by Windows 10 installation; the default value (**On** or **Off**) is always specified next to the **Use default** label for each mitigation >[!NOTE] >You may see a User Account Control window when changing some settings. Enter administrator credentials to apply the setting. diff --git a/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md b/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md index d128c1da67..4f8c0d070d 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md +++ b/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction.md @@ -92,7 +92,9 @@ See the [Attack Surface Reduction](attack-surface-reduction-exploit-guard.md) to ```PowerShell Set-MpPreference -AttackSurfaceReductionRules_Ids -AttackSurfaceReductionRules_Actions Enabled ``` - + + + You can enable the feature in audit mode using the following cmdlet: ```PowerShell @@ -101,6 +103,21 @@ Add-MpPreference -AttackSurfaceReductionRules_Ids -AttackSurfaceReduct Use `Disabled` insead of `AuditMode` or `Enabled` to turn the feature off. +>[!IMPORTANT> +>You must specify the state individually for each rule, but you can combine rules and states in a comma seperated list. +> +>In the following example, the first two rules will be enabled, the third rule will be disabled, and the fourth rule will be enabled in audit mode: +> +>```PowerShell +>Set-MpPreference -AttackSurfaceReductionRules_Ids ,,, -AttackSurfaceReductionRules_Actions Enabled, Enabled, Disabled, AuditMode +>``` + + +You can also the `Add-MpPreference` PowerShell verb to add new rules to the existing list. + +>[!WARNING] +>`Set-MpPreference` will always overwrite the existing set of rules. If you want to add to the existing set, you should use `Add-MpPreference` instead. +>You can obtain a list of rules and their current state by using `Get-MpPreference` ### Use MDM CSPs to enable Attack Surface Reduction rules diff --git a/windows/threat-protection/windows-defender-exploit-guard/images/Untitled-1.png b/windows/threat-protection/windows-defender-exploit-guard/images/Untitled-1.png new file mode 100644 index 0000000000000000000000000000000000000000..7e4e011d4f02277938eb6dc8e119e9e202503e95 GIT binary patch literal 193 zcmeAS@N?(olHy`uVBq!ia0vp^JRr=$1|-8uW1a&k&H|6fVg?3AcMxWLuyu+dP_Wq3 z#W6(VeC-5B!2=3BEa6N-T8x}in-+UH09gxzv>yIi$Rq6WY0u5MD(npkoP14!DQZ6i z_bA6a)S9qB;e_lpzgY>K>o(@8OYYD!ms+`VgYwZ2DyGU$IM%UEyFIVgAm@B`vNq?r l7mmtX?R5gBV|TH>WZop-ucxoY+6}ax!PC{xWt~$(698)SJFWl# literal 0 HcmV?d00001 From 35cefb8d64781e89eae7855fc3729eb7a5537cc8 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Fri, 15 Sep 2017 17:05:38 -0700 Subject: [PATCH 004/115] working changes --- .../windows-defender-antivirus-compatibility.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 1d49a1e634..7b46aec73f 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -15,7 +15,7 @@ ms.date: 09/07/2017 --- -# Windows Defender Antivirus and third party protection products +# Windows Defender Antivirus compatibility **Applies to:** @@ -60,12 +60,10 @@ Windows Server 2016 | Windows Defender AV | No | Active mode -In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware. +In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware: -The reasons for this are twofold: - -1. If you are enrolled in Windows Defender ATP, [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -2. If the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, then Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. +1. Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. +2. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. Therefore, the Windows Defender AV service needs to update itself to ensure it has up-to-date protection coverage in case it needs to automatically enable itself. From 83a5b9440e3acb26585b5049f63a12ad0b9dc0b7 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 10:28:14 -0700 Subject: [PATCH 005/115] updates --- ...dic-scanning-windows-defender-antivirus.md | 103 ++++++++++++++++++ ...indows-defender-antivirus-compatibility.md | 21 ++-- ...fender-antivirus-on-windows-server-2016.md | 3 - 3 files changed, 116 insertions(+), 11 deletions(-) create mode 100644 windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md diff --git a/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md new file mode 100644 index 0000000000..2f73f17890 --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md @@ -0,0 +1,103 @@ +--- +title: Configure always-on real-time protection in Windows Defender AV +description: Enable and configure real-time protectoin features such as behavior monitoring, heuristics, and machine-learning in Windows Defender AV +keywords: real-time protection, rtp, machine-learning, behavior monitoring, heuristics +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +ms.localizationpriority: medium +author: iaanw +ms.author: iawilt +ms.date: 08/25/2017 +--- + + + +# Enable and configure Windows Defender AV always-on protection and monitoring + + + +**Applies to:** + +- Windows 10 + + +**Audience** + +- Enterprise security administrators + + +**Manageability available with** + +- Group Policy + + + + +Always-on protection consists of real-time protection, behavior monitoring, and heuristics to identify malware based on known suspicious and malicious activities. + +These activities include events such as processes making unusual changes to existing files, modifying or creating automatic startup registry keys and startup locations (also known as auto-start extensibility points, or ASEPs), and other changes to the file system or file structure. + + +## Configure and enable always-on protection + +You can configure how always-on protection works with the Group Policy settings described in this section. + +To configure these settings: + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Antivirus** and then the **Location** specified in the table below. + +6. Double-click the policy **Setting** as specified in the table below, and set the option to your desired configuration. Click **OK**, and repeat for any other settings. + + + + +Location | Setting | Description | Default setting (if not configured) +---|---|---|--- +Real-time protection | Monitor file and program activity on your computer | The AV engine makes note of any file changes (file writes, such as moves, copies, or modifications) and general program activity (programs that are opened or running and that cause other programs to run) | Enabled +Real-time protection | Scan all downloaded files and attachments | Downloaded files and attachments are automatically scanned. This operates in addition to Windows Defender SmartScreen filter, which scans files before and during downloading | Enabled +Real-time protection | Turn on process scanning whenever real-time protection is enabled | You can independently enable the AV engine to scan running processes for suspicious modifications or behaviors. This is useful if you have disabled real-time protection | Enabled +Real-time protection | Turn on behavior monitoring | The AV engine will monitor file processes, file and registry changes, and other events on your endpoints for suspicious and known malicious activity | Enabled +Real-time protection | Turn on raw volume write notifications | Information about raw volume writes will be analyzed by behavior monitoring | Enabled +Real-time protection | Define the maximum size of downloaded files and attachments to be scanned | You can define the size in kilobytes | Enabled +Real-time protection | Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Note that fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) +Scan | Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the AV engine is asked to detect the activity | Enabled +Root | Allow antimalware service to startup with normal priority | You can lower the priority of the AV engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled +Root | Allow antimalware service to remain running always | If protection updates have been disabled, you can set Windows Defender AV to still run. This lowers the protection on the endpoint. | Disabled + + + + +## Disable real-time protection +> [!WARNING] +> Disabling real-time protection will drastically reduce the protection on your endpoints and is not recommended. + +The main real-time protection capability is enabled by default, but you can disable it with Group Policy: + +**Use Group Policy to disable real-time protection:** + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Antivirus > Real-time protection**. + +6. Double-click the **Turn off real-time protection** setting and set the option to **Enabled**. Click **OK**. + + + +## Related topics + +- [Configure behavioral, heuristic, and real-time protection](configure-protection-features-windows-defender-antivirus.md) +- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 7b46aec73f..663e22ca35 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -36,7 +36,7 @@ If you are also using Windows Defender Advanced Threat Protection, then Windows On Windows Server 2016, Windows Defender AV will not enter passive or disabled mode if you have also installed a third-party antivirus product. See [Windows Defender Antivirus on Windows Server 2016](windows-defender-antivirus-on-windows-server-2016.md) topic for key differences and management options for Windows Server installations. -The following matrix illustrates how Windows Defender AV operates when third-party antivirus products or Windows Defender ATP are also used. +The following matrix illustrates the states that Windows Defender AV will enter when third-party antivirus products or Windows Defender ATP are also used. Windows version | Antimalware protection offered by | Organization enrolled in Windows Defender ATP | Windows Defender AV state -|-|-|- @@ -58,23 +58,28 @@ Windows Server 2016 | Windows Defender AV | No | Active mode >Windows Defender is also offered for [consumer devices on Windows 8.1 and Windows Server 2012](https://technet.microsoft.com/en-us/library/dn344918#BKMK_WindowsDefender), although it does not provide enterprise-level management (or an interface on Windows Server 2012 Server Core installations). +This table describes what each of the three states do: +State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates +-|-|-|-|-|- +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | N | Y | Y | N | Y +Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N +Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y -In the passive and automatic disabled modes, Windows Defender AV will continue to run (using the *msmpeng.exe* process), and will continue to be updated, however there will be no Windows Defender user interface, scheduled scans won't run, and Windows Defender AV will not provide real-time protection from malware: +Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -1. Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. -2. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. +Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. - Therefore, the Windows Defender AV service needs to update itself to ensure it has up-to-date protection coverage in case it needs to automatically enable itself. +In passive and automatic disabled mode, you can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. - You can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. - - If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. + If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. >[!WARNING] >You should not attempt to disable, stop, or modify any of the associated services used by Windows Defender AV, Windows Defender ATP, or the Windows Defender Security Center app. > >This includes the *wscsvc*, *SecurityHealthService*, *MsSense*, *Sense*, *WinDefend*, or *MsMpEng* services and process. Manually modifying these services can cause severe instability on your endpoints and open your network to infections and attacks. +> +>It can also cause problems when using third-party antivirus apps and how their information is displayed in the [Windows Defender Security Center app](windows-defender-security-center-antivirus.md). ## Related topics diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 77b79508b8..1c459208be 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -144,8 +144,6 @@ By default, Windows Update does not download and install updates automatically o To ensure that protection from malware is maintained, we recommend that you enable the following services: -- Windows Defender Network Inspection service - - Windows Error Reporting service - Windows Update service @@ -155,7 +153,6 @@ The following table lists the services for Windows Defender and the dependent se |Service Name|File Location|Description| |--------|---------|--------| |Windows Defender Service (Windefend)|C:\Program Files\Windows Defender\MsMpEng.exe|This is the main Windows Defender Antivirus service that needs to be running at all times.| -|Windows Defender Network Inspection Service (Wdnissvc)|C:\Program Files\Windows Defender\NisSrv.exe|This service is invoked when Windows Defender Antivirus encounters a trigger to load it.| |Windows Error Reporting Service (Wersvc)|C:\WINDOWS\System32\svchost.exe -k WerSvcGroup|This service sends error reports back to Microsoft.| |Windows Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Firewall service enabled.| |Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get definition updates and antimalware engine updates| From 614ed27747cddf9cf66660a5b7cfe893a21af9e6 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 11:38:02 -0700 Subject: [PATCH 006/115] svg marks --- .../customize-exploit-protection.md | 8 ++++---- .../windows-defender-exploit-guard/graphics.md | 4 ++++ 2 files changed, 8 insertions(+), 4 deletions(-) create mode 100644 windows/threat-protection/windows-defender-exploit-guard/graphics.md diff --git a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md index ae69caa22c..cd9610eb6a 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md +++ b/windows/threat-protection/windows-defender-exploit-guard/customize-exploit-protection.md @@ -92,10 +92,10 @@ Validate stack integrity (StackPivot) | Ensures that the stack has not been redi > >Enabled in **Program settings** | Enabled in **System settings** | Behavior >:-: | :-: | :-: -> | | As defined in **Program settings** -> | | As defined in **Program settings** -> | | As defined in **System settings** ->![](images/untitled-1.png) | ![](images/untitled-1.png) | Default as defined in **Use default** option +>Check mark yes | Check mark no | As defined in **Program settings** +> | Check mark yes | As defined in **Program settings** +>Check mark no | Check mark yes | As defined in **System settings** +>[!include[Check mark no](graphics.md)] | [!include[Check mark yes](graphics.md#yes)] | Default as defined in **Use default** option > > > diff --git a/windows/threat-protection/windows-defender-exploit-guard/graphics.md b/windows/threat-protection/windows-defender-exploit-guard/graphics.md new file mode 100644 index 0000000000..62fbf7102a --- /dev/null +++ b/windows/threat-protection/windows-defender-exploit-guard/graphics.md @@ -0,0 +1,4 @@ +Check mark no + + +Check mark yes \ No newline at end of file From 6dc218d2ae810aa97a2a7f6030b112de518f2f70 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 13:09:20 -0700 Subject: [PATCH 007/115] updates for compat and custom notifs --- ...-first-sight-windows-defender-antivirus.md | 2 +- .../images/svg/check-no.md | 7 +++ .../images/svg/check-yes.md | 7 +++ ...indows-defender-antivirus-compatibility.md | 16 ++++- ...fender-antivirus-on-windows-server-2016.md | 2 +- ...dows-defender-security-center-antivirus.md | 2 +- .../windows-defender-security-center.md | 63 +++++++++++-------- 7 files changed, 68 insertions(+), 31 deletions(-) create mode 100644 windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md create mode 100644 windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md diff --git a/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md index 01bec5d98d..258a939423 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md @@ -34,7 +34,7 @@ ms.date: 08/25/2017 - Windows Defender Security Center app -Block at First Sight is a feature of Windows Defender Antivirus cloud-delivered protection that provides a way to detect and block new malware within seconds. +Block at first sight is a feature of Windows Defender Antivirus cloud-delivered protection that provides a way to detect and block new malware within seconds. It is enabled by default when certain pre-requisite settings are also enabled. In most cases, these pre-requisite settings are also enabled by default, so the feature is running without any intervention. You can use group policy settings to confirm the feature is enabled. diff --git a/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md b/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md new file mode 100644 index 0000000000..afa7a3d27d --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/images/svg/check-no.md @@ -0,0 +1,7 @@ + + Check mark no + + \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md b/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md new file mode 100644 index 0000000000..4dd10553c4 --- /dev/null +++ b/windows/threat-protection/windows-defender-antivirus/images/svg/check-yes.md @@ -0,0 +1,7 @@ + + Check mark yes + + \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index 663e22ca35..aed2016cfd 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -60,17 +60,29 @@ Windows Server 2016 | Windows Defender AV | No | Active mode This table describes what each of the three states do: +State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates +-|-|-|-|-|-|- +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] +Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] +Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] + + + + + State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates -|-|-|-|-|- -Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | N | Y | Y | N | Y +Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)]N | Y | Y | N | Y Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y + + Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. -In passive and automatic disabled mode, you can still [manage updates for Windows Defender](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. +In passive and automatic disabled mode, you can still [manage updates for Windows Defender AV](manage-updates-baselines-windows-defender-antivirus.md), however you can't move Windows Defender AV into the normal active mode if your endpoints have an up-to-date third-party product providing real-time protection from malware. If you uninstall the other product, and choose to use Windows Defender AV to provide protection to your endpoints, Windows Defender AV will automatically return to its normal active mode. diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md index 1c459208be..c1cedd3d5d 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md @@ -154,7 +154,7 @@ The following table lists the services for Windows Defender and the dependent se |--------|---------|--------| |Windows Defender Service (Windefend)|C:\Program Files\Windows Defender\MsMpEng.exe|This is the main Windows Defender Antivirus service that needs to be running at all times.| |Windows Error Reporting Service (Wersvc)|C:\WINDOWS\System32\svchost.exe -k WerSvcGroup|This service sends error reports back to Microsoft.| -|Windows Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Firewall service enabled.| +|Windows Defender Firewall (MpsSvc)|C:\WINDOWS\system32\svchost.exe -k LocalServiceNoNetwork|We recommend leaving the Windows Defender Firewall service enabled.| |Windows Update (Wuauserv)|C:\WINDOWS\system32\svchost.exe -k netsvcs|Windows Update is needed to get definition updates and antimalware engine updates| diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md index 495cc05eec..99ebbdf36d 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md @@ -38,7 +38,7 @@ In Windows 10, version 1703 (also known as the Creators Update), the Windows Def Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703. > [!IMPORTANT] -> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These will be disabled automatically when a third-party antivirus or firewall product is installed and kept up to date. +> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These will be disabled automatically when a third-party antivirus or firewall product is installed and kept up to date. > [!WARNING] > If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. diff --git a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 804c2d9152..5bc79e341c 100644 --- a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -29,25 +29,20 @@ ms.date: 08/25/2017 In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one easy-to-use app. - - - ![Screen shot of the Windows Defender Security Center app showing that the device is protected and five icons for each of the features](images/security-center-home.png) - - Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. The app includes the settings and status for the following security features: - Virus & threat protection, including settings for Windows Defender Antivirus and Controlled folder access - Device performance & health, which includes information about drivers, storage space, and general Windows Update issues -- Firewall & network protection, including Windows Firewall +- Firewall & network protection, including Windows Defender Firewall - App & browser control, covering Windows Defender SmartScreen settings and Exploit protection mitigations -- Family options, which include a number of parental controls along with tips and information for keeping kids safe online - +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online +In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. The Windows Defender Security Center app uses the [Security Center service](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA) to provide the status and information on third-party antivirus and firewall products that are installed on the device. @@ -55,13 +50,13 @@ The Windows Defender Security Center app uses the [Security Center service](http >[!IMPORTANT] >Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. > ->The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Firewall, and other security protection. +>The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, and other security protection. > >These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. > >Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). > ->Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). +>Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). > [!WARNING] > If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. @@ -97,9 +92,12 @@ Disabling any of the individual features (through Group Policy or other manageme > [!IMPORTANT] > Individually disabling any of the services will not disable the other services or the Windows Defender Security Center app. -For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus). However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Firewall. +For example, using a third-party antivirus will disable Windows Defender Antivirus. However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. + +The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section and third-party firewalls will be shown under the **Firewall & network protection** section in the Windows Defender Security Center app. + +See the [Windows Defender Antivirus compatibility](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility) topic for more information on how Windows Defender AV works with other antivirus apps, and what options are availble. -The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section in the Windows Defender Security Center app. @@ -112,32 +110,38 @@ See the following links for more information on the features in the Windows Defe - Device performance & health - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) -- Windows Firewall - - IT administrators and IT pros can get configuration guidance from the [Windows Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) +- Windows Defender Firewall + - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) - Windows Defender SmartScreen - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) -- Family options, which include a number of parental controls along with tips and information for keeping kids safe online +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) -## Customize notifications from the Windows Defender Security Center + +## Customize the Windows Defender Security Center app for your organization -You can customize notifcations so they show information to users about how to get more help from your organization's help desk. - -![](images/security-center-custom-notif.png) - -This information will also appear as a pop-out window on the Windows Defender Security Center app. +You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. ![](images/security-center-custom-flyout.png) -Users can click on the displayed information to get more help: +This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). + +![](images/security-center-custom-notif.png) + + +Users can click on the displayed information to easily initiate a support request: - Clicking **Call** or the phone number will open Skype to start a call to the displayed number - Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email - Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address -### Use Group Policy to customize the notification +### Use Group Policy to enable and customize contact information + +There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. + +This can only be done in Group Policy. 1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. @@ -147,11 +151,15 @@ Users can click on the displayed information to get more help: 5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. -6. Open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. +6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: -7. Open the **Specify contact company name** setting and set it to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. -8. To ensure the custom notification appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: + 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. + +7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + +8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: 1. Specify contact email address of Email ID 2. Specify contact phone number or Skype ID 3. Specify contact website @@ -159,6 +167,9 @@ Users can click on the displayed information to get more help: 9. Click **OK** after configuring each setting to save your changes. +>[!IMPORTANT] +>You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. + >[!NOTE] >The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). From d0665facf95bd197a91b3588eed8503f8a05f9c6 Mon Sep 17 00:00:00 2001 From: Iaan D'Souza-Wiltshire Date: Mon, 18 Sep 2017 15:27:27 -0700 Subject: [PATCH 008/115] add WDSC topics --- ...indows-defender-antivirus-compatibility.md | 12 -- .../wdsc-app-browser-control.md | 3 + .../wdsc-customize-contact-information.md | 53 ++++++ .../wdsc-device-performance-health.md | 3 + .../wdsc-family-options.md | 2 + .../wdsc-firewall-network-protection.md | 3 + .../wdsc-hide-notifications.md | 0 .../wdsc-virus-threat-protection.md | 0 .../windows-defender-security-center.md | 158 ++++++------------ 9 files changed, 114 insertions(+), 120 deletions(-) create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-family-options.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md create mode 100644 windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md diff --git a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md index aed2016cfd..0235f43e85 100644 --- a/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md +++ b/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md @@ -66,18 +66,6 @@ Passive mode | Windows Defender AV will not be used as the antivirus app, and th Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark no](images/svg/check-no.md)] Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark no](images/svg/check-no.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] | [!include[Check mark yes](images/svg/check-yes.md)] - - - - -State | Description | Real-time protection and cloud-delivered protection | Limited periodic scanning | File scanning and detection information | Threat remediation | Threat definition updates --|-|-|-|-|- -Passive mode | Windows Defender AV will not be used as the antivirus app, and threats will not be remediated by Windows Defender AV. Files will be scanned and reports will be provided for threat detections which are shared with the Windows Defender ATP service. | [!include[Check mark no](images/svg/check-no.md)]N | Y | Y | N | Y -Automatic disabled mode | Windows Defender AV will not be used as the antivirus app. Files will not be scanned and threats will not be remediated. | N | Y | N | N | N -Active mode | Windows Defender AV is used as the antivirus app on the machine. All configuration made with Configuration Manager, Group Policy, Intune, or other management products will apply. Files will be scanned and threats remediated, and detection information will be reported in your confirmation tool (such as Configuration Manager or the Windows Defender AV app on the machine itself). | Y | N | Y | Y | Y - - - Passive mode is enabled if you are enrolled in Windows Defender ATP because [the service requires common information sharing from the Windows Defender AV service](../windows-defender-atp/defender-compatibility-windows-defender-advanced-threat-protection.md) in order to properly monitor your devices and network for intrusion attempts and attacks. Automatic disabled mode is enabled so that if the protection offered by a third-party antivirus product goes out of date, is not updated, or stops providing real-time protection from viruses, malware, and other threats, Windows Defender AV will automatically enable itself to ensure antivirus protection is maintained on the endpoint. It also allows you to enable [limited periodic scanning](limited-periodic-scanning-windows-defender-antivirus.md), which uses the Windows Defender AV engine to periodically check for threats in addition to your main antivirus app. diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md new file mode 100644 index 0000000000..74061fcac7 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-app-browser-control.md @@ -0,0 +1,3 @@ +- Windows Defender SmartScreen + - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) + - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md b/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md new file mode 100644 index 0000000000..602bdeba23 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-customize-contact-information.md @@ -0,0 +1,53 @@ + + +## Customize the Windows Defender Security Center app for your organization + +You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. + +![](images/security-center-custom-flyout.png) + +This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). + +![](images/security-center-custom-notif.png) + + +Users can click on the displayed information to easily initiate a support request: +- Clicking **Call** or the phone number will open Skype to start a call to the displayed number +- Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email +- Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address + + +### Use Group Policy to enable and customize contact information + +There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. + +This can only be done in Group Policy. + +1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. + +3. In the **Group Policy Management Editor** go to **Computer configuration**. + +4. Click **Policies** then **Administrative templates**. + +5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. + +6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: + + 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. + + 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. + +7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. + +8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: + 1. **Specify contact email address or Email ID** + 2. **Specify contact phone number or Skype ID** + 3. **Specify contact website** + +9. Click **OK** after configuring each setting to save your changes. + + +>[!IMPORTANT] +>You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. + + diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md new file mode 100644 index 0000000000..a2ad85bc83 --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-device-performance-health.md @@ -0,0 +1,3 @@ +- Device performance & health + - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) + - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md new file mode 100644 index 0000000000..f6b1ad952c --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-family-options.md @@ -0,0 +1,2 @@ +- Family options, which includes access to parental controls along with tips and information for keeping kids safe online + - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) \ No newline at end of file diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md new file mode 100644 index 0000000000..472ddc118c --- /dev/null +++ b/windows/threat-protection/windows-defender-security-center/wdsc-firewall-network-protection.md @@ -0,0 +1,3 @@ +- Windows Defender Firewall + - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) + - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md b/windows/threat-protection/windows-defender-security-center/wdsc-hide-notifications.md new file mode 100644 index 0000000000..e69de29bb2 diff --git a/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md b/windows/threat-protection/windows-defender-security-center/wdsc-virus-threat-protection.md new file mode 100644 index 0000000000..e69de29bb2 diff --git a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md index 5bc79e341c..0586d8a2b4 100644 --- a/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -27,43 +27,35 @@ ms.date: 08/25/2017 -In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one easy-to-use app. +In Windows 10, version 1703 we introduced the new Windows Defender Security Center app, which brings together common Windows security features into one app. + ![Screen shot of the Windows Defender Security Center app showing that the device is protected and five icons for each of the features](images/security-center-home.png) -Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. +Many settings that were previously part of the individual features and main Windows Settings have been combined and moved to the new app, which is installed out-of-the-box as part of Windows 10, version 1703. In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. -The app includes the settings and status for the following security features: +>[!NOTE] +>The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal console that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). -- Virus & threat protection, including settings for Windows Defender Antivirus and Controlled folder access -- Device performance & health, which includes information about drivers, storage space, and general Windows Update issues -- Firewall & network protection, including Windows Defender Firewall -- App & browser control, covering Windows Defender SmartScreen settings and Exploit protection mitigations -- Family options, which includes access to parental controls along with tips and information for keeping kids safe online +This library describes the Windows defender Security Center app, and provides information on configuring certain features, inlcuding: -In Windows 10, version 1709, we increased the scope of the app to also show information from third-party antivirus and firewall apps. + +- [Showing and customizing contact information on the app and in notifications](wdsc-customize-contact-information.md) +- [Hiding notifications](wdsc-hide-notifications.md) + +You can find more information about each section, including options for configuring the sections - such as hiding each of the sections - at the following topics: + + +- [Virus & threat protection](wdsc-virus-threat-protection.md), which has information and access to antivirus settings and the Controlled folder access feature of Windows Defender Exploit Guard +- [Device performance & health](wdsc-device-performance-health.md), which has information about drivers, storage space, and general Windows Update issues +- [Firewall & network protection](wdsc-firewall-network-protection.md), which has information and access to firewall settings, including Windows Defender Firewall +- [App & browser control](wdsc-app-browser-control.md), covering Windows Defender SmartScreen settings and Exploit protection mitigations +- [Family options](wdsc-family-options.md), which includes access to parental controls along with tips and information for keeping kids safe online -The Windows Defender Security Center app uses the [Security Center service](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA) to provide the status and information on third-party antivirus and firewall products that are installed on the device. ->[!IMPORTANT] ->Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. -> ->The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, and other security protection. -> ->These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. -> ->Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). -> ->Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). -> [!WARNING] -> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. -> ->It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. -> ->This will significantly lower the protection of your device and could lead to malware infection. @@ -78,11 +70,31 @@ The Windows Defender Security Center app uses the [Security Center service](http > [!NOTE] -> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Defender Security Center. Review the settings for each feature in its appropriate library. Links for both home user and enterprise or commercial audiences are listed below. +> Settings configured with management tools, such as Group Policy, Microsoft Intune, or System Center Configuration Manager, will generally take precedence over the settings in the Windows Defender Security Center. See the topics for each of the sections for links to configuring the associated features or products. + + ## How the Windows Defender Security Center app works with Windows security features +>[!IMPORTANT] +>Windows Defender AV and the Windows Defender Security Center app use similarly named services for specific purposes. +> +>The Windows Defender Security Center app uses the Windows Defender Security Center Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/en-us/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection. +> +>These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. +> +>Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md). +> +>Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). + +> [!WARNING] +> If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Defender Security Center app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. +> +>It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. +> +>This will significantly lower the protection of your device and could lead to malware infection. + The Windows Defender Security Center app operates as a separate app or process from each of the individual features, and will display notifications through the Action Center. It acts as a collector or single place to see the status and perform some configuration for each of the features. @@ -92,87 +104,17 @@ Disabling any of the individual features (through Group Policy or other manageme > [!IMPORTANT] > Individually disabling any of the services will not disable the other services or the Windows Defender Security Center app. -For example, using a third-party antivirus will disable Windows Defender Antivirus. However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. - -The presence of the third-party antivirus will be indicated under the **Virus & threat protection** section and third-party firewalls will be shown under the **Firewall & network protection** section in the Windows Defender Security Center app. - -See the [Windows Defender Antivirus compatibility](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility) topic for more information on how Windows Defender AV works with other antivirus apps, and what options are availble. - - - - -## More information - -See the following links for more information on the features in the Windows Defender Security Center app: -- Windows Defender Antivirus - - IT administrators and IT pros can get configuration guidance from the [Windows Defender Antivirus in the Windows Defender Security Center topic](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus) and the [Windows Defender Antivirus documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) - - Home users can learn more at the [Virus & threat protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012987/windows-10-virus-threat-protection-windows-defender-security-center) -- Device performance & health - - It administrators and IT pros can [configure the Load and unload device drivers security policy setting](https://docs.microsoft.com/en-us/windows/device-security/security-policy-settings/load-and-unload-device-drivers), and learn how to [deploy drivers during Windows 10 deployment using System Center Configuration Manager](https://docs.microsoft.com/en-us/windows/deployment/deploy-windows-sccm/add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager) - - Home users can learn more at the [Track your device and performance health in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012986/windows-defender-track-your-device-performance-health) -- Windows Defender Firewall - - IT administrators and IT pros can get configuration guidance from the [Windows Defender Firewall with Advanced Security documentation library](https://docs.microsoft.com/en-us/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security) - - Home users can learn more at the [Firewall & network protection in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4012988/windows-10-firewall-network-protection-windows-defender-security-center) -- Windows Defender SmartScreen - - IT administrators and IT pros can get configuration guidance from the [Windows Defender SmartScreen documentation library](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview) - - Home users can learn more at the [App & browser control in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013218/windows-10-app-browser-control-in-windows-defender) -- Family options, which includes access to parental controls along with tips and information for keeping kids safe online - - Home users can learn more at the [Help protection your family online in Windows Defender Security Center topic at support.microsoft.com](https://support.microsoft.com/en-us/help/4013209/windows-10-protect-your-family-online-in-windows-defender) - - -## Customize the Windows Defender Security Center app for your organization - -You can add information about your organization in a contact card to the Windows Defender Security Center app. This can include a link to a support site, a phone number for a help desk, and an email address for email-based support. - -![](images/security-center-custom-flyout.png) - -This information will also be shown in some enterprise-specific notifications (including those for [Windows Defender Exploit Guard](/windows/threat-protection/windows-defender-exploit-guard/windows-defender-exploit-guard.md), the [Block at first sight feature](/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md), and [potentially unwanted applications](/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md). - -![](images/security-center-custom-notif.png) - - -Users can click on the displayed information to easily initiate a support request: -- Clicking **Call** or the phone number will open Skype to start a call to the displayed number -- Clicking **Email** or the email address will create a new email in the machine's default email app address to the displayed email -- Clicking **Help portal** or the website URL will open the machine's default web browser and go to the displayed address - - -### Use Group Policy to enable and customize contact information - -There are two stages to using the contact card and customized notifications. First, you have to enable the contact card or custom notifications (or both), and then you must specify at least a name for your organization and one piece of contact information. - -This can only be done in Group Policy. - -1. On your Group Policy management machine, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**. - -3. In the **Group Policy Management Editor** go to **Computer configuration**. - -4. Click **Policies** then **Administrative templates**. - -5. Expand the tree to **Windows components > Windows Defender Security Center > Enterprise Customization**. - -6. You enable the contact card and the customized notifications by configuring two separate Group Policy settings. They will both use the same source of information (explained in Steps 7 and 8), and you can enable both or only one or the other: - - 1. To enable the contact card, open the **Configure customized contact information** setting and set it to **Enabled**. Click **OK**. - - 2. To enable the customized notifications, open the **Configure customized notifications** setting and set it to **Enabled**. Click **OK**. - -7. After you've enabled the contact card or the customized notifications (or both), you must configure the **Specify contact company name** to **Enabled**. Enter your company or organization's name in the field in the **Options** section. Click **OK**. - -8. To ensure the custom notifications or contact card appear, you must also configure at least one of the following settings by opening them, setting them to **Enabled** and adding the contact information in the field under **Options**: - 1. Specify contact email address of Email ID - 2. Specify contact phone number or Skype ID - 3. Specify contact website - -9. Click **OK** after configuring each setting to save your changes. - - ->[!IMPORTANT] ->You must specify the contact company name and at least one contact method - email, phone number, or website URL. If you do not specify the contact name and a contact method the customization will not apply: the contact card will not show, and notifications will not be customized. - - ->[!NOTE] ->The Windows Defender Security Center app is a client interface on Windows 10, version 1703. It is not the Windows Defender Security Center web portal that is used to review and manage [Windows Defender Advanced Threat Protection](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-atp/windows-defender-advanced-threat-protection). +For example, [using a third-party antivirus will disable Windows Defender Antivirus](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility). However, the Windows Defender Security Center app will still run, show its icon in the taskbar, and display information about the other features, such as Windows Defender SmartScreen and Windows Defender Firewall. + + + + + + + + + + From d0f714278102e22f59789839539e8b7442a1b7c4 Mon Sep 17 00:00:00 2001 From: Kaushik Ainapure Date: Fri, 22 Sep 2017 02:17:41 +0530 Subject: [PATCH 009/115] Fixing the hyperlink for 0xC1900101 error Hyperlink broken due to typo. [0xC1900101 error when Windows 10 upgrade fails after the second system restart'(https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) --- windows/client-management/windows-10-support-solutions.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/windows-10-support-solutions.md b/windows/client-management/windows-10-support-solutions.md index 03b15f9859..5c68eb15b8 100644 --- a/windows/client-management/windows-10-support-solutions.md +++ b/windows/client-management/windows-10-support-solutions.md @@ -40,7 +40,7 @@ These are the top Microsoft Support solutions for the most common issues experie - [Resolve Windows 10 upgrade errors : Technical information for IT Pros](/windows/deployment/upgrade/resolve-windows-10-upgrade-errors) - [Windows OOBE fails when you start a new Windows-based computer for the first time](https://support.microsoft.com/help/4020048/windows-oobe-fails-when-you-start-a-new-windows-based-computer-for-the) - ["0xc1800118" error when you push Windows 10 Version 1607 by using WSUS](https://support.microsoft.com/help/3194588/-0xc1800118-error-when-you-push-windows-10-version-1607-by-using-wsus) -- [0xC1900101 error when Windows 10 upgrade fails after the second system restart'(https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) +- [0xC1900101 error when Windows 10 upgrade fails after the second system restart](https://support.microsoft.com/help/3208485/0xc1900101-error-when-windows-10-upgrade-fails-after-the-second-system) - [Updates fix in-place upgrade to Windows 10 version 1607 problem](https://support.microsoft.com/help/4020149/updates-fix-in-place-upgrade-to-windows-10-version-1607-problem) - [OOBE update for Windows 10 Version 1703: May 9, 2017](https://support.microsoft.com/help/4020008) - [OOBE update for Windows 10 Version 1607: May 30, 2017](https://support.microsoft.com/help/4022632) From ed787b6c0d2f1229eb39ac9cea4d9ba8223fde07 Mon Sep 17 00:00:00 2001 From: Andreas Stenhall Date: Sun, 24 Sep 2017 21:40:07 +0200 Subject: [PATCH 010/115] Missing a backslash in UNC path Missing a backslash in UNC path, it looks OK in the source but only one backslash is displayed in the browser where it should be two backslashes. --- .../import-export-exploit-protection-emet-xml.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md b/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md index c864cb9ed7..bc57272913 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md +++ b/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml.md @@ -157,7 +157,7 @@ You can use Group Policy to deploy the configuration you've created to multiple 7. In the **Options::** section, enter the location and filename of the Exploit Protection configuration file that you want to use, such as in the following examples: - C:\MitigationSettings\Config.XML - - \\Server\Share\Config.xml + - \\\Server\Share\Config.xml - https://localhost:8080/Config.xml 8. Click **OK** and [Deploy the updated GPO as you normally do](https://msdn.microsoft.com/en-us/library/ee663280(v=vs.85).aspx). From dd99d455dfc88dcae9a0bb87dc85703d8292ee0a Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 25 Sep 2017 10:36:37 -0700 Subject: [PATCH 011/115] added batter depletion as an example of why BitLocker may go to recovery --- .../bitlocker/bitlocker-frequently-asked-questions.md | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md b/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md index af3bab22cc..4802b4d1ed 100644 --- a/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md +++ b/windows/device-security/bitlocker/bitlocker-frequently-asked-questions.md @@ -151,7 +151,15 @@ The following types of system changes can cause an integrity check failure and p ### What causes BitLocker to start into recovery mode when attempting to start the operating system drive? -Because BitLocker is designed to protect your computer from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. The TPM is not involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed. +Because BitLocker is designed to protect your computer from numerous attacks, there are numerous reasons why BitLocker could start in recovery mode. +For example: + +- Changing the BIOS boot order to boot another drive in advance of the hard drive. +- Adding or removing hardware, such as inserting a new card in the computer, including some PCMIA wireless cards. +- Removing, inserting, or completely depleting the charge on a smart battery on a portable computer. + +In BitLocker, recovery consists of decrypting a copy of the volume master key using either a recovery key stored on a USB flash drive or a cryptographic key derived from a recovery password. +The TPM is not involved in any recovery scenarios, so recovery is still possible if the TPM fails boot component validation, malfunctions, or is removed. ### Can I swap hard disks on the same computer if BitLocker is enabled on the operating system drive? From 9af0aa29d194f1042b0ed0e192ccdc54d8b5ac56 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 25 Sep 2017 17:45:23 +0000 Subject: [PATCH 012/115] Merged PR 3401: Added border to screenshot to differentiate it from surrounding text --- windows/configuration/images/package.png | Bin 4523 -> 11047 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/configuration/images/package.png b/windows/configuration/images/package.png index f5e975e3e92e22d17610159988ef2735725b3b84..e10cf84f51b379758a47f80af67c6ffb28b9934d 100644 GIT binary patch literal 11047 zcmcI~cT^MWyDlJzZb0l2K~SlR5CtUC5)l<50wU5OsB8q34go?7=muq@M2dtSQ4E3< z=>nlDMMCerCm{(nAwVF&9ro|sb=JD~+QZf5hUr@ON?3;FZ;PdwkkFR?@tr@T;ecGhRNr z#x0#s5D`cxWgVTxC5Wl!($7jq1T(M(k`nV%Huw%(v*`CcH zS3 z*N3x4T+7F46}`=~7#Jd$O|&!o34CF;GXtvqiWOYS&Pu-rxg2yaR>f3CGgNnF!f!J8 z+fQK_AzdT*s8j7m^|C3G(pfOEJ+Wb?D~|e;wbpAis9&z@QOoSm(B<(_s~$uInl?+I zgSO(OoOA9wap9KgMLV@NY*;vtG^(Bse+PDbA)YMvgSWy z@CjQRwR<};&Ta>vb);J6*;c8JA8JdyCi$-SUhT$2;5YPkIrmUt;(-e>12IyOKa7*V*M>vq1zz~rEz9lgOzzp{ zS(oPrFn-ILfYc%9j`>uu&wpj4rrxaH+ug<_+u?~>cDoF$`HO+vYy>OE{EIW=yk2Jt z1ni1+cr6~_G$IZ;Cg_gd9_@Wscfv?>|0LOcYvo))ca)`w^i zG!qhdM59LlvGVd{q8&4N@X^L38eIxZVisEz;+7k-@=7ApY=zvOVsaCIs>Zn&Pb)15 zc4ZY|tFQ3wl{s7WiZU;fGHvON_;IdZ8`JiZP2Pu!zjgWZ)>o(*cqWWTTWYmFsU^m^BJ!n zn)8j%Yo?@Y1^WK6ImsbIM6;NRzLgE5m4mY~)4-C}M>R9O6I_Rjq^rl8f@llv?jg(; zYeuY;0ZrfKi@$u@X*C7!cTEOd)hCzzn>Bh2Fj8>WWW>{y_}X6wU#=gPO?|xLRxjYq zUhbBLpZ%4|=ke~YpE?W@1)FX)8k*P|D92Am>c^^lh0||grQj#*?^Sh4!+Ykgh3d!l zX&>}}$Evq*{lA_{rT@}k11GM@wZ4KJ{n~XORy|lVrs=?Jo4qB}E>`MY=U==l8nt^i z$oh6ze#h1fCdayF+ohCLVP|eWxqZL7BqJ5NH?9NwR>R)h`?fo! zP-SkO%AnC+=`I~;I z)bffDBm>;py{1!j<}i*+>GW?qGe1}V{4GwJQI;Dccq8aZ>D2pi+Q~&dosoHjtT5xE z5l~BUVFzx&4n%5!P}XRV`2GT6Hv#NssXr;)xZ;5#v9Nm zen$3L@w4``*Hb+j4)-sXPa?p1IY|0|E0zq@mVC2(8_TRA@@p9939AqjoU1*p=3d0l5MEvm{Pk-uQep@?k?|z{8`2JZK2FWfel9;MGlaJG9AR} zsxKk#NO^kmQS;Ipi46OmMHfH#ghFRwAE(oH;$w-6YZnn zxG%!!&7b{Wu!v;FyP~(@=XFpu>!k&zl=MJ1E6Rt0AcxE7(K~y+xZSm{Dbd=jsu0Bf z#U?2`noR--LVMJ{rS=Rm?qjk=V3SisiE$FeUrlI-j5JqoZ(Z^9z7>+WT|K#79kBGh zYN_&@xah>QNF@*Do8ywLoi(tvE*)pYlF{y*(cPY_1oHI)IJ4PXTyKOeBvw~@z3*XD zvJlJ&C(XmE)I}Qy&)F8_y4fko3%yka3(r)vycicwVWv9qzG{pDWlhW5vF|1OvHH!k zIOfrz zTp~?C@f)%FirExF{3OfSfb2lrh^(A0#ui44K=|V&Us{XXXpg7*^uV1{?VAcOf@yEI z)M#Hn_Y{daAS!*FE0ZK`sYOIZed3v9o*Q9Ub=h;HZy3ePecIH0IMD@e%Py-xVi0xS zdGM+S*Pfk#qnU2?(wBbI4X8;PY6o){iBaxwujvc{a4&GOBv7k-zhGDvpDI{$Ule4?4SRMtdazv!auU6i{LU+BiaxAC3+=VavKEkP~(wrj+kw(^PiBsY3p&sL&vymjQ?6X z^JY)}lPNC4jSX3&p{lK4FO#UGV(Xf!#l={jABL9dk~5|zG6bP+hf_$ z3tgRDd#xNkipGCD+Ntols$5~Ec4yJu2-mG3s;%yR>aIXe-gasV9}i4HqioX1ri+-{ zB2Dd+J~y_nM%n8Tp<@7xq83l4{8XJ)6P8*$d+^AV#tB7^53*ND-nxNTEZtVggFB0; zY&F%XsmyVFI%?$wAicYm>J`Nm;HQ3DZ$o;2&JSYIM@rtIE_fVHEH}iQj$?cNk z)2ORM-ksC1`*GzfUKrS}zn1D-E>NDFA|YmwAG#8@HY{M<0C2QrJ+%N^!mwdM{s2&L za>Yl*ZTCt}S3GeZEkJBp!X}|$C*x+poq1&2rz%ai_?bAz&Wez#jKgD^ryr*nK%`a= zh1;J!L&1Nd8n8TCFJ)!!xW4#MY-B9!P%Y>M6ou=8Vs(3+GzDsSiSk6DBa)O|AkNaY zIs+qr#F}C!ciO(5@3_IVFvHibWtx8>w8ZVr{du{|YKEu6Wwv^tdPShRD~ayC3Sq~x43j}(&UWgstV4tWgO>kd+BP5~|bxNvFG7Xtv4AZ9>m_KmKj zXSC)@-2v(eO#w$VO1lWoK5m^o`EQGU7oTxjnJmONE2BvyhpX(?5m)6^v%);dg}LxK zWFP&X+IB$keaX}oDkBmS<7{i|*?7u1`LuZ0-#DWW^|7ZdN{&`cML3=E3d7)xh5o)7 zHs1g~#^o`AqPPyKOMX3GH-uG<$AXwn)7Ps(R}&C)G(b7;k4h}JYmZ)wI)7K-hI{qH zy*G~i#t~9p!@HZKLjC^lkpFWUroK;O zyWO()yw1AEGMlX!OYS^KP8fFcl>%x-#&wq;aj~E!urh=6t1-#!v_g$PS^ohg3(hND zX@&Z&5ONv0%ccyz5GGc2TP}|;hxk=ziYVNvg#X5d!REBjUy%FNelrqOGDCSPo9_SA z>NV1Nr`e#GYv_R|sxHA!5ov zm34le>~cXZ1I7pgxjXO3{3MIA^_P{<45akP~6{P~M9&x5I)7V#5PhFU_< zV==Qg?o3h2m%8sDYLvqcO?gIlnS2jm(Mr%IBeOTWl=UE+_52d4J>haDf`s4D31Fpl zxHol$KY5`AWxQ5wYCvn=>LS(h?nrDCzK+a(0qcQ3b&tqA-nd0fnQAv`Ug;w5ndhMy zSZZf>4SmWL{0q>oPr5&2MSt)e;ZXqN(gGLcdzY)wTTymdY_=%b2LrBJ%vPC06Qp~- zA7Q`eM~M&sNjUj~$Dhg%+cjksfjZCho7Q+OD);A22CE9aOo;Y4d z<?~DEaO~?Ny4*uVxMPBr@CtmwpITx!> zy9781iA7vB9@7mz7woEhUA3}cgLdd@?whfh4e{l5=D8Ne7#5{L0G!(_1%H^>!v*yw zx6z{PI8RwEl9)d4fbG}l&DYO=MhNw5^PhXv38)5Okl}fmH|X_ZTpnf3m-+?!kEx&~ z4UcVzKe)1QSE#f4OnSW+CH6L(S!2)knHG|$Q2vOL=7)G5t{cY0VpA!=l z`uol8Y&)HO8&8>Mp4Q;56|!9g#622Oz3A$$53am+)o?H{5=)tpR(Ctn0vP~!sNo3W zgqw=RY4G%&Ed;pVI3J*c=KHS0y-wNQHcU{m%7>`Mx5(l+;zk^6q_z7mQTZ}E{Bmh9 zO&zREzdGJ&A3JnJA9! z8mf`vX|3`FxfB;n)Sd&@)@)}Ow_~Z5B{ELeG})`;hd#)&EXHrOn%BfyvG?m&<&Y|S zy}Z_Tr(>C8SgH0n&Gehu7lGAbN8I?Cco=6|*j!?Js5wV6`o=|4r~1A%lb~pu{PJGp zm_w-a(KO!?=Svn35j`d$J;ghCuj0MF>-5`6FlJKcBO@)=qf!);tZu42 z@FjYeirdXrU-HlIVbc3WT`w*@$+qn?c%*}ge! zSwJ{EcQ?k%a{*3N9TF#DGtWKUH^b}`?+cv1qIV!dG1U6CYBh5HWfES0f9lISQq{ca zaYoQ2JiH1(WR-MD+el=@OYgH@g$5D);{G4gtArfvQ>4p8Ni9OQ1QUd)s>@f3%jo)p zP#2rmjJqOU@vl)>yATv0(-6euUm-jTdZUlPE?7=0;i+8&4=@+!sEk>N zk7ReE>_G+o=CB=StJg(^M-H%J?X{v!M+@6K`Jz25gkx1cFf7jfJaTyIaq3O;nU}4N z%EBG55SnnJdc`3Z18oW32)saWN(+gfneJ_3_7b5+Q1;x~Fu1ZArJ{85 zP;W7L^-PIapKT;oay5N}ARCUTR}Dci2Ex~G+bVVQ8N9vs9C+T z{voZ(o2wt&R=pmn{o1`>0<0ChxM-92ll1GwI5CO!ILF_QCvPoy*ES#8xARgal+Qd@ zz=#m|6`K9&gzS8KxpDv5chtCzlX6DAQL(`E_*!r^-vQaG(1fczx+lIr(LoMaI)0%d zW=PVCUwQeh7Msuc*&v%l95Y2jBOBgvL(Yy_bZyy-3i5u6yqz?dYuW3a=oGkA;i#o* zvq4yEB03N@Sp(%Y*B52Mbq2gN4{}>lKNjEs0fxoD6?OBoqnQ`nhkO6n1B}d=0O2}f z;MkRsi`bIS3te2hRkhnypLf3#uMgUoC|G>|=m_%J{0Zaye7>{Ax-{keg!GQY?1aJi z_V8}Ks~`C`sYYmZ+qU7;_2I5p#RBFtkU5dsNtBMXQSU^#ZpH*)g!af{uKE8=F0V#2 z;&6|?nHPu;cb2(5^ElBD=2>lrOr};Aq)bdS`xCDr43Me923mq^haM<)9PX%&GgQw; zT!fpvczw{L5;`k;%Z5<#0|#6wt7k%w*ojV7EZSFl&FK+ zd8m`x#2Oy*#i#?PY5z6yYha}wz4t^ zOI9@C`E@&kWP9-_WJgwhb!NO7w!6A!x%EpH8na&d%Rm5}UAkj@^riWzfwpMK~~k1NS#plz#*n~b6htO>IY zO}RL{!ntSd$)*^1Pv7t~cdFTqPPFsymHPxcn=Z*iU9nFer^0%?07=o8oi3rc5+CKb z*sWiu?3v!p;McmhcJOGbe|{&k+v0Uy+bD$>?^I1bbi0omj3SNB#06i}6Jj*oXu)h8 zkaI`Ce2j~)pgThyt2J96q=3Ut*D(j-lh zlqyHnWD1Y4?rO#Qjkfohn%iD45+^xU6FBUOmYUm@Lq<)Kd)f$cT;}1pJ-myO5MTb{ zuD{-yKVqrnlLqKV2Xq=;IPKS%5ij+uI_j3Q+3kwVBt+cKI(F3yk?*Qj%SVO`6$&*a zfv731jb7{5?PPnd;ixh?+OB;8eTTRE%*ZnAkgM?yj-m!%A!VnWvj^prdkvbSXYV9? ziMA0j(##ZEWYKq*`G`;H$~9iU)ceeHb<&NY;AJav`%VR<=*1t?qbQ?^6_90K!#hmpkaqj5;X5(6>5Ky9h5@K8utR* zjmkIk{9tGY!=2d}UZnnaa%YOt3cB4}@W$zqE@@}SIqP}Aj`pqzSA_Q%HvBi6#s6`0 zs4Jd#WuMn5KWjU4-3GnGV)gvi-gR+Y94Td`KHI^I{*uPp#4>{BVgO@fycl43B@(^o z95Qof8$Br&&RdDfjvas5NXX1qr9~~HK(+KZOYjNToK|&X%J`$?qSKpdlvESf@yhE$ z`@IiCjl~jpUapCe)^*nxOJf!Pb_zBHhhyvuTDn@#`j2_P)tSjtajWA;#EQS@W6c1# zUa87I_w2P#1~c5M%*7JfetoddTPj;a)qNrrDl|3{gKt#!u$u9)yNx|*yA;N5i@IPX z->qf#x7&OC0DvqmpD)?^d~15(+kJOK2^S-??50@dFl;6m1D({pt@iZI&I`JFE73L| zOC+{DXszNFX=Uk%z5be2$Y{qZi*MtIz3s}~n`U8Jk>W3i!3<=u=$1Yok2%h-_JxYpP zR7o?R`+&VP@SE7c&=jKoT5m1caZ&D3Q4olciBNKlztkGL?57BRVIp4mHY0ZrK}_tx zQktba#uzHD6f5k)cdi=G*(PJZ0-rnAFiT%Q$eZI)j~Gdg=}F{kxmKl@Z5M7N&5P@V zoEMSBStQK<`DCYs9(v%&SM1xS$Y!i^Wz(4l=|_EVw*J%M&T1ImM7)iwV%0(sZQt&t z{!XD178XF&#|zs-0%a}01ChEXV!${6NXJ^d#O>#{>kr?ruva5JKMoS;@n~ym#jXKu zJPFGX0OGTD+GElQ7uz{(rY>XZj17wPL6UgGt$NIhs6bWjQBFgvsbLuQXnJ1xI)`!B zQc{azh~jvQ9iTyb_&Z*EiLlytR}-aa8XcvSS3$F!ryqA`e|*?9G_FE{ z9RFX)Q2W?rWoNz7wKVcjp;+d-;90Q?!E^N?Dq5G{(hoL&{pA5Y77lMEMcZ&9Bt4F71)Z$Mr7( zm?akqI@GXLP?XWfLGzhr2FBB9PiM0&A$ib*)Dll8=p(KZ3kJP8!T36++rwyJt6`t9CBA)x=G9(2T4kT+%PWI)xl4YfsdziSbL3)49}%U3>?@ zdExZ0L@~J?wm1X7XQgDi8@w0yWpK|6C&!?8uXj)4T?V;O!bUukCi_hVR=R~af#Yy~*P>QPSJ*s_h z1ZT6iA>&jdr%1Xx)8+6S^5!_1B7T5k2X=Mn#GoG!cQwj?sCCJBc#sC3RPBw+(3F@Z zI6c>XNY03IM*b9nWI9`2y{`=G0dClR2x(B?6024NE}6T>uDCj|`uR(H#c|S1>X%bP znRyOJI&?c`gETUiK@=6Fh5FX~=kgcB36sNOtj1kkVv5qQ4emC~B5)VAu8};Sk38!$ zv0m2u$XU>h^!h%TF<5x8nrk(^IezQ&_`? zUKQ^SZ@Lqb8+y_`;?;?-Oj}v4Uy=82PJcRyg!+`Hl7({wKLHQ1-H-)L;?u(0ICq;z zIAOPm*2NMeXuZdGniM09>fzI~WGeP%XlyN(X$|msU;F^dt83hj)>zV;_3W|Y zWYqNhzOzg3jC7eyiQEiNoIPSi(WfjDe=t)4ScyS z6fmFoETlv=g(jTpZJ+k-W5?HmLbvyq(7S@r@3ko654*9Go^LI2%$!NOb_(7eL^(G2 zx$H%c#bk_PVi~t)Lx^zh}RI-iFxC)vqVJL5B^+ zebi)9iPavQ*|Cns)s7FyI@AfsWw~0rovE>>lZ-8SCY7>jtebhEt6b}rPOqN^gY>MF z8aN5=aPHXVq(<9+7&L*kL`vDtQIc>8!uM4y4q`sSwY#pb| zNLJP`nNhAq;tq@ECc(#TQfSexq*1y9u%LTOk5t!4=ECOR4IYVs9mQSI`A|L{C0D_4 zcscgqn68k4h2K2y*Q^MkVD5(j(C!4Iq$BaNM%D>wu0pnLwCpErLdF2~tE<{b|5T0rJ;c%xb@m{Go62C50@M;dG}okp zkROCIt^|sK1~4V}%P%n%J7+Rg02kvwk^_zbhIe~S53Qed-&6Ycdi7gl!SE$ zxBilC4RAFXkf4*;zyl)Cr;U((!`c)?*(%MAUfQS_^mHGs5&Inti2>*gMxO&PM5uFoH(9 z_pJ!QU6GNbKYzzcvl4w(mSkQVp6{3m=x{0wniqh0=|a;y{S4$4t%Q0_OODTEy|ukL z-qWZ)&$O~CEXi+TLPImNOP@CW9pIAUJQ`l}?Q@mmyyEwCnrh`G>P+fVeW1C{$`Yme z7`!)*JLv4k>+Mle?7Hw${k%Fcg@z!z8DTl6fH$*04Q4*(`NDf&+y29OeKYi9OX9Bn zm*NlqF{Axg-05F7sd56?uBKGH;2%w4kh;BGTPvQD9(`lxO~8F1JmuW@_bJwpYT5rG zHWifmtS!-40YUhYepZw^m~U%sQdz+Gx&(5NL};v7QLY0i2D3T8qjY2 zM$wB^DHWWW^#C~Pqy2}o6hP{eZPM`M=Lc7~yIq6!9m=fqfal14-t&0kFGcd1EY*~cQIKP}h^#LsWp zk`YQm+mi4RK=OPPb^CFll;GKCto!9L;^0G`jv@zQ4iHPiX9zMfvjjr=b4(?j6$vX1 z0nWuhT0nM>&7@?ZT;)cAp8fTr4uGe}@px@6IKr%5hrU1g6Ciku6rrA?cNQJ0DQ!Sh zNx`~00GTWa=UDwzUF}LZIP-~aWP-1_#lCJa&KvoCi}+zm)V9~Y zv?eeK2p(-^a^AQ-w`zS=$r`W*+Q%{%CpoLP1iSBm;YEDVqgEpZVd09?^!zHtFKSbv z2OdHK^97emZa7bqn*t)=X%73Am_ha>OrT|LNHEa-Oi&2J4L}_(R}C=-f_g*Z4^5OX zm z4(SGR?z`)%<0B;zvofKiV>Xw-q$8T2pQ+oyB!s&!M?<>0SD!kPQr|#o@7lUD7A7eziTC@6_gli7x z6MLqRUuoYu~jf9cK(jmk#*DavyL z*qu13(iC6Y`RWjv^>^+;lEF3mwmr_^;38tuazA&aA-umGfo~p9QSgBGs5lA$p~tkp z{xAKQkA{36AyCyA*o8Q$>~Ah%|CQ8M`#)4YfM8YhCtOPg9*d7UC2!VeKRU$ozoan# xKXh+C8t+K}ogvym>wgb-{&QG0Q`R1L+qZX9zISIH0O3|H_#MOB`L`aw{2xoOrECBI literal 4523 zcmZ`-c{CK<`=4Q~!weP4o+YI0OJ&b85u>bOtdUoCQyA-5BH2QAqq0+$!DJg5ri`5^ zgkhwRtx?&R`FX$Zd){;2@A>|o=iX=eJonx|p3gn!o^um!!C~yIysQ8KfZgzho*4iD zq@Kk4%=9PLqwpK!i31|dVAlaPL;T-Q5|F!&i4FjOO$8r1Go0isem888004ye=LC{` zD_l>&;akQQ`X?R=g>rIo3JVL1ii%2w49LpL%0~_=DJfmOdi7fDkhZq=^~b|77|b~3 z0~`*w$QZS@wsy!Fb98ic$9(kg@bK~R@hut;E}sYq2?+}ei>aPWNJvO-n99h=$j;8r z$;rt*k=AJp22)sASX5M0TwGjsBAw*&^788H>bkl*EEbEy;oh7`-y9x~Z*On!=;-L` z>LL<}Boe7_{L8?=z~JEE$jHd2PoKue$0sKzKY#u_Gc!Xbljr8<78Vv37Z=yo)@U@E zwA~~L0N`*l)YGvDo?4rj_ngw^A#K9?wg`q?mp$dyyBjVz$cfsVCF07rsGN zsNkb4M-+VPBLTX#Ekn>^uZ{V|oHAL?98sa#`miI^gqp#iHOY707eH{&qxD(#BXF!k zOgrW{U|1P+XvgzYN{prpHS_K7=e|3h>l_8J2`}qlKh3XPt?IFO-Hg4OFVF7U%mc#4 z_l)B++v$Z04|fDRQO}k6kzx~mfIlw&=$chNWWO@vcQf^?<9-IL!zWI9&yLz*cMToq zsh)B`efr7@J!~OuL0n+q$E?KsqBUE)lNeJ5j}~-h2-TX!?nJCQd!v zyZ-gm9V3<(1wLA`0bsy$kfht*3Xf!Y@jU22f}UGJU^e8C7;$d(4TN~>H*0iel)k#8 zA5i5{6q}8bSfbh=>NMJI0axiw-RW=Dn=Tyby?u7xCdWqf=#O@kP}Se5kk()H320_=6XN1tG?1y}zM4~iz!+wgqb>zBs|cl# z?^*S1EFL&(mh90^#6I?_^_^!m|l@IanaKvp%ljn!ONJ4ra- zqA*I!3%phCloa*!MH|qD9m~}|3qC0>_fl)0=iqCW)D!Ai+(v^NkFz`dlwRP!(>#O-fu&RIu-%54NV#9Xk>{ z$6MIFt(lX10n+eW0Ci2(W=GLa< z6KCYkfGD@mggxq!(sAk{3g2*MzCaO~?J{v{rqS}vZj9e=niOHWd1d%PmvG|I`0#Lj z|3@}J)>NatwJ?<=ezaPg4gpl&5_cV~!$}u#hHmt&X34F6W8FF8f-`z)?8+O6s5US< zn5sA}L55XKTA)0JLp;5lEtkaX2xj?jR#`#EDP@DxjrC@zCZTGSRLi-m*8+FOSaRbY zRgO;wKqXYq`Vdwp4?Lwh3cYlD`#zG1SDh~8_F;PvAu7aCqkSx0RL27L5N>s#=RlwvzSZA5AzN)X*y zV}2=!0@hAP0m5weGpcbxsX4t@0W#y5H=LCl8`V53GKie*sYV;SD8j)7ds$QX_MP#( zU;81y<0D=|p*2upIAe`z!HG%bF=d21yzOx4>3^kZuF29Y;-^n}Lg0#$rn3gsFe5ns z1~MUsCRZ&%GXJ~!=kl}v-`4*WcOx6?4X+I|(4yza%S#PF&~X^mm%Q9S&{E%(IP{2d zjQm`ydm&y&n2k6m$IM0-<-{1JPm!x&o;|rbaP9oYpp})4XhTKvC5$H6%hi|K0ogFd z&&*IF1!rK2J4-JQ*l0`?(l680KzjaO!y4d&Elx2zK+gNsmUW>IJ@1IMYoa$)h82<4 z&!t_qVmf=?9fgC_SxEHiIh)+_4Vl-6+e#5Z(y5`xd7+1_1x~6j`WWR@b`~w8YFx}} zkI!e=ral1>Cud%%!e4bjaS{tPl=tt(Gvt|Wo$(y*HbGb13Ed2jfho?4lqpu?Dz+f< znBMjfWnrnUtS;|;V6ZiVaBfTIX+k6S^5~sG0fKF(4wG>kH66spHPp|j`j9J*X$2rz zrES*c^WA?iGWpKU!V3?DCzY$C7BuNKnMi7AkI~iKJcb9QM{%>Y`N|(HnVlG7+Z&79 z^xne?7rqU=Et1m0JBkL9^&axHX+o5{J*gTI3~%KUQ-Y{i|Esm34Vnp?txAqIwQifo z6_$A*6+efR!_8Cj%4^R8VhAw&+A};p& zy6kD6cb6Ws$f`8{(tFu0^OTzuUhJn@VlL`pum1}d*vn^Dv?kXJ`N1BNO-*WP0zS&)#gU@@o^? zowTr=e*Ak?hhXSp7=;=?h&ml#P)vdMW*|Z~jg?}n903k790{bu2$vB?;1v*s1FZ{y z{1g0F`VanBK)?G+oijXahUPwZG%c{ZxhCU%Hq!H45Z{@88c%(?W)R`H&(wZDf$6ta zzELYv^Td{hx8uYFdcw|ugSslC5!zY~)OsL`rrEn64W5pY*dtEiMASHlazJxkMMuKS zjNXpc7=1u`;9_UddT_(>4L*kIJmygV8@Ni2=ae?{2ga|HX$l+npK=0i)B#smujFV* zhK1u#X@AI28c4oI;oNs_yPrk1xSTm>R_QhqfRaJ2ca0imr4?dXZrn^~sDEZ$VT-*T z#QxN(+~MwxkXfuQbcgdnGn^>GR9d6nqXRadxKGwY!k6gTIp?KctAzpnC~6u2=2sd< z8U?@Gf8FEnCb`N4iL-JIkW;Yo&mM!{eMe_xE;834&Gy2y|61=I>oTbjg(OwpH?vSd z*DL)!wq0pP2_l!9EHrn3jZ^neZ3XU%^5ce(u6ZBDb>0ik!){y}-*R2GNsBo*FlCJ; zghK=4+cIK8EV8P}Y08&DXrCfe=|1jlbt@j7G8Zx^cAP=Y3$=HC{-Fvk_G1R8>mQD_ zLUU%rog)hr@h{7ju%%P8OZFnuHMdX>u=qD_y)oWKhc6c@O$cn~Q8zE+LK7?|XdHs3 zA>tNlMhh8K6e6v{PWEV#jO^LR7$#?^9YNX?F)@Q@v8o@27cT8QO#ac6tDUz=u)?ne z#n$p>2^{A5-#W*3n#mpKTFo8aM82r^mBdmaGbV1#Q7lHTL%09&PAJs<^}-c4`VUf* z^%f){r&@=>Lz=3+PFgzV($g8YohO-3gyqJwdL>fh7`sYg`R{c;LhkVju>*uXs|rMH z8KeLdDZlCZ3Ipqu9QEE|uKsfY{JnekhO8%FTRlD9yy`|C`lU1S&|&yjw=nKmX+}wi zCd4)M(6>+jw^5*&2c;qX7!Wq3^jv3h4(RK(Dd|N}LupLeGURvuAb5W+VZo1r%l8Kx z$x*|UXDhWpQ@ct{0+{Nr>}`s+TTPzI*PS&Ty8epKTRn^bTC8D zn-~ASrdG4Ij2Fxdly7g?i=Z>jlr@|?9xvI5Ks0_f8`Zch$f%I3fsAKwCY618bPCl zrRbXoSQ4lU73-mxbgjzB!25+5pSQ&wmM}uk#y2QZhfUNwFl6U#Rc^rTYwI&fX2n}` zh}#}{<0~xv-<5@!8j+6#REN6TJXS*una{0>jDZ4^=rrwk%RI(1gNGiL@|Jni)w;%e z{2CG3Q}VM47sVmz&8MrXP>clv+TEIz+fEMw0%I3rm6U=7xCnXg&;GustwQ0Kk2EgT zZsS%JupIl^CV%5btJ78_X4L#NGo`Hr30QU>Y;Zl};~ZLmr+3V>23otl!6xko0?VHf zQv+V1hx-R?m7}cd8}<**P*YQ86z5RTB3bEAGSR+o7yRdc@M?h&Q`3aGW&9455V`*x zc|=FK%XL|n-uktw`y316LooWe|9=mf$5N6%Uz{_bN9QI}@<0jnkFz7U!8BSKq{Nk5 zKM}-?Xllu)18zRO>B=V$<$y3V#nN{H=h1$DJMAmN{4%nKNAO){&cBND!z{zl?Ir(R zH55FJ0e*TmQTQ-3cB1eCfb;mrBU799XfB_h(dKtPVqEI2+Msho$_KW3c#vGl#;4rW zvAT!K^KBt@T_&9Lk3ah*i>1DA?BG_!$bYPnW)WY%qmiOG%AtkO4_;4Wu$jNG%xd|}W$QK20xe|rU@olN2t_Up?!20#)1rk$fVS!4@3 z91V8M0cQ#%4j1w5@4?4{`d8{o|LXal&E|j%a}6QCGsCX@hlanPzghW*oPVMJ;)(;( cL1Mc9 Date: Mon, 25 Sep 2017 18:34:32 +0000 Subject: [PATCH 013/115] Merged PR 3403: Merge msfb-13767908 to master WSfB rebrand to MSfB --- .../education-scenarios-store-for-business.md | 16 ++++++++-------- education/windows/index.md | 2 +- ...ory-management-windows-store-for-business.md | 2 +- ...e-mdm-provider-windows-store-for-business.md | 8 ++++---- .../distribute-apps-from-your-private-store.md | 4 ++-- .../distribute-apps-with-management-tool.md | 17 ++++------------- ...nd-permissions-windows-store-for-business.md | 2 +- .../working-with-line-of-business-apps.md | 4 ++-- 8 files changed, 23 insertions(+), 32 deletions(-) diff --git a/education/windows/education-scenarios-store-for-business.md b/education/windows/education-scenarios-store-for-business.md index 4a2fc0fdf9..24b149b435 100644 --- a/education/windows/education-scenarios-store-for-business.md +++ b/education/windows/education-scenarios-store-for-business.md @@ -23,9 +23,9 @@ Applies to: IT admins By default, when a teacher with a work or school account acquires Minecraft: Education Edition,they are automatically signed up for Window Store for Business, and the **Basic Purchaser** role is assigned to them. **Basic Purchaser** role allows teachers to acquire Minecraft: Education Edition and to distribute it to students. -However, tenant admins can control whether or not teachers automatically sign up for Windows Store for Business, and get the **Basic Purchaser** role. You can configure this with **Allow educators in my organization to sign up for the Windows Store for Business.** You'll find this on the **Permissions** page. +However, tenant admins can control whether or not teachers automatically sign up for Microsoft Store for Business, and get the **Basic Purchaser** role. You can configure this with **Allow educators in my organization to sign up for the Microsoft Store for Business.** You'll find this on the **Permissions** page. -**To manage educator access to Windows Store for Business** +**To manage educator access to Microsoft Store for Education** 1. Sign in to [Microsoft Store for Education](https://educationstore.microsoft.com) 2. Click **Manage**, and then click **Permissions**. 3. Select, or clear **Allow teachers in my organization to sign up for the Microsoft Store for Education**. @@ -50,7 +50,7 @@ Applies to: IT admins 2. Click **Settings**, and then choose **Permissions**. 3. Click **Add people**, type a name, select the correct person, choose the role you want to assign, and click **Save**. - ![Permission page for Windows Store for Business](images/sfe-roles.png) + ![Permission page for Microsoft Store for Business](images/sfe-roles.png) Micrososft Store updates the list of people and permissions. @@ -84,7 +84,7 @@ For education organizations, domain verification ensures you are on the academic ## Acquire apps Applies to: IT admins and teachers -Find apps for your school using Windows Store for Business. Admins in an education setting can use the same processes as Admins in an enterprise setting to find and acquire apps. +Find apps for your school using Microsoft Store for Business. Admins in an education setting can use the same processes as Admins in an enterprise setting to find and acquire apps. **To acquire apps** - For info on how to acquire apps, see [Acquire apps in Microsoft Store for Business](https://docs.microsoft.com/microsoft-store/acquire-apps-windows-store-for-business#acquire-apps) @@ -99,7 +99,7 @@ For more information on payment options, see [payment options](https://docs.micr For more information on tax rates, see [tax information](https://docs.microsoft.com/microsoft-store/update-windows-store-for-business-account-settings#organization-tax-information). ### Get started with Minecraft: Education Edition -Teachers and IT administrators can now get trials or subscriptions to Minecraft: Education Edition and add it to Windows Store for Business for distribution. +Teachers and IT administrators can now get trials or subscriptions to Minecraft: Education Edition and add it to Microsoft Store for Business for distribution. - [Get started with Minecraft: Education Edition](https://docs.microsoft.com/education/windows/get-minecraft-for-education) - [For IT admins – Minecraft: Education Edition](https://docs.microsoft.com/education/windows/school-get-minecraft) - [For teachers – Minecraft: Education Edition](https://docs.microsoft.com/education/windows/teacher-get-minecraft) @@ -161,14 +161,14 @@ You'll have a summary of current license availability. **Minecraft: Education Edition subscriptions** -Similarly, you can purchase additional subscriptions of **Minecraft: Education Edition** through Windows Store for Business. Find **Minecraft: Education Edition** in your inventory and use the previous steps for purchasing additional app licenses. +Similarly, you can purchase additional subscriptions of **Minecraft: Education Edition** through Microsoft Store for Business. Find **Minecraft: Education Edition** in your inventory and use the previous steps for purchasing additional app licenses. ## Manage order history Applies to: IT admins and teachers -You can manage your orders through Windows Store for Business. For info on order history and how to refund an order, see [Manage app orders in Windows Store for Business](https://technet.microsoft.com/itpro/windows/manage/manage-orders-windows-store-for-business). +You can manage your orders through Microsoft Store for Business. For info on order history and how to refund an order, see [Manage app orders in Microsoft Store for Business](https://technet.microsoft.com/itpro/windows/manage/manage-orders-windows-store-for-business). It can take up to 24 hours after a purchase, before a receipt is available on your **Order history page**. > [!NOTE] -For **Minecraft: Education Edition**, you can request a refund through Windows Store for Business for two months from the purchase date. After two months, refunds require a support call. \ No newline at end of file +For **Minecraft: Education Edition**, you can request a refund through Microsoft Store for Business for two months from the purchase date. After two months, refunds require a support call. \ No newline at end of file diff --git a/education/windows/index.md b/education/windows/index.md index e84bfe7051..dc90bc8480 100644 --- a/education/windows/index.md +++ b/education/windows/index.md @@ -26,7 +26,7 @@ ms.author: celested
  • Deploy a custom Windows 10 Start menu
  • Manage Windows 10 updates and upgrades
  • Reprovision devices at the end of the school year
  • Use MDT to deploy Windows 10
  • -
  • Use Windows Store for Business
  • +
  • Use Microsoft Store for Business
  • diff --git a/store-for-business/app-inventory-management-windows-store-for-business.md b/store-for-business/app-inventory-management-windows-store-for-business.md index 062c2dbeef..6c598f70cc 100644 --- a/store-for-business/app-inventory-management-windows-store-for-business.md +++ b/store-for-business/app-inventory-management-windows-store-for-business.md @@ -22,7 +22,7 @@ You can manage all apps that you've acquired on your **Apps & software** page. T All of these apps are treated the same once they are in your inventory and you can perform app lifecycle tasks for them: distribute apps, add apps to private store, review license details, and reclaim app licenses. - + Microsoft Store for Business and Education shows this info for each app in your inventory: - Name diff --git a/store-for-business/configure-mdm-provider-windows-store-for-business.md b/store-for-business/configure-mdm-provider-windows-store-for-business.md index 2074e51990..1948662653 100644 --- a/store-for-business/configure-mdm-provider-windows-store-for-business.md +++ b/store-for-business/configure-mdm-provider-windows-store-for-business.md @@ -1,6 +1,6 @@ --- title: Configure an MDM provider (Windows 10) -description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses. +description: For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. ms.assetid: B3A45C8C-A96C-4254-9659-A9B364784673 ms.prod: w10 ms.mktglfcycl: manage @@ -16,7 +16,7 @@ ms.localizationpriority: high - Windows 10 - Windows 10 Mobile -For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Windows Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content. +For companies or organizations using mobile device management (MDM) tools, those tools can synchronize with Microsoft Store for Business inventory to manage apps with offline licenses. Store for Business management tool services work with your third-party management tool to manage content. Your management tool needs to be installed and configured with Azure AD, in the same directory that you are using for Store for Business. Once that's done, you can configure it to work with Store for Business @@ -35,7 +35,7 @@ After your management tool is added to your Azure AD directory, you can configur 3. From the list of MDM tools, select the one you want to synchronize with Microsoft Store, and then click **Activate.** Your MDM tool is ready to use with Microsoft Store. To learn how to configure synchronization and deploy apps, see these topics: -- [Manage apps you purchased from Windows Store for Business with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx) -- [Manage apps from Windows Store for Business with System Center Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- [Manage apps you purchased from Microsoft Store for Business with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx) +- [Manage apps from Microsoft Store for Business with System Center Configuration Manager](https://docs.microsoft.com/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) For third-party MDM providers or management servers, check your product documentation. \ No newline at end of file diff --git a/store-for-business/distribute-apps-from-your-private-store.md b/store-for-business/distribute-apps-from-your-private-store.md index 1b56b97f4b..29e97b30bb 100644 --- a/store-for-business/distribute-apps-from-your-private-store.md +++ b/store-for-business/distribute-apps-from-your-private-store.md @@ -28,7 +28,7 @@ You can make an app available in your private store when you acquire the app, or 2. Click an app, choose the license type, and then click **Get the app** to acquire the app for your organization. - + Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps & software** for app distribution options. @@ -37,7 +37,7 @@ Microsoft Store adds the app to **Apps & software**. Click **Manage**, **Apps & 1. Sign in to [Microsoft Store for Business](https://businessstore.microsoft.com) or [Microsoft Store for Education](https://educationstore.microsoft.com). 2. Click **Manage**, and then choose **Apps & software**. - + 3. Use **Refine results** to search for online-licensed apps under **License type**. 4. From the list of online-licensed apps, click the ellipses for the app you want, and then choose **Add to private store**. diff --git a/store-for-business/distribute-apps-with-management-tool.md b/store-for-business/distribute-apps-with-management-tool.md index 557c355557..7c5ff2adbd 100644 --- a/store-for-business/distribute-apps-with-management-tool.md +++ b/store-for-business/distribute-apps-with-management-tool.md @@ -22,7 +22,7 @@ You can configure a mobile device management (MDM) tool to synchronize your Micr Your MDM tool needs to be installed and configured in Azure AD, in the same Azure AD directory used with Microsoft Store. -In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md) and [Manage apps you purchased from the Windows Store for Business with Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/manage-apps-you-purchased-from-the-windows-store-for-business-with-microsoft-intune). +In Azure AD management portal, find the MDM application, and then add it to your directory. Once the MDM has been configured in Azure AD, you can authorize the tool to work with the Microsoft Store for Business or Microsoft Store for Education. This allows the MDM tool to call Microsoft Store management tool services. For more information, see [Configure MDM provider](configure-mdm-provider-windows-store-for-business.md) and [Manage apps you purchased from the Microsoft Store for Business with Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/manage-apps-you-purchased-from-the-windows-store-for-business-with-microsoft-intune). Microsoft Store services provide: @@ -44,11 +44,11 @@ MDM tool requirements: ## Distribute offline-licensed apps -If your vendor doesn’t support the ability to synchronize applications from the management tool services, or can't connect to the management tool services, your vendor may support the ability to deploy offline licensed applications by downloading the application and license from the store and then deploying the app through your MDM. For more information on online and offline licensing with Store for Business, see [Apps in the Windows Store for Business.](apps-in-windows-store-for-business.md#licensing-model) +If your vendor doesn’t support the ability to synchronize applications from the management tool services, or can't connect to the management tool services, your vendor may support the ability to deploy offline licensed applications by downloading the application and license from the store and then deploying the app through your MDM. For more information on online and offline licensing with Store for Business, see [Apps in the Microsoft Store for Business.](apps-in-windows-store-for-business.md#licensing-model) This diagram shows how you can use a management tool to distribute offline-licensed app to employees in your organization. Once synchronized from Store for Business, management tools can use the Windows Management framework to distribute applications to devices. -![Image showing flow for distributing offline-licensed app from Windows Store for Business to employees in your organization.](images/wsfb-offline-distribute-mdm.png) +![Image showing flow for distributing offline-licensed app from Microsoft Store for Business to employees in your organization.](images/wsfb-offline-distribute-mdm.png) ## Distribute online-licensed apps @@ -59,13 +59,4 @@ This diagram shows how you can use a management tool to distribute an online-lic ## Related topics [Configure MDM Provider](configure-mdm-provider-windows-store-for-business.md) -[Manage apps you purchased from the Microsoft Store for Business and Education with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx) - -  - -  - - - - - +[Manage apps you purchased from the Microsoft Store for Business and Education with Microsoft Intune](https://technet.microsoft.com/library/mt676514.aspx) \ No newline at end of file diff --git a/store-for-business/roles-and-permissions-windows-store-for-business.md b/store-for-business/roles-and-permissions-windows-store-for-business.md index 8b3a7e74a3..00de7300ea 100644 --- a/store-for-business/roles-and-permissions-windows-store-for-business.md +++ b/store-for-business/roles-and-permissions-windows-store-for-business.md @@ -89,7 +89,7 @@ These permissions allow people to: 3. Click **Add people**, type a name, choose the role you want to assign, and click **Save** . - + 4. If you don't find the name you want, you might need to add people to your Azure AD directory. For more information, see [Manage user accounts in Microsoft Store for Business and Education](manage-users-and-groups-windows-store-for-business.md). diff --git a/store-for-business/working-with-line-of-business-apps.md b/store-for-business/working-with-line-of-business-apps.md index 1c683c1be0..87dc16ae0e 100644 --- a/store-for-business/working-with-line-of-business-apps.md +++ b/store-for-business/working-with-line-of-business-apps.md @@ -49,7 +49,7 @@ Admins need to invite developer or ISVs to become an LOB publisher. **To invite a developer to become an LOB publisher** -1. Sign in to the [Windows Store for Business]( https://go.microsoft.com/fwlink/p/?LinkId=623531). +1. Sign in to the [Microsoft Store for Business]( https://go.microsoft.com/fwlink/p/?LinkId=623531). 2. Click **Manage**, click **Permissions**, and then choose **Line-of-business publishers**. 3. On the Line-of business publishers page, click **Invite** to send an email invitation to a developer. >[!Note] @@ -98,7 +98,7 @@ After an ISV submits the LOB app for your company or school, someone with Micros After you add the app to your inventory, you can choose how to distribute the app. For more information, see: -- [Distribute apps to your employees from the Windows Store for Business](distribute-apps-to-your-employees-windows-store-for-business.md) +- [Distribute apps to your employees from the Microsoft Store for Business](distribute-apps-to-your-employees-windows-store-for-business.md) - [Distribute apps from your private store](distribute-apps-from-your-private-store.md) From bfaff4d540887bc64e2f364c1d7ea38e02f631b4 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 25 Sep 2017 11:41:07 -0700 Subject: [PATCH 014/115] added screenshot --- ...rive-encryption-tools-to-manage-bitlocker.md | 4 +++- .../bitlocker/images/manage-bde-status.png | Bin 0 -> 11697 bytes 2 files changed, 3 insertions(+), 1 deletion(-) create mode 100644 windows/device-security/bitlocker/images/manage-bde-status.png diff --git a/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md b/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md index 8d48b8aff4..16e23be904 100644 --- a/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md +++ b/windows/device-security/bitlocker/bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md @@ -41,7 +41,9 @@ A good practice when using manage-bde is to determine the volume status on the t ``` syntax manage-bde -status ``` -This command returns the volumes on the target, current encryption status and volume type (operating system or data) for each volume. +This command returns the volumes on the target, current encryption status, encryption method, and volume type (operating system or data) for each volume: + +![Using manage-bde to check encryption status](images/manage-bde-status.png) The following example illustrates enabling BitLocker on a computer without a TPM chip. Before beginning the encryption process you must create the startup key needed for BitLocker and save it to the USB drive. When BitLocker is enabled for the operating system volume, the BitLocker will need to access the USB flash drive to obtain the encryption key (in this example, the drive letter E represents the USB drive). You will be prompted to reboot to complete the encryption process. diff --git a/windows/device-security/bitlocker/images/manage-bde-status.png b/windows/device-security/bitlocker/images/manage-bde-status.png new file mode 100644 index 0000000000000000000000000000000000000000..829cd0f233518a874e203b9ac3750b236d70e4ec GIT binary patch literal 11697 zcmbVyd03L^`|n%RGL5BQ$I42L?^tG=lI2pa(@f>4sUvEZsFaMEC~mli_=f0DF zb#vVE-LCHd0NCR6%PANDthEAwHT%BZ08;XtE4F}NYcMd!pMbI!{R!~Ly5N(pCjp=$ zU1R0adhqwA$X_mC06_Eo>SxWi{m$1w;>H*!*V7yOH)^ia+aUhAy8JKF>GLrsV`HvF zL<7{a&%c1A%`qV9R1gLk9TFK65)lsQZ2DmjNdIn?{&PfRLUc&*l^EbptMt^bY*K?eaAOIn-2l})QFo)MR0;x9!90sfKd)$JO8F%Q8Y!!ChaqXEX-%5;$Y z?JC*lQgnDocrfr*Z|n|8+xYkMvC+sNK%%}m^`F~*jzFV>!eapGXA&EvZCKsr6%rE` z1iYAOGX{Xe2&Ypgy{-m``s`j9byqbolD|g)wescBV)&|jau=SZK92DNBw(TbKN;Z-u0XKr`I(pU#~w7X{lcN zb0*fOT0_v~?z*3Y)A36khn~21ar*65A+n(+%)Xb;JW_HAD_swV zhFjE$Q%u4dbJ@IV?#fkkm1G%mn{&u*2UI;>GT2fC(Snj0F2zj_Sa!%WlDW_0{HeOp zS_Iqr%>s3Lcv+n5+42FSy_sRZB51E*DhDU#-qZ}QZ$Sw)>6WOd1$k(BdLr;*X~e;P z*KNkEW`uGf_`?TvcAV7)5sMigeD(NBbd^XqJOXd~Ml!a1BK)dY+Bet?!CKnNN5m)A zcW;2~-w-#Unv=PgZz)&JWe$$2l}&@4WR*T^Tl6scdOPAdg4~`tq8{v5PB9oQqq{%( z-+?;pRy~#U3J!P0#za@MlEhyJmrY)k%v-6CvM;DksjTt46xGw-4h~gTo5=+8-iM1N z3~O_#a`3u{Lu5VKJq8sWZ=nhM?W@Ic&R;scZKySym+o-!%AUDN_kKu#ZPD`)!IS9C z{K=8}(y`K>L9s2Q3+NU_D@`9tN8$?G}st!7Ee%EPsa!{K$zoA$(j-cM`CZs`V8 zC5{K)KE35gx-p^Fsy9*bWWoQY&uyQ6d;eZF3OdpiAJ@Nfi}`wPj8n8}YNb~$Bx??2 zoo;JLVGyj}B+8e143d3r&#Fga-l-K6(Ebupcd6E_JuxcQcwzy1l+XbxTa2mAn`Kpd zqEm#!6dBYJ&gGgyLUh(Bj|UOm81<$TfQ-ZoCf zAhz-9d`Z`xJLHMY&#PxBe}?9#Cx&woA~;nJ{{qdIhc9N2?f7SDZM zA!Q_r@67hS`Gv47GuO^O{jsNXwl)qg{aiZRP2%&@H6*!Roo@N5Yfo z2{@r}%)depU1oRLCn_rW@`YZRjaA(JZ=N<=kyi#6yB0x{iRV7durHXYImU!enRq&Z4f(*PM!{q&3LrJS~;%zwS-uJ6qnVyEMAoj2_aiP+;MPan?y;P zb9oHPh$e6Lj*ohA&r)fDP9LX2WLg;53j+^A+Wop+oEWF-gY3pe&Mw}$kphp^92&oz z0RQf-?Fa+S>Wpwo@QK%P^Xy)}SqFN&74*MwQ_U>L!@Pdk&7U+o@6z#Ox?A-YDe`v#eN2gk-jNJe~uF9%<^|O#c~;{(koT5EzAG zZq@xigs;CJXj_2<+sj7Yb+9K(ApvTw$CxkOn0njqY|1FghyxnHTS`bZ2B{0NrpoKw zoL!ln*>)ipo=+#7JSOS(AF9|0d@f0hDtPD?5||k+pF`~{a|!sW-^WANn}JKuu8s3?Cb;tcnaxA(R=d8 zSdKYNJiWKdn9jC9{t6F2fMG-ocRbec6hxFpG;widYk{<&g#qUMtN5e$0?#DaH%ndH z!tljmTis8^{t3frceqrDu?`vTOStSdJTXT`Wu?H>bs2I?giH>;^p`hPOfPD3#-^>n zHQc4B_G>nvVoVQQ+HR#zOk8P_cwT%!u(2D#t_2pU%kklF#%JoX8DY-xr_c9ZG^Nxv z=M6;r$!DGs$@gl7Vrs={wKB>RBfT_%L7Kqx5OJH~0(Fety< zc8RXMjfRcluz=M>XmH~clvA&ZsSjw%Q@mNUXvx#PqFc*CosNaK)aA&Ts%2Y9LB>GA zY5Yg7W}ZdRzek~HX0!RIc#g-i&3|LDo24vOw9AkC5|lqH5Q#1aV^u9D1HO@8c{Z9g znU$q?(})v%k8jqOul7hv(*I!BJtRAe!~vXw>el&Kx{u5k$XKkq@^e2=jZU5wA*e(@?4<=GZv8@qr@-(aG;HVnCQq8=bSM_V zzFnU@={7;m4Bb=Ll^i(2XCyr6_eGp-SW0-`#Z8vmoDQ``uqs78SX^0{??JX>!A$R` zuifup^R^bhdN93u?xNkNdTx3(E@9O!5{u?0T5JA3mIz+brlS3kNUf&IC{l}N7us-7 zwuhc2YfNCSO`*cn-e?x-Q4>$KETmNDk-Cn?)tos{_NCjmQ+NR3b~>bS3DGSp&Tu$K zRq|CP6dtQE!MCtbZOJX6LY&E%`aylFhjrK4@&h(sfgDEBW6WuW=h4PY$ze_4Tf`h3w5|$IKx}e9qveFk0^$V z1itZ8n8S6_(9a2$6jte>X^i(h1Pb%n-k`&f%zV@Y+h`acJ>GzHH*{~u1Qnh?%Bp|7 zN7{??+!dc@KSO+sk!PdIjwk6D5c;^gxygH4#ax4pu1i5NHC+pF(CKVP=jGb&u&CFI zn*#2YZ#?dOnW#!;x|!EFSX2o4>j4D1hg zQPzG@&f(JA45@PGb_|m2S!`uFqwP(2S~V6Q4%>LxyRfkAOEfFh;aBF$3xC&=WCW__ zW0!8JxL}9jJx@<|5Cn$SNFEjt<@ZC`v5?%O``cOFw&nZRI*ZS}Xk#@tmp~&xLl^&Lg=Mz)LV19ABsQaYS7z$oA^u zm;oP?qG}MK)1JlYOtHah#5q&?+_E9crIFHBO2VH}Y^Nl9$+f%9 zeDl?wX(yplEPh0O&N?pCKwvf;te|tEW;Y@IizWmx>GQ6W5@=OHv7OUcH^L_ETnM%( zHQ@lA>rTr=)of*xI(K@;&ra`1z5*$lW)K}lcTD%(U*bsZ_*zN5hLjbP4rvKvAxb03 zZlkmi^!di4+8g4iDR1?mpLxeS)5^!7xchVBAe*kS$H)Laz} zK>2GWVJjm%)0Q5PcCl+`pmN@d_gt^jta|{wlU0RgdhNVlGTihX{7kp4$GuAo&xE{) zJseJDbi)14`2dvqH#qr_;0(H^RJnlmWu-TA$|e|pEWRLk4yEw1WK*pFwoKwkV2PhP z4D<|F;{;jWt1I$zXk6>AfiCh-!=Y!{=+XI82OI*I+$T?)h3y<1&I;@ndF2HQ=7Pck zl1ueyP-k(`NERQ8PVvJIF5H6N48E+;c1U`;vSzELiT6IorX&^-cESY7uoD&7>(U?B z-<{ljGJK$;8~3o=LhM=T=H=4{GehV4o@qZt4WO$0mVe3)-2DTh)3!FS;$W+p_WrQ!{dF(!Gi(*zkE9 zR?dL6DJw6`5lyT2re1|Vs&TLk5LM*l)6}7hA@07MU{n4KCH3_|e=FbR<8etTT|S`- z7T(DmpR+xLSYFwmU0wS~5+5F&V7P0Jx2E%z^!dyDL=Wu!Lwa>fA#}V~cIGm&v!HEF&iwi^up@mJl8%2qEb$+&m{``Aa#QLtiPckP;sEO%ifN z%Y@p#53=xywk3kAOFFGSBDq<-(bPrqL@(*&7oqfqS;ubE<85~e5Hc9&H}I|&vdbsN zIo>9AD$K`$=s&aU)ob)Wj58>Uf!h9O_ok;b$kUF9FWIKe(s+_v3p&?|@$ktRJ*Zvn zRoN}#z&X`guUzsyvZp75$7<|wty`+_c2Q7P9+RX-&GtS_Y3NYa$WThB6wcpH*+Ef_ zUh$_Qhp%iVUv4V#Q`ozAbn1q3bXjNbbrSjQm3|5jf#EhNO6y05%gP@s{Px3iHImF) zk5V-rWGjZ+`Kt4~1Pl)p0i~`?`?ABb`9YP39xIRQ$?_xSC>Nq|to@^1cLRBgP)=uZ z;5gk!z$z^d3iG9^wu^lA_l;F4dL0?cbo(Et_tWW5ZoF5^i z!p!>MP5b~}xkXqXt4*3UeW%_(e+!X$Dy$*~3uJ#7uOmK5MRjk2PmRYtFH8+;Qp8C= zNj*;~>C2_q6{ahZ9iuL^PE^xdB7(RH31t-=)@|VoYo?bWMX#9jTi#XWKm_S#!#3VL0r)%@wr@|Ga3u080-~`LEjeg4NSYdcFxD)+@%cWIAJ!wce1eJ&0`J0UDK>P3 zU!EM%bay}WUTL%>^b}eqJq&T^Vl_XE86eGt#Mva8VlP1Nm51eh8g&%oaN3eBz>#u~ z`0$anrMe+W*GWREMx2+aw`HK9JuxnS|7a3R4HhS3qx>r#Is?*D?+~@`FSTBMUMny~ z&KQL+4*UFKiymSDopZO%i>fZRL^J`wm=!9@v-%o0By6R3U7+zn_jzZu^Z%NJtp()t zsR8CA>rF-DA9vPuIr%`eUAdW$0vlwzFlpVGCD)MN6Y?sn>MFm<-VH!lRn-OgTExBb zhnI^#?^5buT>Ik)s6Z}_fJCN-uwx;Z`bsU}`0Wb>;XaEC&l`EXZE>*ID<4Ts>HLn$ z92te~f(1jP!@VE!k6TFK(jPkLe;jA^y?`*KaK$+tgzPx|tSPrGnrSar$S2<{=MDF?AZCGSeQU{X>`8+ zt0{=BbB+my&gkmIojk%>`=Py?MYIqw&|pc7o0vf#xbWq0#S5?;=6vZJs_(z>C^6p1 zcYnw(js0MSOa(I(jrBGa?*6uisj+JUm$U#t-)A9RHoDysf9Y$}^X;0g?|*6wgL~B2 zH**+4q0QQRinbCaq-%h21NN_*!8*LHFBrsp-v%N7s>+Ybk69gDdUXGUgL{4~Ep4F8 zjG|;tKLgn=hAlqPdz7L4_}KT_x4F8byj-C zVxQ*$z{@8c+pXf-W)rR#XdJKkWA(vD=%``c!}uSLWfC3Yr;WPtYe75I2eaP{Ff*Yq zHn&ByX6dCb{K;d(f>*_b;9KoTSHr=3jR|^Pegoui`1=1lRPfK}@?S#ZZz2=1Ny

    h@$Hl}8{O#zq*N#sIhezu+U-|yN zIorg%v~tT?k0jOwY44#?#@!YXRa}tW|5yP4C+_(6zG%A@a~2;nxXll1c89lYG@`#C z9LdI1ok7=j%BU(0GKs(88dHA^eSrC|G1I3O=C^t7{=Zs4z0V*k>BJ_Ib$LD}>_B2m zS?gGiVm;7bx6-o1A-BDae6JgUNJx|R#>s54%r~$yICRe@qxdT~Eo)pXjCkCg{643a(D?Sapue}GOG%n=6J2ry;v|2tKPu2SRQrS!k< zdSx;zgy3wxI1NLJCB{g^t=+8xY}{BxTp~1w}6EvMpz&4ag-VEsJrsmD*-|X zclr1+s(XE3Hm0i!qVo-4dK$doo)mW7sh3*R;bR+5)XT?r3XcNM4dzR}s>;u?OQ+Z6 z%XMexQ#6H)LUxuts>uI~X%5QtJR<$=yDt`3X!ax{OX_6xpK+DhUQb%3u= zLB~3@+f{SkHuhP1Bc<_7SduT-?I;DyU1ED7+TZx;nH16y#n7-kAJ0|BkL+G4tUL2S z4l1;)g}sB$KF5D5gqt6X+v7i4$rA?ew;Op18dNA=kJy4col!{ zRlXL5^!D!U;p4Y5DEQg@isX97_5$1cHkW~Gq5jGi*U(2f)$iSYA(5{{FMHJFoYP_R z;!Fk#Eoe&EPI7srpR0lu#!I(5D5`li8l5n?U!etr4yj3NL2(Tp`$soPbBUgz?md}K zKG8k7us7=n9iD6tEkJRYF<6o<9<#{SjXQjm2qxKwz?B#{XJP~QK!ehCpeQ7Wm+z>?k08maDZ@kOH5%ajwz*KwX!) zdsD`wMy{}fr%PGc3OC;76QXD7DvQzMkR+q1D~I9G4sK_6s0&f-F(M~h+skb;$<_hX zI9t7As1NmB*xYlIhzzZZY#H5a5A#z`O2Dak<@zs(BTHBBSKO08@*;cqxX{%|;a@u%0k=Rw1vddw8~)Vf`DXe!&PR545IWQ->5 zV4GCt4O`Uj{zh=e7b9i!@CP7oL9Eus$|6C!_P|P=S*B?{z0^4f%W8|Z5Gh`HIKZ5h zI$##Ll;8m=AyY#RXNZW-muUoCs9+w;uX40@zP^Q*klx`d`;dt#%=DQ5fCO019&VhdH@ z(R5yec@@HEWHN;hLRHXuIy9lWbkteml7E%j{hq_6MJ(*?V;Es``qJ_=5S=MQhjNYc zcQB9Im*4JmughF~L8h!cAj#fGeDn6c{(KA3?Flh5;aAuci*XpJgaE6PkV9&1gz&7F#Z6HHRFRCfJtcBn9ab~E1C)$tJc%j zK9^BA4;@7N3jLLta{_gTVdHDbX)kD97cHMvNgv=da%As06+zJn`Ce9&AI^IW+#(ue zhBWBnA%FVe8dCW4X292PWw(ZI&OLPHK6FP7WJj(6EYA1p-*uZQE^=a3M%c~T0RLTQ z6p!>u80;a&RfQ1>(}M3FwzBAdT+uniiEgQoq}kfvFPQ$h)F@rK>$w^!pGg;YE1@(8 z3x^=0N?;isl>debBFS~xtGGf7PnC3MnV!+-kx-UiknHx=ddetRLQ&@rG4s7dgly+_%m+o%tm*2poh-2 zBjn4DTK-pfFy5`0U`W%VNKbp6X`9Amra<$-x54(4R#fyE_CR@#JipKmafTA;l4zRu zD#0RO)h*2XKj6!%U6l||!EU`GuLu;rl&L`ImDBN|>aYY{847u~GtP7DF6NVs)vI9@ zuz%-fgMY#6HP2;`cYXA-$s_KhT^bH$x$1c29F!n3=UpnxR3*+L!91w%7hqh@{<`$} zJvrnI~i1lCP%Xj*kqTiA$VJ69#_z>P95| z#>A0_>o60@T$@=`z0Z76>ZOA!eNh(=+CcOu^-J|rCsBsAR~bG|%nLiIc*Co5-3fvF zq)rTXa(-(O+bsr%kL|d2w?31Qg&KYlb5?3?IY0D;bH7_RHpI_@(1JYTqsZAlO3U$e zI6d6b>gcDb*fr5}PGPkq+pYSh4ry#g?eg{6*w<;0^zZsgwlPHo!Ko9GT>peJ&gC+V zWUDSQWYv=1u!`E1QbmBxZmK-giB>LXJrNj^n8Db9wuavwhj?*}vM}*nO9GJvaJCAS|WJDiV7*{NQqC(B%7~ zDqt<=-IU(AMvC6W_5a!SF;mASeqwI$tNuV3E99`B#vr=-tyI?jEm;n%V_0E)JQx1< zC|HkmX)d4-*t9lc`rJ$s>vL@K7%?jq(>D%U(LELHE+vBRzugjene&0L4eRFO{)Q$N ztwp-0y?lA!a4qZa5a<;5bzTHdzQ%R)oW(yD95cQ2vU^sI+xSkhP7T z`e~HPmj_0OaZ3GCNL@xHRlG*O33Scpn(ID?hbFL1^3A=A9V}Sho{ZR<+nw4TwWMs1 z9zPtps~WeCAKWAzn0aUt%D^ZfVB17V6_@5zmkNw1mPPd&BM;wEu_-X!eauLc*wzQ# ziI+Y%NFvI^$f45K_KKaJjE_rGcZW+VXQ`?tdsA8jjbq&90Cd-wI$#QPM~zIs?7}2> z!(TnjoAGJh`y#B5QhypLU?t{cH9D*{U>nuLkfz#tfb@peR^yC)pC}7U;V3nHN-%GI zz&(T=PZ9fD6VR&1UkDf8uF0A>LS~9}VT9I$qbZ$7OVOVV5Ft!IZ1V!xN_ajpbO>w? zDBir#@|+Z42d8E)P-iU^oxX)MB6IkVNmfdE0+>SHdF-VgyQlSahoMMe9%w2JW%79{WX@wcNP3&~QV1Ped9+qIX&mIUHolD8>U2kn1uPxP;`dW@< z7dYu`TBtgX5*X;`8wA<3lq4s_NhS8LCZFoBQz0&IC4 zF|*Qv`2_;JbkqeyZri%Nnz!6%JiJpV4vwF|eNbh#klRkcinRc^_4I7-d8$T*y6I?E z!~)h9Vhpy@?(#kCp(uhgE*FZ$9X@2Gq9V6tic#qit_s7BJ0#fyA(%D!%GiH(@@0SZ z@c&~f?9Pg|LuMj$fW5?~_Xcl4$?1~dZS*SxX(>X58J)l)w#ibM^>3G$u@KU@4zM`+ zYkc_hX}kFAi20#e<4@bEo5Ee;l@~rh1V(9>(7i_dJXAVv?X_A^G#h9dH*=iKeF_Uz zJ1|nhme6$fEjxb(Q32^hNZ;dHpyx|Dih{87W&@l^E zIU?VzGB1qV;n2h=z~b&7dUy{aMi_v@#^t2%OKX3 z5rIVQ%-xr79)xUIfC=(Qj3Dgh=9GC0S6TEyXHN@J3Jkx6>T^%jA%z+h|CMAN2%Gj( zqY0&6$}8$C~aeq05$(5$}7k6!asQD?Xg2wasYRfpH9)7z?GSN1PO z%&bo%8gngXzSlSfocHx%V~`648Zl*Hcb&SWiQ@w^?V>k!=u&pDBC63%%SSsiq&T>T z-~_W9<*YvCf^z~PO(=3iE)+PUQ(l~L z6664VS*K9ZaVcDV5Qu@^VPalO4BykC+*ljh_|DLotNm@_H9$8XlagD2jl9}iV;Rc) z{T6ZYB#3Pt9%M2oETvR12##M}oe@#(aNGR0n@gGVI)w^_MLJbB; zv`X-0+E%=50iZB3JZeuodgKRb_1gy5ya(GUT&np=7ln&!KTVM}HQ?2%nxIS34ItX} zDFNIX;n>4z9e-XuI#Mh$ZQTfh($l{Dve}#A!tED9=eH5KSo{GCZ)|s>nJ4?w)5dxl z65R7ua2FxtmDriH0k~#lw{$&FyRYKJ``KPugE=Eo9P8p-5y}rYY3J8J5W|rvFF^3g z#pd(SWjE_h$ClRuU&ue>wqd`UIS2reJ54XIVr-^AS5;}_uVW@s^aw)734^D6Y!c@# zg98BB1DDt)wDmRLiZ#9`7YXpK1p;c_zd-uF>{+(Xey!N-j{Pb`C+WFysn3l=iAcecB^xT=?1-{G^ z;y*$qt_SeXc7VX)n)rWAf6mdpDC6;=`IUC(ixH~Vr%c42Jd7)txn&4Fi`n%l;chrgRWMR1MsnB+P&yS-j zsg)v Date: Mon, 25 Sep 2017 12:39:01 -0700 Subject: [PATCH 015/115] added fixed up video icon from design and updated links to the image --- bcs/images/icon_video.svg | 59 +++++++++++++++++++++++++++++++++++++++ bcs/index.md | 12 ++++---- 2 files changed, 65 insertions(+), 6 deletions(-) create mode 100644 bcs/images/icon_video.svg diff --git a/bcs/images/icon_video.svg b/bcs/images/icon_video.svg new file mode 100644 index 0000000000..76aebcbd5b --- /dev/null +++ b/bcs/images/icon_video.svg @@ -0,0 +1,59 @@ + + + + + 5 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/bcs/index.md b/bcs/index.md index ba65b5d1ac..e36c8f7436 100644 --- a/bcs/index.md +++ b/bcs/index.md @@ -786,7 +786,7 @@ description: Learn about the product documentation and resources available for M
    - Set up Microsoft 365 Business + Set up Microsoft 365 Business
    @@ -805,7 +805,7 @@ description: Learn about the product documentation and resources available for M
    - Secure Windows 10 devices with Microsoft 365 Business + Secure Windows 10 devices with Microsoft 365 Business
    @@ -824,7 +824,7 @@ description: Learn about the product documentation and resources available for M
    - Secure Microsoft Office apps on iOS devices with Microsoft 365 Business + Secure Microsoft Office apps on iOS devices with Microsoft 365 Business
    @@ -843,7 +843,7 @@ description: Learn about the product documentation and resources available for M
    - Set up Windows devices for Microsoft 365 Business + Set up Windows devices for Microsoft 365 Business
    @@ -862,7 +862,7 @@ description: Learn about the product documentation and resources available for M
    - Demo: Microsoft 365 Business first run experience + Demo: Microsoft 365 Business first run experience
    @@ -881,7 +881,7 @@ description: Learn about the product documentation and resources available for M
    - Demo: Secure data and end user devices with Microsoft 365 Business + Demo: Secure data and end user devices with Microsoft 365 Business
    From 56c1a61afad273ee2110dbd129859320366fec9a Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 25 Sep 2017 19:44:29 +0000 Subject: [PATCH 016/115] Merged PR 3409: Fixed scripts for Surface Hub --- ...pendix-a-powershell-scripts-for-surface-hub.md | 15 ++------------- devices/surface-hub/change-history-surface-hub.md | 3 ++- 2 files changed, 4 insertions(+), 14 deletions(-) diff --git a/devices/surface-hub/appendix-a-powershell-scripts-for-surface-hub.md b/devices/surface-hub/appendix-a-powershell-scripts-for-surface-hub.md index 308ce30051..03fe635e2e 100644 --- a/devices/surface-hub/appendix-a-powershell-scripts-for-surface-hub.md +++ b/devices/surface-hub/appendix-a-powershell-scripts-for-surface-hub.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: surfacehub author: jdeckerms ms.author: jdecker -ms.date: 08/16/2017 +ms.date: 09/25/2017 ms.localizationpriority: medium --- @@ -298,11 +298,6 @@ PrintSuccess "Connected to Lync Server Remote PowerShell" Import-PSSession $sessExchange -AllowClobber -WarningAction SilentlyContinue Import-PSSession $sessLync -AllowClobber -WarningAction SilentlyContinue -# In case there was any uncaught errors -ExitIfError("Remote connections failed. Please check your credentials and try again.") - - - ## Create the Exchange mailbox ## # Note: These exchange commandlets do not always throw their errors as exceptions @@ -669,11 +664,6 @@ catch Import-PSSession $sessExchange -AllowClobber -WarningAction SilentlyContinue Import-PSSession $sessCS -AllowClobber -WarningAction SilentlyContinue - -# In case there was any uncaught errors -ExitIfError "Remote connection failed. Please check your credentials and try again." - - ## Create the Exchange mailbox ## # Note: These exchange commandlets do not always throw their errors as exceptions @@ -1571,8 +1561,7 @@ catch Import-PSSession $sessCS -AllowClobber -# In case there was any uncaught errors -ExitIfError("Remote connection failed. Please check your credentials and try again.") + Write-Host "--------------------------------------------------------------." -foregroundcolor "magenta" # Getting registrar pool diff --git a/devices/surface-hub/change-history-surface-hub.md b/devices/surface-hub/change-history-surface-hub.md index fc50a8188d..2d6c513d65 100644 --- a/devices/surface-hub/change-history-surface-hub.md +++ b/devices/surface-hub/change-history-surface-hub.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: surfacehub author: jdeckerms ms.author: jdecker -ms.date: 08/17/2017 +ms.date: 09/25/2017 ms.localizationpriority: medium --- @@ -21,6 +21,7 @@ This topic lists new and updated topics in the [Surface Hub Admin Guide]( surfac New or changed topic | Description --- | --- [Top support solutions for Surface Hub](support-solutions-surface-hub.md) | New +[PowerShell for Surface Hub](appendix-a-powershell-scripts-for-surface-hub.md) | Updated account creation scripts ## August 2017 From 7f488f15acc328463858e37d8d48b93d943ebeeb Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Mon, 25 Sep 2017 13:32:35 -0700 Subject: [PATCH 017/115] added edu illustration for M365 main hub and added entry for it in Microsoft Education hub --- education/images/M365-education.svg | 171 ++++++++++++++++++++++++ education/index.md | 85 +++++++----- microsoft-365/images/M365-education.svg | 171 ++++++++++++++++++++++++ microsoft-365/index.md | 28 +++- 4 files changed, 418 insertions(+), 37 deletions(-) create mode 100644 education/images/M365-education.svg create mode 100644 microsoft-365/images/M365-education.svg diff --git a/education/images/M365-education.svg b/education/images/M365-education.svg new file mode 100644 index 0000000000..7f83629296 --- /dev/null +++ b/education/images/M365-education.svg @@ -0,0 +1,171 @@ + + + + + M365-education + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/education/index.md b/education/index.md index bb44bf632a..848905d3bb 100644 --- a/education/index.md +++ b/education/index.md @@ -1,7 +1,7 @@ --- layout: HubPage hide_bc: true -title: Microsoft Education documentation and resources | Microsoft Docs +title: Microsoft 365 Education documentation and resources | Microsoft Docs description: Learn about product documentation and resources available for school IT administrators, teachers, students, and education app developers. author: CelesteDG ms.author: celested @@ -10,7 +10,7 @@ ms.author: celested