mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 23:07:23 +00:00
Merge pull request #5098 from MicrosoftDocs/master
Publish 04/26/2021, 10:30 AM
This commit is contained in:
commit
c7092caa77
@ -1 +0,0 @@
|
||||
# [Index](index.md)
|
2
bcs/TOC.yml
Normal file
2
bcs/TOC.yml
Normal file
@ -0,0 +1,2 @@
|
||||
- name: Index
|
||||
href: index.md
|
@ -1,3 +0,0 @@
|
||||
# Table of Contents
|
||||
## [Microsoft Edge](edge/index.md)
|
||||
## [Internet Explorer 11](internet-explorer/index.md)
|
6
browsers/TOC.yml
Normal file
6
browsers/TOC.yml
Normal file
@ -0,0 +1,6 @@
|
||||
- name: Table of Contents
|
||||
items:
|
||||
- name: Microsoft Edge
|
||||
href: edge/index.md
|
||||
- name: Internet Explorer 11
|
||||
href: internet-explorer/index.md
|
@ -1,33 +0,0 @@
|
||||
# [Microsoft Edge deployment for IT Pros](index.yml)
|
||||
|
||||
## [System requirements and supported languages](about-microsoft-edge.md)
|
||||
|
||||
## [Use Enterprise Mode to improve compatibility](emie-to-improve-compatibility.md)
|
||||
|
||||
## [Deploy Microsoft Edge kiosk mode](microsoft-edge-kiosk-mode-deploy.md)
|
||||
|
||||
## [Group policies & configuration options](group-policies/index.yml)
|
||||
### [Address bar](group-policies/address-bar-settings-gp.md)
|
||||
### [Adobe Flash](group-policies/adobe-settings-gp.md)
|
||||
### [Books Library](group-policies/books-library-management-gp.md)
|
||||
### [Browser experience](group-policies/browser-settings-management-gp.md)
|
||||
### [Developer tools](group-policies/developer-settings-gp.md)
|
||||
### [Extensions](group-policies/extensions-management-gp.md)
|
||||
### [Favorites](group-policies/favorites-management-gp.md)
|
||||
### [Home button](group-policies/home-button-gp.md)
|
||||
### [Interoperability and enterprise mode guidance](group-policies/interoperability-enterprise-guidance-gp.md)
|
||||
### [Kiosk mode deployment in Microsoft Edge](microsoft-edge-kiosk-mode-deploy.md)
|
||||
### [New Tab page](group-policies/new-tab-page-settings-gp.md)
|
||||
### [Prelaunch Microsoft Edge and preload tabs](group-policies/prelaunch-preload-gp.md)
|
||||
### [Search engine customization](group-policies/search-engine-customization-gp.md)
|
||||
### [Security and privacy](group-policies/security-privacy-management-gp.md)
|
||||
### [Start page](group-policies/start-pages-gp.md)
|
||||
### [Sync browser](group-policies/sync-browser-settings-gp.md)
|
||||
### [Telemetry and data collection](group-policies/telemetry-management-gp.md)
|
||||
|
||||
|
||||
## [Change history for Microsoft Edge](change-history-for-microsoft-edge.md)
|
||||
|
||||
## [Microsoft Edge Frequently Asked Questions (FAQ)](microsoft-edge-faq.yml)
|
||||
|
||||
|
50
browsers/edge/TOC.yml
Normal file
50
browsers/edge/TOC.yml
Normal file
@ -0,0 +1,50 @@
|
||||
- name: Microsoft Edge deployment for IT Pros
|
||||
href: index.yml
|
||||
items:
|
||||
- name: System requirements and supported languages
|
||||
href: about-microsoft-edge.md
|
||||
- name: Use Enterprise Mode to improve compatibility
|
||||
href: emie-to-improve-compatibility.md
|
||||
- name: Deploy Microsoft Edge kiosk mode
|
||||
href: microsoft-edge-kiosk-mode-deploy.md
|
||||
- name: Group policies & configuration options
|
||||
href: group-policies/index.yml
|
||||
items:
|
||||
- name: Address bar
|
||||
href: group-policies/address-bar-settings-gp.md
|
||||
- name: Adobe Flash
|
||||
href: group-policies/adobe-settings-gp.md
|
||||
- name: Books Library
|
||||
href: group-policies/books-library-management-gp.md
|
||||
- name: Browser experience
|
||||
href: group-policies/browser-settings-management-gp.md
|
||||
- name: Developer tools
|
||||
href: group-policies/developer-settings-gp.md
|
||||
- name: Extensions
|
||||
href: group-policies/extensions-management-gp.md
|
||||
- name: Favorites
|
||||
href: group-policies/favorites-management-gp.md
|
||||
- name: Home button
|
||||
href: group-policies/home-button-gp.md
|
||||
- name: Interoperability and enterprise mode guidance
|
||||
href: group-policies/interoperability-enterprise-guidance-gp.md
|
||||
- name: Kiosk mode deployment in Microsoft Edge
|
||||
href: microsoft-edge-kiosk-mode-deploy.md
|
||||
- name: New Tab page
|
||||
href: group-policies/new-tab-page-settings-gp.md
|
||||
- name: Prelaunch Microsoft Edge and preload tabs
|
||||
href: group-policies/prelaunch-preload-gp.md
|
||||
- name: Search engine customization
|
||||
href: group-policies/search-engine-customization-gp.md
|
||||
- name: Security and privacy
|
||||
href: group-policies/security-privacy-management-gp.md
|
||||
- name: Start page
|
||||
href: group-policies/start-pages-gp.md
|
||||
- name: Sync browser
|
||||
href: group-policies/sync-browser-settings-gp.md
|
||||
- name: Telemetry and data collection
|
||||
href: group-policies/telemetry-management-gp.md
|
||||
- name: Change history for Microsoft Edge
|
||||
href: change-history-for-microsoft-edge.md
|
||||
- name: Microsoft Edge Frequently Asked Questions (FAQ)
|
||||
href: microsoft-edge-faq.yml
|
@ -1,191 +0,0 @@
|
||||
# [IE11 Deployment Guide for IT Pros](ie11-deploy-guide/index.md)
|
||||
|
||||
## [Change history for the Internet Explorer 11 (IE11) Deployment Guide](ie11-deploy-guide/change-history-for-internet-explorer-11.md)
|
||||
|
||||
## [System requirements and language support for Internet Explorer 11](ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md)
|
||||
|
||||
## [List of updated features and tools - Internet Explorer 11 (IE11)](ie11-deploy-guide/updated-features-and-tools-with-ie11.md)
|
||||
|
||||
## [Install and Deploy Internet Explorer 11 (IE11)](ie11-deploy-guide/install-and-deploy-ie11.md)
|
||||
### [Customize Internet Explorer 11 installation packages](ie11-deploy-guide/customize-ie11-install-packages.md)
|
||||
#### [Using IEAK 11 to create packages](ie11-deploy-guide/using-ieak11-to-create-install-packages.md)
|
||||
#### [Create packages for multiple operating systems or languages](ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md)
|
||||
#### [Using .INF files to create packages](ie11-deploy-guide/using-inf-files-to-create-install-packages.md)
|
||||
### [Choose how to install Internet Explorer 11 (IE11)](ie11-deploy-guide/choose-how-to-install-ie11.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - System Center 2012 R2 Configuration Manager](ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - Windows Server Update Services (WSUS)](ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - Microsoft Intune](ie11-deploy-guide/install-ie11-using-microsoft-intune.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - Network](ie11-deploy-guide/install-ie11-using-the-network.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - Operating system deployment systems](ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md)
|
||||
#### [Install Internet Explorer 11 (IE11) - Third-party tools](ie11-deploy-guide/install-ie11-using-third-party-tools.md)
|
||||
### [Choose how to deploy Internet Explorer 11 (IE11)](ie11-deploy-guide/choose-how-to-deploy-ie11.md)
|
||||
#### [Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS)](ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md)
|
||||
#### [Deploy Internet Explorer 11 using software distribution tools](ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md)
|
||||
### [Virtualization and compatibility with Internet Explorer 11](ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md)
|
||||
|
||||
## [Collect data using Enterprise Site Discovery](ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md)
|
||||
|
||||
## [Enterprise Mode for Internet Explorer 11 (IE11)](ie11-deploy-guide/enterprise-mode-overview-for-ie11.md)
|
||||
### [Tips and tricks to manage Internet Explorer compatibility](ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md)
|
||||
### [Enterprise Mode and the Enterprise Mode Site List](ie11-deploy-guide/what-is-enterprise-mode.md)
|
||||
### [Set up Enterprise Mode logging and data collection](ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md)
|
||||
### [Turn on Enterprise Mode and use a site list](ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md)
|
||||
### [Enterprise Mode schema v.2 guidance](ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md)
|
||||
### [Enterprise Mode schema v.1 guidance](ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md)
|
||||
### [Check for a new Enterprise Mode site list xml file](ie11-deploy-guide/check-for-new-enterprise-mode-site-list-xml-file.md)
|
||||
### [Turn on local control and logging for Enterprise Mode](ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md)
|
||||
### [Use the Enterprise Mode Site List Manager](ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)](ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md)
|
||||
#### [Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)](ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md)
|
||||
#### [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)](ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md)
|
||||
#### [Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)](ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md)
|
||||
#### [Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager](ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Fix validation problems using the Enterprise Mode Site List Manager](ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Search your Enterprise Mode site list in the Enterprise Mode Site List Manager](ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Save your site list to XML in the Enterprise Mode Site List Manager](ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Export your Enterprise Mode site list from the Enterprise Mode Site List Manager](ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Import your Enterprise Mode site list to the Enterprise Mode Site List Manager](ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager](ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md)
|
||||
#### [Review neutral sites for Internet Explorer mode using the Enterprise Mode Site List Manager](ie11-deploy-guide/review-neutral-sites-with-site-list-manager.md)
|
||||
### [Use the Enterprise Mode Site List Portal](ie11-deploy-guide/use-the-enterprise-mode-portal.md)
|
||||
#### [Set up the Enterprise Mode Site List Portal](ie11-deploy-guide/set-up-enterprise-mode-portal.md)
|
||||
##### [Use the Settings page to finish setting up the Enterprise Mode Site List Portal](ie11-deploy-guide/configure-settings-enterprise-mode-portal.md)
|
||||
##### [Add employees to the Enterprise Mode Site List Portal](ie11-deploy-guide/add-employees-enterprise-mode-portal.md)
|
||||
#### [Workflow-based processes for employees using the Enterprise Mode Site List Portal](ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md)
|
||||
##### [Create a change request using the Enterprise Mode Site List Portal](ie11-deploy-guide/create-change-request-enterprise-mode-portal.md)
|
||||
##### [Verify your changes using the Enterprise Mode Site List Portal](ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md)
|
||||
##### [Approve a change request using the Enterprise Mode Site List Portal](ie11-deploy-guide/approve-change-request-enterprise-mode-portal.md)
|
||||
##### [Schedule approved change requests for production using the Enterprise Mode Site List Portal](ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md)
|
||||
##### [Verify the change request update in the production environment using the Enterprise Mode Site List Portal](ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md)
|
||||
##### [View the apps currently on the Enterprise Mode Site List](ie11-deploy-guide/view-apps-enterprise-mode-site-list.md)
|
||||
##### [View the available Enterprise Mode reports from the Enterprise Mode Site List Portal](ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md)
|
||||
### [Using IE7 Enterprise Mode or IE8 Enterprise Mode](ie11-deploy-guide/using-enterprise-mode.md)
|
||||
### [Fix web compatibility issues using document modes and the Enterprise Mode site list](ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md)
|
||||
### [Remove sites from a local Enterprise Mode site list](ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md)
|
||||
### [Remove sites from a local compatibility view list](ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md)
|
||||
### [Turn off Enterprise Mode](ie11-deploy-guide/turn-off-enterprise-mode.md)
|
||||
|
||||
|
||||
## [Group Policy and Internet Explorer 11 (IE11)](ie11-deploy-guide/group-policy-and-ie11.md)
|
||||
### [Group Policy management tools](ie11-deploy-guide/group-policy-objects-and-ie11.md)
|
||||
#### [Group Policy and the Group Policy Management Console (GPMC)](ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md)
|
||||
#### [Group Policy and the Local Group Policy Editor](ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md)
|
||||
#### [Group Policy and Advanced Group Policy Management (AGPM)](ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md)
|
||||
#### [Group Policy and Windows Powershell](ie11-deploy-guide/group-policy-windows-powershell-ie11.md)
|
||||
#### [Group Policy and Shortcut Extensions](ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md)
|
||||
### [New group policy settings for Internet Explorer 11](ie11-deploy-guide/new-group-policy-settings-for-ie11.md)
|
||||
### [Set the default browser using Group Policy](ie11-deploy-guide/set-the-default-browser-using-group-policy.md)
|
||||
### [ActiveX installation using group policy](ie11-deploy-guide/activex-installation-using-group-policy.md)
|
||||
### [Group Policy and compatibility with Internet Explorer 11](ie11-deploy-guide/group-policy-compatibility-with-ie11.md)
|
||||
### [Group policy preferences and Internet Explorer 11](ie11-deploy-guide/group-policy-preferences-and-ie11.md)
|
||||
### [Administrative templates and Internet Explorer 11](ie11-deploy-guide/administrative-templates-and-ie11.md)
|
||||
### [Enable and disable add-ons using administrative templates and group policy](ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md)
|
||||
|
||||
## [Manage Internet Explorer 11](ie11-deploy-guide/manage-ie11-overview.md)
|
||||
### [Auto detect settings Internet Explorer 11](ie11-deploy-guide/auto-detect-settings-for-ie11.md)
|
||||
### [Auto configuration settings for Internet Explorer 11](ie11-deploy-guide/auto-configuration-settings-for-ie11.md)
|
||||
### [Auto proxy configuration settings for Internet Explorer 11](ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md)
|
||||
|
||||
## [Troubleshoot Internet Explorer 11 (IE11)](ie11-deploy-guide/troubleshoot-ie11.md)
|
||||
### [Setup problems with Internet Explorer 11](ie11-deploy-guide/setup-problems-with-ie11.md)
|
||||
### [Install problems with Internet Explorer 11](ie11-deploy-guide/install-problems-with-ie11.md)
|
||||
### [Problems after installing Internet Explorer 11](ie11-deploy-guide/problems-after-installing-ie11.md)
|
||||
### [Auto configuration and auto proxy problems with Internet Explorer 11](ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md)
|
||||
### [User interface problems with Internet Explorer 11](ie11-deploy-guide/user-interface-problems-with-ie11.md)
|
||||
### [Group Policy problems with Internet Explorer 11](ie11-deploy-guide/group-policy-problems-ie11.md)
|
||||
### [.NET Framework problems with Internet Explorer 11](ie11-deploy-guide/net-framework-problems-with-ie11.md)
|
||||
### [Enhanced Protected Mode problems with Internet Explorer](ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md)
|
||||
### [Fix font rendering problems by turning off natural metrics](ie11-deploy-guide/turn-off-natural-metrics.md)
|
||||
### [Intranet problems with Internet Explorer 11](ie11-deploy-guide/intranet-problems-and-ie11.md)
|
||||
### [Browser cache changes and roaming profiles](ie11-deploy-guide/browser-cache-changes-and-roaming-profiles.md)
|
||||
|
||||
## [Out-of-date ActiveX control blocking](ie11-deploy-guide/out-of-date-activex-control-blocking.md)
|
||||
### [Blocked out-of-date ActiveX controls](ie11-deploy-guide/blocked-out-of-date-activex-controls.md)
|
||||
|
||||
## [Deprecated document modes and Internet Explorer 11](ie11-deploy-guide/deprecated-document-modes.md)
|
||||
|
||||
## [What is the Internet Explorer 11 Blocker Toolkit?](ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md)
|
||||
### [Internet Explorer 11 delivery through automatic updates](ie11-deploy-guide/ie11-delivery-through-automatic-updates.md)
|
||||
### [Internet Explorer 11 Blocker Toolkit FAQ](ie11-faq/faq-ie11-blocker-toolkit.md)
|
||||
|
||||
## [Missing Internet Explorer Maintenance settings for Internet Explorer 11](ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md)
|
||||
|
||||
## [Missing the Compatibility View Button](ie11-deploy-guide/missing-the-compatibility-view-button.md)
|
||||
|
||||
## [Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013](ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md)
|
||||
|
||||
# [IE11 Frequently Asked Questions (FAQ) Guide for IT Pros](ie11-faq/faq-for-it-pros-ie11.md)
|
||||
|
||||
# [Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros](ie11-ieak/index.md)
|
||||
## [What IEAK can do for you](ie11-ieak/what-ieak-can-do-for-you.md)
|
||||
## [Internet Explorer Administration Kit (IEAK) information and downloads](ie11-ieak/ieak-information-and-downloads.md)
|
||||
## [Before you start using IEAK 11](ie11-ieak/before-you-create-custom-pkgs-ieak11.md)
|
||||
### [Hardware and software requirements for IEAK 11](ie11-ieak/hardware-and-software-reqs-ieak11.md)
|
||||
### [Determine the licensing version and features to use in IEAK 11](ie11-ieak/licensing-version-and-features-ieak11.md)
|
||||
### [Security features and IEAK 11](ie11-ieak/security-and-ieak11.md)
|
||||
### [File types used or created by IEAK 11](ie11-ieak/file-types-ieak11.md)
|
||||
### [Tasks and references to consider before creating and deploying custom packages using IEAK 11](ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md)
|
||||
### [Create the build computer folder structure using IEAK 11](ie11-ieak/create-build-folder-structure-ieak11.md)
|
||||
### [Set up auto detection for DHCP or DNS servers using IEAK 11](ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md)
|
||||
### [Use proxy auto-configuration (.pac) files with IEAK 11](ie11-ieak/proxy-auto-config-examples.md)
|
||||
### [Customize the toolbar button and Favorites List icons using IEAK 11](ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md)
|
||||
### [Use the uninstallation .INF files to uninstall custom components](ie11-ieak/create-uninstall-inf-files-for-custom-components.md)
|
||||
### [Add and approve ActiveX controls using the IEAK 11](ie11-ieak/add-and-approve-activex-controls-ieak11.md)
|
||||
### [Register an uninstall app for custom components using IEAK 11](ie11-ieak/register-uninstall-app-ieak11.md)
|
||||
### [Customize Automatic Search for Internet Explorer using IEAK 11](ie11-ieak/customize-automatic-search-for-ie.md)
|
||||
### [Create multiple versions of your custom package using IEAK 11](ie11-ieak/create-multiple-browser-packages-ieak11.md)
|
||||
### [Before you install your package over your network using IEAK 11](ie11-ieak/prep-network-install-with-ieak11.md)
|
||||
### [Use the RSoP snap-in to review policy settings](ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md)
|
||||
### [IEAK 11 - Frequently Asked Questions](ie11-faq/faq-ieak11.md)
|
||||
### [Troubleshoot custom package and IEAK 11 problems](ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md)
|
||||
|
||||
## [Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options](ie11-ieak/ieak11-wizard-custom-options.md)
|
||||
### [Use the File Locations page in the IEAK 11 Wizard](ie11-ieak/file-locations-ieak11-wizard.md)
|
||||
### [Use the Platform Selection page in the IEAK 11 Wizard](ie11-ieak/platform-selection-ieak11-wizard.md)
|
||||
### [Use the Language Selection page in the IEAK 11 Wizard](ie11-ieak/language-selection-ieak11-wizard.md)
|
||||
### [Use the Package Type Selection page in the IEAK 11 Wizard](ie11-ieak/pkg-type-selection-ieak11-wizard.md)
|
||||
### [Use the Feature Selection page in the IEAK 11 Wizard](ie11-ieak/feature-selection-ieak11-wizard.md)
|
||||
### [Use the Automatic Version Synchronization page in the IEAK 11 Wizard](ie11-ieak/auto-version-sync-ieak11-wizard.md)
|
||||
### [Use the Custom Components page in the IEAK 11 Wizard](ie11-ieak/custom-components-ieak11-wizard.md)
|
||||
### [Use the Internal Install page in the IEAK 11 Wizard](ie11-ieak/internal-install-ieak11-wizard.md)
|
||||
### [Use the User Experience page in the IEAK 11 Wizard](ie11-ieak/user-experience-ieak11-wizard.md)
|
||||
### [Use the Browser User Interface page in the IEAK 11 Wizard](ie11-ieak/browser-ui-ieak11-wizard.md)
|
||||
### [Use the Search Providers page in the IEAK 11 Wizard](ie11-ieak/search-providers-ieak11-wizard.md)
|
||||
### [Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard](ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md)
|
||||
### [Use the Accelerators page in the IEAK 11 Wizard](ie11-ieak/accelerators-ieak11-wizard.md)
|
||||
### [Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard](ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md)
|
||||
### [Use the Browsing Options page in the IEAK 11 Wizard](ie11-ieak/browsing-options-ieak11-wizard.md)
|
||||
### [Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard](ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md)
|
||||
### [Use the Compatibility View page in the IEAK 11 Wizard](ie11-ieak/compat-view-ieak11-wizard.md)
|
||||
### [Use the Connection Manager page in the IEAK 11 Wizard](ie11-ieak/connection-mgr-ieak11-wizard.md)
|
||||
### [Use the Connection Settings page in the IEAK 11 Wizard](ie11-ieak/connection-settings-ieak11-wizard.md)
|
||||
### [Use the Automatic Configuration page in the IEAK 11 Wizard](ie11-ieak/auto-config-ieak11-wizard.md)
|
||||
### [Use the Proxy Settings page in the IEAK 11 Wizard](ie11-ieak/proxy-settings-ieak11-wizard.md)
|
||||
### [Use the Security and Privacy Settings page in the IEAK 11 Wizard](ie11-ieak/security-and-privacy-settings-ieak11-wizard.md)
|
||||
### [Use the Add a Root Certificate page in the IEAK 11 Wizard](ie11-ieak/add-root-certificate-ieak11-wizard.md)
|
||||
### [Use the Programs page in the IEAK 11 Wizard](ie11-ieak/programs-ieak11-wizard.md)
|
||||
### [Use the Additional Settings page in the IEAK 11 Wizard](ie11-ieak/additional-settings-ieak11-wizard.md)
|
||||
### [Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard](ie11-ieak/wizard-complete-ieak11-wizard.md)
|
||||
|
||||
## [Using Internet Settings (.INS) files with IEAK 11](ie11-ieak/using-internet-settings-ins-files.md)
|
||||
### [Use the Branding .INS file to create custom branding and setup info](ie11-ieak/branding-ins-file-setting.md)
|
||||
### [Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar](ie11-ieak/browsertoolbars-ins-file-setting.md)
|
||||
### [Use the CabSigning .INS file to review the digital signatures for your apps](ie11-ieak/cabsigning-ins-file-setting.md)
|
||||
### [Use the ConnectionSettings .INS file to review the network connections for install](ie11-ieak/connectionsettings-ins-file-setting.md)
|
||||
### [Use the CustomBranding .INS file to specify the custom branding location](ie11-ieak/custombranding-ins-file-setting.md)
|
||||
### [Use the ExtRegInf .INS file to specify installation files and mode](ie11-ieak/extreginf-ins-file-setting.md)
|
||||
### [Use the FavoritesEx .INS file for your Favorites icon and URLs](ie11-ieak/favoritesex-ins-file-setting.md)
|
||||
### [Use the HideCustom .INS file to hide GUIDs](ie11-ieak/hidecustom-ins-file-setting.md)
|
||||
### [Use the ISP_Security .INS file to add your root certificate](ie11-ieak/isp-security-ins-file-setting.md)
|
||||
### [Use the Media .INS file to specify your install media](ie11-ieak/media-ins-file-setting.md)
|
||||
### [Use the Proxy .INS file to specify a proxy server](ie11-ieak/proxy-ins-file-setting.md)
|
||||
### [Use the Security Imports .INS file to import security info](ie11-ieak/security-imports-ins-file-setting.md)
|
||||
### [Use the URL .INS file to use an auto-configured proxy server](ie11-ieak/url-ins-file-setting.md)
|
||||
|
||||
## [IExpress Wizard for Windows Server 2008 R2 with SP1](ie11-ieak/iexpress-wizard-for-win-server.md)
|
||||
### [IExpress Wizard command-line options](ie11-ieak/iexpress-command-line-options.md)
|
||||
### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md)
|
||||
|
||||
## KB Troubleshoot
|
||||
### [Internet Explorer and Microsoft Edge FAQ for IT Pros](kb-support/ie-edge-faqs.md)
|
359
browsers/internet-explorer/TOC.yml
Normal file
359
browsers/internet-explorer/TOC.yml
Normal file
@ -0,0 +1,359 @@
|
||||
- name: IE11 Deployment Guide for IT Pros
|
||||
href: ie11-deploy-guide/index.md
|
||||
items:
|
||||
- name: Change history for the Internet Explorer 11 (IE11) Deployment Guide
|
||||
href: ie11-deploy-guide/change-history-for-internet-explorer-11.md
|
||||
- name: System requirements and language support for Internet Explorer 11
|
||||
href: ie11-deploy-guide/system-requirements-and-language-support-for-ie11.md
|
||||
- name: List of updated features and tools - Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/updated-features-and-tools-with-ie11.md
|
||||
- name: Install and Deploy Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/install-and-deploy-ie11.md
|
||||
items:
|
||||
- name: Customize Internet Explorer 11 installation packages
|
||||
href: ie11-deploy-guide/customize-ie11-install-packages.md
|
||||
items:
|
||||
- name: Using IEAK 11 to create packages
|
||||
href: ie11-deploy-guide/using-ieak11-to-create-install-packages.md
|
||||
- name: Create packages for multiple operating systems or languages
|
||||
href: ie11-deploy-guide/create-install-packages-for-multiple-operating-systems-or-languages.md
|
||||
- name: Using .INF files to create packages
|
||||
href: ie11-deploy-guide/using-inf-files-to-create-install-packages.md
|
||||
- name: Choose how to install Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/choose-how-to-install-ie11.md
|
||||
items:
|
||||
- name: Install Internet Explorer 11 (IE11) - System Center 2012 R2 Configuration Manager
|
||||
href: ie11-deploy-guide/install-ie11-using-system-center-configuration-manager.md
|
||||
- name: Install Internet Explorer 11 (IE11) - Windows Server Update Services (WSUS)
|
||||
href: ie11-deploy-guide/install-ie11-using-windows-server-update-services-wsus.md
|
||||
- name: Install Internet Explorer 11 (IE11) - Microsoft Intune
|
||||
href: ie11-deploy-guide/install-ie11-using-microsoft-intune.md
|
||||
- name: Install Internet Explorer 11 (IE11) - Network
|
||||
href: ie11-deploy-guide/install-ie11-using-the-network.md
|
||||
- name: Install Internet Explorer 11 (IE11) - Operating system deployment systems
|
||||
href: ie11-deploy-guide/install-ie11-using-operating-system-deployment-systems.md
|
||||
- name: Install Internet Explorer 11 (IE11) - Third-party tools
|
||||
href: ie11-deploy-guide/install-ie11-using-third-party-tools.md
|
||||
- name: Choose how to deploy Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/choose-how-to-deploy-ie11.md
|
||||
items:
|
||||
- name: Deploy Internet Explorer 11 using Automatic Version Synchronization (AVS)
|
||||
href: ie11-deploy-guide/deploy-ie11-using-automatic-version-synchronization-avs.md
|
||||
- name: Deploy Internet Explorer 11 using software distribution tools
|
||||
href: ie11-deploy-guide/deploy-ie11-using-software-distribution-tools.md
|
||||
- name: Virtualization and compatibility with Internet Explorer 11
|
||||
href: ie11-deploy-guide/virtualization-and-compatibility-with-ie11.md
|
||||
- name: Collect data using Enterprise Site Discovery
|
||||
href: ie11-deploy-guide/collect-data-using-enterprise-site-discovery.md
|
||||
- name: Enterprise Mode for Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/enterprise-mode-overview-for-ie11.md
|
||||
items:
|
||||
- name: Tips and tricks to manage Internet Explorer compatibility
|
||||
href: ie11-deploy-guide/tips-and-tricks-to-manage-ie-compatibility.md
|
||||
- name: Enterprise Mode and the Enterprise Mode Site List
|
||||
href: ie11-deploy-guide/what-is-enterprise-mode.md
|
||||
- name: Set up Enterprise Mode logging and data collection
|
||||
href: ie11-deploy-guide/set-up-enterprise-mode-logging-and-data-collection.md
|
||||
- name: Turn on Enterprise Mode and use a site list
|
||||
href: ie11-deploy-guide/turn-on-enterprise-mode-and-use-a-site-list.md
|
||||
- name: Enterprise Mode schema v.2 guidance
|
||||
href: ie11-deploy-guide/enterprise-mode-schema-version-2-guidance.md
|
||||
- name: Enterprise Mode schema v.1 guidance
|
||||
href: ie11-deploy-guide/enterprise-mode-schema-version-1-guidance.md
|
||||
- name: Check for a new Enterprise Mode site list xml file
|
||||
href: ie11-deploy-guide/check-for-new-enterprise-mode-site-list-xml-file.md
|
||||
- name: Turn on local control and logging for Enterprise Mode
|
||||
href: ie11-deploy-guide/turn-on-local-control-and-logging-for-enterprise-mode.md
|
||||
- name: Use the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/use-the-enterprise-mode-site-list-manager.md
|
||||
items:
|
||||
- name: Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.2)
|
||||
href: ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-2-enterprise-mode-tool.md
|
||||
- name: Add single sites to the Enterprise Mode site list using the Enterprise Mode Site List Manager (schema v.1)
|
||||
href: ie11-deploy-guide/add-single-sites-to-enterprise-mode-site-list-using-the-version-1-enterprise-mode-tool.md
|
||||
- name: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.2)
|
||||
href: ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-2-schema-and-enterprise-mode-tool.md
|
||||
- name: Add multiple sites to the Enterprise Mode site list using a file and the Enterprise Mode Site List Manager (schema v.1)
|
||||
href: ie11-deploy-guide/add-multiple-sites-to-enterprise-mode-site-list-using-the-version-1-schema-and-enterprise-mode-tool.md
|
||||
- name: Edit the Enterprise Mode site list using the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/edit-the-enterprise-mode-site-list-using-the-enterprise-mode-site-list-manager.md
|
||||
- name: Fix validation problems using the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/fix-validation-problems-using-the-enterprise-mode-site-list-manager.md
|
||||
- name: Search your Enterprise Mode site list in the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/search-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
|
||||
- name: Save your site list to XML in the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/save-your-site-list-to-xml-in-the-enterprise-mode-site-list-manager.md
|
||||
- name: Export your Enterprise Mode site list from the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/export-your-enterprise-mode-site-list-from-the-enterprise-mode-site-list-manager.md
|
||||
- name: Import your Enterprise Mode site list to the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/import-into-the-enterprise-mode-site-list-manager.md
|
||||
- name: Delete sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/delete-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
|
||||
- name: Remove all sites from your Enterprise Mode site list in the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/remove-all-sites-from-your-enterprise-mode-site-list-in-the-enterprise-mode-site-list-manager.md
|
||||
- name: Review neutral sites for Internet Explorer mode using the Enterprise Mode Site List Manager
|
||||
href: ie11-deploy-guide/review-neutral-sites-with-site-list-manager.md
|
||||
- name: Use the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/use-the-enterprise-mode-portal.md
|
||||
items:
|
||||
- name: Set up the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/set-up-enterprise-mode-portal.md
|
||||
items:
|
||||
- name: Use the Settings page to finish setting up the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/configure-settings-enterprise-mode-portal.md
|
||||
- name: Add employees to the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/add-employees-enterprise-mode-portal.md
|
||||
- name: Workflow-based processes for employees using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/workflow-processes-enterprise-mode-portal.md
|
||||
items:
|
||||
- name: Create a change request using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/create-change-request-enterprise-mode-portal.md
|
||||
- name: Verify your changes using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/verify-changes-preprod-enterprise-mode-portal.md
|
||||
- name: Approve a change request using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/approve-change-request-enterprise-mode-portal.md
|
||||
- name: Schedule approved change requests for production using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/schedule-production-change-enterprise-mode-portal.md
|
||||
- name: Verify the change request update in the production environment using the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/verify-changes-production-enterprise-mode-portal.md
|
||||
- name: View the apps currently on the Enterprise Mode Site List
|
||||
href: ie11-deploy-guide/view-apps-enterprise-mode-site-list.md
|
||||
- name: View the available Enterprise Mode reports from the Enterprise Mode Site List Portal
|
||||
href: ie11-deploy-guide/view-enterprise-mode-reports-for-portal.md
|
||||
- name: Using IE7 Enterprise Mode or IE8 Enterprise Mode
|
||||
href: ie11-deploy-guide/using-enterprise-mode.md
|
||||
- name: Fix web compatibility issues using document modes and the Enterprise Mode site list
|
||||
href: ie11-deploy-guide/fix-compat-issues-with-doc-modes-and-enterprise-mode-site-list.md
|
||||
- name: Remove sites from a local Enterprise Mode site list
|
||||
href: ie11-deploy-guide/remove-sites-from-a-local-enterprise-mode-site-list.md
|
||||
- name: Remove sites from a local compatibility view list
|
||||
href: ie11-deploy-guide/remove-sites-from-a-local-compatibililty-view-list.md
|
||||
- name: Turn off Enterprise Mode
|
||||
href: ie11-deploy-guide/turn-off-enterprise-mode.md
|
||||
- name: Group Policy and Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/group-policy-and-ie11.md
|
||||
items:
|
||||
- name: Group Policy management tools
|
||||
href: ie11-deploy-guide/group-policy-objects-and-ie11.md
|
||||
items:
|
||||
- name: Group Policy and the Group Policy Management Console (GPMC)
|
||||
href: ie11-deploy-guide/group-policy-and-group-policy-mgmt-console-ie11.md
|
||||
- name: Group Policy and the Local Group Policy Editor
|
||||
href: ie11-deploy-guide/group-policy-and-local-group-policy-editor-ie11.md
|
||||
- name: Group Policy and Advanced Group Policy Management (AGPM)
|
||||
href: ie11-deploy-guide/group-policy-and-advanced-group-policy-mgmt-ie11.md
|
||||
- name: Group Policy and Windows Powershell
|
||||
href: ie11-deploy-guide/group-policy-windows-powershell-ie11.md
|
||||
- name: Group Policy and Shortcut Extensions
|
||||
href: ie11-deploy-guide/group-policy-shortcut-extensions-ie11.md
|
||||
- name: New group policy settings for Internet Explorer 11
|
||||
href: ie11-deploy-guide/new-group-policy-settings-for-ie11.md
|
||||
- name: Set the default browser using Group Policy
|
||||
href: ie11-deploy-guide/set-the-default-browser-using-group-policy.md
|
||||
- name: ActiveX installation using group policy
|
||||
href: ie11-deploy-guide/activex-installation-using-group-policy.md
|
||||
- name: Group Policy and compatibility with Internet Explorer 11
|
||||
href: ie11-deploy-guide/group-policy-compatibility-with-ie11.md
|
||||
- name: Group policy preferences and Internet Explorer 11
|
||||
href: ie11-deploy-guide/group-policy-preferences-and-ie11.md
|
||||
- name: Administrative templates and Internet Explorer 11
|
||||
href: ie11-deploy-guide/administrative-templates-and-ie11.md
|
||||
- name: Enable and disable add-ons using administrative templates and group policy
|
||||
href: ie11-deploy-guide/enable-and-disable-add-ons-using-administrative-templates-and-group-policy.md
|
||||
- name: Manage Internet Explorer 11
|
||||
href: ie11-deploy-guide/manage-ie11-overview.md
|
||||
items:
|
||||
- name: Auto detect settings Internet Explorer 11
|
||||
href: ie11-deploy-guide/auto-detect-settings-for-ie11.md
|
||||
- name: Auto configuration settings for Internet Explorer 11
|
||||
href: ie11-deploy-guide/auto-configuration-settings-for-ie11.md
|
||||
- name: Auto proxy configuration settings for Internet Explorer 11
|
||||
href: ie11-deploy-guide/auto-proxy-configuration-settings-for-ie11.md
|
||||
- name: Troubleshoot Internet Explorer 11 (IE11)
|
||||
href: ie11-deploy-guide/troubleshoot-ie11.md
|
||||
items:
|
||||
- name: Setup problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/setup-problems-with-ie11.md
|
||||
- name: Install problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/install-problems-with-ie11.md
|
||||
- name: Problems after installing Internet Explorer 11
|
||||
href: ie11-deploy-guide/problems-after-installing-ie11.md
|
||||
- name: Auto configuration and auto proxy problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/auto-configuration-and-auto-proxy-problems-with-ie11.md
|
||||
- name: User interface problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/user-interface-problems-with-ie11.md
|
||||
- name: Group Policy problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/group-policy-problems-ie11.md
|
||||
- name: .NET Framework problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/net-framework-problems-with-ie11.md
|
||||
- name: Enhanced Protected Mode problems with Internet Explorer
|
||||
href: ie11-deploy-guide/enhanced-protected-mode-problems-with-ie11.md
|
||||
- name: Fix font rendering problems by turning off natural metrics
|
||||
href: ie11-deploy-guide/turn-off-natural-metrics.md
|
||||
- name: Intranet problems with Internet Explorer 11
|
||||
href: ie11-deploy-guide/intranet-problems-and-ie11.md
|
||||
- name: Browser cache changes and roaming profiles
|
||||
href: ie11-deploy-guide/browser-cache-changes-and-roaming-profiles.md
|
||||
- name: Out-of-date ActiveX control blocking
|
||||
href: ie11-deploy-guide/out-of-date-activex-control-blocking.md
|
||||
items:
|
||||
- name: Blocked out-of-date ActiveX controls
|
||||
href: ie11-deploy-guide/blocked-out-of-date-activex-controls.md
|
||||
- name: Deprecated document modes and Internet Explorer 11
|
||||
href: ie11-deploy-guide/deprecated-document-modes.md
|
||||
- name: What is the Internet Explorer 11 Blocker Toolkit?
|
||||
href: ie11-deploy-guide/what-is-the-internet-explorer-11-blocker-toolkit.md
|
||||
items:
|
||||
- name: Internet Explorer 11 delivery through automatic updates
|
||||
href: ie11-deploy-guide/ie11-delivery-through-automatic-updates.md
|
||||
- name: Internet Explorer 11 Blocker Toolkit FAQ
|
||||
href: ie11-faq/faq-ie11-blocker-toolkit.md
|
||||
- name: Missing Internet Explorer Maintenance settings for Internet Explorer 11
|
||||
href: ie11-deploy-guide/missing-internet-explorer-maintenance-settings-for-ie11.md
|
||||
- name: Missing the Compatibility View Button
|
||||
href: ie11-deploy-guide/missing-the-compatibility-view-button.md
|
||||
- name: Deploy pinned websites using Microsoft Deployment Toolkit (MDT) 2013
|
||||
href: ie11-deploy-guide/deploy-pinned-sites-using-mdt-2013.md
|
||||
- name: IE11 Frequently Asked Questions (FAQ) Guide for IT Pros
|
||||
href: ie11-faq/faq-for-it-pros-ie11.md
|
||||
- name: Internet Explorer Administration Kit 11 (IEAK 11) - Administration Guide for IT Pros
|
||||
href: ie11-ieak/index.md
|
||||
items:
|
||||
- name: What IEAK can do for you
|
||||
href: ie11-ieak/what-ieak-can-do-for-you.md
|
||||
- name: Internet Explorer Administration Kit (IEAK) information and downloads
|
||||
href: ie11-ieak/ieak-information-and-downloads.md
|
||||
- name: Before you start using IEAK 11
|
||||
href: ie11-ieak/before-you-create-custom-pkgs-ieak11.md
|
||||
items:
|
||||
- name: Hardware and software requirements for IEAK 11
|
||||
href: ie11-ieak/hardware-and-software-reqs-ieak11.md
|
||||
- name: Determine the licensing version and features to use in IEAK 11
|
||||
href: ie11-ieak/licensing-version-and-features-ieak11.md
|
||||
- name: Security features and IEAK 11
|
||||
href: ie11-ieak/security-and-ieak11.md
|
||||
- name: File types used or created by IEAK 11
|
||||
href: ie11-ieak/file-types-ieak11.md
|
||||
- name: Tasks and references to consider before creating and deploying custom packages using IEAK 11
|
||||
href: ie11-ieak/create-manage-deploy-custom-pkgs-ieak11.md
|
||||
- name: Create the build computer folder structure using IEAK 11
|
||||
href: ie11-ieak/create-build-folder-structure-ieak11.md
|
||||
- name: Set up auto detection for DHCP or DNS servers using IEAK 11
|
||||
href: ie11-ieak/auto-detection-dhcp-or-dns-servers-ieak11.md
|
||||
- name: Use proxy auto-configuration (.pac) files with IEAK 11
|
||||
href: ie11-ieak/proxy-auto-config-examples.md
|
||||
- name: Customize the toolbar button and Favorites List icons using IEAK 11
|
||||
href: ie11-ieak/guidelines-toolbar-and-favorites-list-ieak11.md
|
||||
- name: Use the uninstallation .INF files to uninstall custom components
|
||||
href: ie11-ieak/create-uninstall-inf-files-for-custom-components.md
|
||||
- name: Add and approve ActiveX controls using the IEAK 11
|
||||
href: ie11-ieak/add-and-approve-activex-controls-ieak11.md
|
||||
- name: Register an uninstall app for custom components using IEAK 11
|
||||
href: ie11-ieak/register-uninstall-app-ieak11.md
|
||||
- name: Customize Automatic Search for Internet Explorer using IEAK 11
|
||||
href: ie11-ieak/customize-automatic-search-for-ie.md
|
||||
- name: Create multiple versions of your custom package using IEAK 11
|
||||
href: ie11-ieak/create-multiple-browser-packages-ieak11.md
|
||||
- name: Before you install your package over your network using IEAK 11
|
||||
href: ie11-ieak/prep-network-install-with-ieak11.md
|
||||
- name: Use the RSoP snap-in to review policy settings
|
||||
href: ie11-ieak/rsop-snapin-for-policy-settings-ieak11.md
|
||||
- name: IEAK 11 - Frequently Asked Questions
|
||||
href: ie11-faq/faq-ieak11.md
|
||||
- name: Troubleshoot custom package and IEAK 11 problems
|
||||
href: ie11-ieak/troubleshooting-custom-browser-pkg-ieak11.md
|
||||
- name: Internet Explorer Administration Kit 11 (IEAK 11) Customization Wizard options
|
||||
href: ie11-ieak/ieak11-wizard-custom-options.md
|
||||
items:
|
||||
- name: Use the File Locations page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/file-locations-ieak11-wizard.md
|
||||
- name: Use the Platform Selection page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/platform-selection-ieak11-wizard.md
|
||||
- name: Use the Language Selection page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/language-selection-ieak11-wizard.md
|
||||
- name: Use the Package Type Selection page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/pkg-type-selection-ieak11-wizard.md
|
||||
- name: Use the Feature Selection page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/feature-selection-ieak11-wizard.md
|
||||
- name: Use the Automatic Version Synchronization page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/auto-version-sync-ieak11-wizard.md
|
||||
- name: Use the Custom Components page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/custom-components-ieak11-wizard.md
|
||||
- name: Use the Internal Install page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/internal-install-ieak11-wizard.md
|
||||
- name: Use the User Experience page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/user-experience-ieak11-wizard.md
|
||||
- name: Use the Browser User Interface page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/browser-ui-ieak11-wizard.md
|
||||
- name: Use the Search Providers page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/search-providers-ieak11-wizard.md
|
||||
- name: Use the Important URLs - Home Page and Support page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/important-urls-home-page-and-support-ieak11-wizard.md
|
||||
- name: Use the Accelerators page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/accelerators-ieak11-wizard.md
|
||||
- name: Use the Favorites, Favorites Bar, and Feeds page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/favorites-favoritesbar-and-feeds-ieak11-wizard.md
|
||||
- name: Use the Browsing Options page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/browsing-options-ieak11-wizard.md
|
||||
- name: Use the First Run Wizard and Welcome Page Options page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/first-run-and-welcome-page-ieak11-wizard.md
|
||||
- name: Use the Compatibility View page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/compat-view-ieak11-wizard.md
|
||||
- name: Use the Connection Manager page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/connection-mgr-ieak11-wizard.md
|
||||
- name: Use the Connection Settings page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/connection-settings-ieak11-wizard.md
|
||||
- name: Use the Automatic Configuration page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/auto-config-ieak11-wizard.md
|
||||
- name: Use the Proxy Settings page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/proxy-settings-ieak11-wizard.md
|
||||
- name: Use the Security and Privacy Settings page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/security-and-privacy-settings-ieak11-wizard.md
|
||||
- name: Use the Add a Root Certificate page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/add-root-certificate-ieak11-wizard.md
|
||||
- name: Use the Programs page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/programs-ieak11-wizard.md
|
||||
- name: Use the Additional Settings page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/additional-settings-ieak11-wizard.md
|
||||
- name: Use the Wizard Complete - Next Steps page in the IEAK 11 Wizard
|
||||
href: ie11-ieak/wizard-complete-ieak11-wizard.md
|
||||
- name: Using Internet Settings (.INS) files with IEAK 11
|
||||
href: ie11-ieak/using-internet-settings-ins-files.md
|
||||
items:
|
||||
- name: Use the Branding .INS file to create custom branding and setup info
|
||||
href: ie11-ieak/branding-ins-file-setting.md
|
||||
- name: Use the BrowserToolbars .INS file to customize the Internet Explorer toolbar
|
||||
href: ie11-ieak/browsertoolbars-ins-file-setting.md
|
||||
- name: Use the CabSigning .INS file to review the digital signatures for your apps
|
||||
href: ie11-ieak/cabsigning-ins-file-setting.md
|
||||
- name: Use the ConnectionSettings .INS file to review the network connections for install
|
||||
href: ie11-ieak/connectionsettings-ins-file-setting.md
|
||||
- name: Use the CustomBranding .INS file to specify the custom branding location
|
||||
href: ie11-ieak/custombranding-ins-file-setting.md
|
||||
- name: Use the ExtRegInf .INS file to specify installation files and mode
|
||||
href: ie11-ieak/extreginf-ins-file-setting.md
|
||||
- name: Use the FavoritesEx .INS file for your Favorites icon and URLs
|
||||
href: ie11-ieak/favoritesex-ins-file-setting.md
|
||||
- name: Use the HideCustom .INS file to hide GUIDs
|
||||
href: ie11-ieak/hidecustom-ins-file-setting.md
|
||||
- name: Use the ISP_Security .INS file to add your root certificate
|
||||
href: ie11-ieak/isp-security-ins-file-setting.md
|
||||
- name: Use the Media .INS file to specify your install media
|
||||
href: ie11-ieak/media-ins-file-setting.md
|
||||
- name: Use the Proxy .INS file to specify a proxy server
|
||||
href: ie11-ieak/proxy-ins-file-setting.md
|
||||
- name: Use the Security Imports .INS file to import security info
|
||||
href: ie11-ieak/security-imports-ins-file-setting.md
|
||||
- name: Use the URL .INS file to use an auto-configured proxy server
|
||||
href: ie11-ieak/url-ins-file-setting.md
|
||||
- name: IExpress Wizard for Windows Server 2008 R2 with SP1
|
||||
href: ie11-ieak/iexpress-wizard-for-win-server.md
|
||||
items:
|
||||
- name: IExpress Wizard command-line options
|
||||
href: ie11-ieak/iexpress-command-line-options.md
|
||||
- name: Internet Explorer Setup command-line options and return codes
|
||||
href: ie11-ieak/ie-setup-command-line-options-and-return-codes.md
|
||||
- name: KB Troubleshoot
|
||||
items:
|
||||
- name: Internet Explorer and Microsoft Edge FAQ for IT Pros
|
||||
href: kb-support/ie-edge-faqs.md
|
@ -1,4 +0,0 @@
|
||||
# [Microsoft Education Trial in a Box](index.md)
|
||||
## [Educator Trial in a Box Guide](educator-tib-get-started.md)
|
||||
## [IT Admin Trial in a Box Guide](itadmin-tib-get-started.md)
|
||||
## [Microsoft Education Trial in a Box Support](support-options.md)
|
9
education/trial-in-a-box/TOC.yml
Normal file
9
education/trial-in-a-box/TOC.yml
Normal file
@ -0,0 +1,9 @@
|
||||
- name: Microsoft Education Trial in a Box
|
||||
href: index.md
|
||||
items:
|
||||
- name: Educator Trial in a Box Guide
|
||||
href: educator-tib-get-started.md
|
||||
- name: IT Admin Trial in a Box Guide
|
||||
href: itadmin-tib-get-started.md
|
||||
- name: Microsoft Education Trial in a Box Support
|
||||
href: support-options.md
|
@ -1,31 +0,0 @@
|
||||
# [Windows 10 for Education](index.md)
|
||||
## [Windows 10 editions for education customers](windows-editions-for-education-customers.md)
|
||||
## [Windows 10 configuration recommendations for education customers](configure-windows-for-education.md)
|
||||
## [Deployment recommendations for school IT administrators](edu-deployment-recommendations.md)
|
||||
## [Set up Windows devices for education](set-up-windows-10.md)
|
||||
### [What's new in Set up School PCs](set-up-school-pcs-whats-new.md)
|
||||
### [Technical reference for the Set up School PCs app](set-up-school-pcs-technical.md)
|
||||
#### [Azure AD Join for school PCs](set-up-school-pcs-azure-ad-join.md)
|
||||
#### [Shared PC mode for school devices](set-up-school-pcs-shared-pc-mode.md)
|
||||
#### [Provisioning package settings](set-up-school-pcs-provisioning-package.md)
|
||||
### [Use the Set up School PCs app](use-set-up-school-pcs-app.md)
|
||||
### [Set up student PCs to join domain](set-up-students-pcs-to-join-domain.md)
|
||||
### [Provision student PCs with apps](set-up-students-pcs-with-apps.md)
|
||||
## [Take tests in Windows 10](take-tests-in-windows-10.md)
|
||||
### [Set up Take a Test on a single PC](take-a-test-single-pc.md)
|
||||
### [Set up Take a Test on multiple PCs](take-a-test-multiple-pcs.md)
|
||||
### [Take a Test app technical reference](take-a-test-app-technical.md)
|
||||
## [Reset devices with Autopilot Reset](autopilot-reset.md)
|
||||
## [Working with Microsoft Store for Education](education-scenarios-store-for-business.md)
|
||||
## [Get Minecraft: Education Edition](get-minecraft-for-education.md)
|
||||
### [For teachers: get Minecraft Education Edition](teacher-get-minecraft.md)
|
||||
### [For IT administrators: get Minecraft Education Edition](school-get-minecraft.md)
|
||||
### [Get Minecraft: Education Edition with Windows 10 device promotion](get-minecraft-device-promotion.md)
|
||||
## [Test Windows 10 in S mode on existing Windows 10 education devices](test-windows10s-for-edu.md)
|
||||
## [Enable Windows 10 in S mode on Surface Go devices](enable-s-mode-on-surface-go-devices.md)
|
||||
## [Deploy Windows 10 in a school](deploy-windows-10-in-a-school.md)
|
||||
## [Deploy Windows 10 in a school district](deploy-windows-10-in-a-school-district.md)
|
||||
## [Switch to Windows 10 Pro Education in S mode from Windows 10 Pro in S mode](s-mode-switch-to-edu.md)
|
||||
## [Change to Windows 10 Pro Education from Windows 10 Pro](change-to-pro-education.md)
|
||||
## [Chromebook migration guide](chromebook-migration-guide.md)
|
||||
## [Change history for Windows 10 for Education](change-history-edu.md)
|
67
education/windows/TOC.yml
Normal file
67
education/windows/TOC.yml
Normal file
@ -0,0 +1,67 @@
|
||||
- name: Windows 10 for Education
|
||||
href: index.md
|
||||
items:
|
||||
- name: Windows 10 editions for education customers
|
||||
href: windows-editions-for-education-customers.md
|
||||
- name: Windows 10 configuration recommendations for education customers
|
||||
href: configure-windows-for-education.md
|
||||
- name: Deployment recommendations for school IT administrators
|
||||
href: edu-deployment-recommendations.md
|
||||
- name: Set up Windows devices for education
|
||||
href: set-up-windows-10.md
|
||||
items:
|
||||
- name: What's new in Set up School PCs
|
||||
href: set-up-school-pcs-whats-new.md
|
||||
- name: Technical reference for the Set up School PCs app
|
||||
href: set-up-school-pcs-technical.md
|
||||
items:
|
||||
- name: Azure AD Join for school PCs
|
||||
href: set-up-school-pcs-azure-ad-join.md
|
||||
- name: Shared PC mode for school devices
|
||||
href: set-up-school-pcs-shared-pc-mode.md
|
||||
- name: Provisioning package settings
|
||||
href: set-up-school-pcs-provisioning-package.md
|
||||
- name: Use the Set up School PCs app
|
||||
href: use-set-up-school-pcs-app.md
|
||||
- name: Set up student PCs to join domain
|
||||
href: set-up-students-pcs-to-join-domain.md
|
||||
- name: Provision student PCs with apps
|
||||
href: set-up-students-pcs-with-apps.md
|
||||
- name: Take tests in Windows 10
|
||||
href: take-tests-in-windows-10.md
|
||||
items:
|
||||
- name: Set up Take a Test on a single PC
|
||||
href: take-a-test-single-pc.md
|
||||
- name: Set up Take a Test on multiple PCs
|
||||
href: take-a-test-multiple-pcs.md
|
||||
- name: Take a Test app technical reference
|
||||
href: take-a-test-app-technical.md
|
||||
- name: Reset devices with Autopilot Reset
|
||||
href: autopilot-reset.md
|
||||
- name: Working with Microsoft Store for Education
|
||||
href: education-scenarios-store-for-business.md
|
||||
- name: "Get Minecraft: Education Edition"
|
||||
href: get-minecraft-for-education.md
|
||||
items:
|
||||
- name: "For teachers: get Minecraft Education Edition"
|
||||
href: teacher-get-minecraft.md
|
||||
- name: "For IT administrators: get Minecraft Education Edition"
|
||||
href: school-get-minecraft.md
|
||||
- name: "Get Minecraft: Education Edition with Windows 10 device promotion"
|
||||
href: get-minecraft-device-promotion.md
|
||||
- name: Test Windows 10 in S mode on existing Windows 10 education devices
|
||||
href: test-windows10s-for-edu.md
|
||||
- name: Enable Windows 10 in S mode on Surface Go devices
|
||||
href: enable-s-mode-on-surface-go-devices.md
|
||||
- name: Deploy Windows 10 in a school
|
||||
href: deploy-windows-10-in-a-school.md
|
||||
- name: Deploy Windows 10 in a school district
|
||||
href: deploy-windows-10-in-a-school-district.md
|
||||
- name: Switch to Windows 10 Pro Education in S mode from Windows 10 Pro in S mode
|
||||
href: s-mode-switch-to-edu.md
|
||||
- name: Change to Windows 10 Pro Education from Windows 10 Pro
|
||||
href: change-to-pro-education.md
|
||||
- name: Chromebook migration guide
|
||||
href: chromebook-migration-guide.md
|
||||
- name: Change history for Windows 10 for Education
|
||||
href: change-history-edu.md
|
@ -1 +0,0 @@
|
||||
# [Index](index.md)
|
2
gdpr/TOC.yml
Normal file
2
gdpr/TOC.yml
Normal file
@ -0,0 +1,2 @@
|
||||
- name: Index
|
||||
href: index.md
|
@ -1,2 +0,0 @@
|
||||
# [Windows 10 for SMB](index.md)
|
||||
## [Get started: Deploy and manage a full cloud IT solution for your business](cloud-mode-business-setup.md)
|
5
smb/TOC.yml
Normal file
5
smb/TOC.yml
Normal file
@ -0,0 +1,5 @@
|
||||
- name: Windows 10 for SMB
|
||||
href: index.md
|
||||
items:
|
||||
- name: "Get started: Deploy and manage a full cloud IT solution for your business"
|
||||
href: cloud-mode-business-setup.md
|
@ -1,39 +0,0 @@
|
||||
# [Microsoft Store for Business](index.md)
|
||||
## [What's new in Microsoft Store for Business and Education](whats-new-microsoft-store-business-education.md)
|
||||
## [Sign up and get started](sign-up-microsoft-store-for-business-overview.md)
|
||||
### [Microsoft Store for Business and Microsoft Store for Education overview](microsoft-store-for-business-overview.md)
|
||||
### [Prerequisites for Microsoft Store for Business and Education](prerequisites-microsoft-store-for-business.md)
|
||||
### [Roles and permissions in the Microsoft Store for Business and Education](roles-and-permissions-microsoft-store-for-business.md)
|
||||
### [Settings reference: Microsoft Store for Business and Education](settings-reference-microsoft-store-for-business.md)
|
||||
## [Find and acquire apps](find-and-acquire-apps-overview.md)
|
||||
### [Apps in the Microsoft Store for Business and Education](apps-in-microsoft-store-for-business.md)
|
||||
### [Acquire apps](acquire-apps-microsoft-store-for-business.md)
|
||||
### [Working with line-of-business apps](working-with-line-of-business-apps.md)
|
||||
## [Distribute apps](distribute-apps-to-your-employees-microsoft-store-for-business.md)
|
||||
### [Distribute apps using your private store](distribute-apps-from-your-private-store.md)
|
||||
### [Assign apps to employees](assign-apps-to-employees.md)
|
||||
### [Distribute apps with a management tool](distribute-apps-with-management-tool.md)
|
||||
### [Distribute offline apps](distribute-offline-apps.md)
|
||||
## [Manage products and services](manage-apps-microsoft-store-for-business-overview.md)
|
||||
### [App inventory management](app-inventory-management-microsoft-store-for-business.md)
|
||||
### [Manage orders](manage-orders-microsoft-store-for-business.md)
|
||||
### [Manage access to private store](manage-access-to-private-store.md)
|
||||
### [Manage private store settings](manage-private-store-settings.md)
|
||||
### [Configure MDM provider](configure-mdm-provider-microsoft-store-for-business.md)
|
||||
### [Manage Windows device deployment with Windows Autopilot Deployment](add-profile-to-devices.md)
|
||||
### [Microsoft Store for Business and Education PowerShell module - preview](microsoft-store-for-business-education-powershell-module.md)
|
||||
### [Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business](manage-mpsa-software-microsoft-store-for-business.md)
|
||||
### [Working with solution providers](/microsoft-365/commerce/manage-partners)
|
||||
## [Billing and payments](billing-payments-overview.md)
|
||||
### [Understand your invoice](billing-understand-your-invoice-msfb.md)
|
||||
### [Payment methods](payment-methods.md)
|
||||
### [Understand billing profiles](billing-profile.md)
|
||||
## [Manage settings in the Microsoft Store for Business and Education](manage-settings-microsoft-store-for-business.md)
|
||||
### [Update account settings](update-microsoft-store-for-business-account-settings.md)
|
||||
### [Manage user accounts](manage-users-and-groups-microsoft-store-for-business.md)
|
||||
## [Device Guard signing portal](device-guard-signing-portal.md)
|
||||
### [Add unsigned app to code integrity policy](add-unsigned-app-to-code-integrity-policy.md)
|
||||
### [Sign code integrity policy with Device Guard signing](sign-code-integrity-policy-with-device-guard-signing.md)
|
||||
## [Troubleshoot](troubleshoot-microsoft-store-for-business.md)
|
||||
## [Notifications](notifications-microsoft-store-business.md)
|
||||
## [Change history](sfb-change-history.md)
|
86
store-for-business/TOC.yml
Normal file
86
store-for-business/TOC.yml
Normal file
@ -0,0 +1,86 @@
|
||||
- name: Microsoft Store for Business
|
||||
href: index.md
|
||||
items:
|
||||
- name: What's new in Microsoft Store for Business and Education
|
||||
href: whats-new-microsoft-store-business-education.md
|
||||
- name: Sign up and get started
|
||||
href: sign-up-microsoft-store-for-business-overview.md
|
||||
items:
|
||||
- name: Microsoft Store for Business and Microsoft Store for Education overview
|
||||
href: microsoft-store-for-business-overview.md
|
||||
- name: Prerequisites for Microsoft Store for Business and Education
|
||||
href: prerequisites-microsoft-store-for-business.md
|
||||
- name: Roles and permissions in the Microsoft Store for Business and Education
|
||||
href: roles-and-permissions-microsoft-store-for-business.md
|
||||
- name: "Settings reference: Microsoft Store for Business and Education"
|
||||
href: settings-reference-microsoft-store-for-business.md
|
||||
- name: Find and acquire apps
|
||||
href: find-and-acquire-apps-overview.md
|
||||
items:
|
||||
- name: Apps in the Microsoft Store for Business and Education
|
||||
href: apps-in-microsoft-store-for-business.md
|
||||
- name: Acquire apps
|
||||
href: acquire-apps-microsoft-store-for-business.md
|
||||
- name: Working with line-of-business apps
|
||||
href: working-with-line-of-business-apps.md
|
||||
- name: Distribute apps
|
||||
href: distribute-apps-to-your-employees-microsoft-store-for-business.md
|
||||
items:
|
||||
- name: Distribute apps using your private store
|
||||
href: distribute-apps-from-your-private-store.md
|
||||
- name: Assign apps to employees
|
||||
href: assign-apps-to-employees.md
|
||||
- name: Distribute apps with a management tool
|
||||
href: distribute-apps-with-management-tool.md
|
||||
- name: Distribute offline apps
|
||||
href: distribute-offline-apps.md
|
||||
- name: Manage products and services
|
||||
href: manage-apps-microsoft-store-for-business-overview.md
|
||||
items:
|
||||
- name: App inventory management
|
||||
href: app-inventory-management-microsoft-store-for-business.md
|
||||
- name: Manage orders
|
||||
href: manage-orders-microsoft-store-for-business.md
|
||||
- name: Manage access to private store
|
||||
href: manage-access-to-private-store.md
|
||||
- name: Manage private store settings
|
||||
href: manage-private-store-settings.md
|
||||
- name: Configure MDM provider
|
||||
href: configure-mdm-provider-microsoft-store-for-business.md
|
||||
- name: Manage Windows device deployment with Windows Autopilot Deployment
|
||||
href: add-profile-to-devices.md
|
||||
- name: Microsoft Store for Business and Education PowerShell module - preview
|
||||
href: microsoft-store-for-business-education-powershell-module.md
|
||||
- name: Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
||||
href: manage-mpsa-software-microsoft-store-for-business.md
|
||||
- name: Working with solution providers
|
||||
href: /microsoft-365/commerce/manage-partners
|
||||
- name: Billing and payments
|
||||
href: billing-payments-overview.md
|
||||
items:
|
||||
- name: Understand your invoice
|
||||
href: billing-understand-your-invoice-msfb.md
|
||||
- name: Payment methods
|
||||
href: payment-methods.md
|
||||
- name: Understand billing profiles
|
||||
href: billing-profile.md
|
||||
- name: Manage settings in the Microsoft Store for Business and Education
|
||||
href: manage-settings-microsoft-store-for-business.md
|
||||
items:
|
||||
- name: Update account settings
|
||||
href: update-microsoft-store-for-business-account-settings.md
|
||||
- name: Manage user accounts
|
||||
href: manage-users-and-groups-microsoft-store-for-business.md
|
||||
- name: Device Guard signing portal
|
||||
href: device-guard-signing-portal.md
|
||||
items:
|
||||
- name: Add unsigned app to code integrity policy
|
||||
href: add-unsigned-app-to-code-integrity-policy.md
|
||||
- name: Sign code integrity policy with Device Guard signing
|
||||
href: sign-code-integrity-policy-with-device-guard-signing.md
|
||||
- name: Troubleshoot
|
||||
href: troubleshoot-microsoft-store-for-business.md
|
||||
- name: Notifications
|
||||
href: notifications-microsoft-store-business.md
|
||||
- name: Change history
|
||||
href: sfb-change-history.md
|
@ -1,39 +0,0 @@
|
||||
# [Microsoft Store for Education](../index.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [What's new in Microsoft Store for Business and Education](../whats-new-microsoft-store-business-education.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Sign up and get started](../sign-up-microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Microsoft Store for Business and Education overview](../microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Prerequisites for Microsoft Store for Business and Education](../prerequisites-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Sign up for Microsoft Store for Business or Microsoft Store for Education](/microsoft-store/sign-up-microsoft-store-for-business?toc=/microsoft-store/education/toc.json)
|
||||
### [Roles and permissions in the Microsoft Store for Business and Education](../roles-and-permissions-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Settings reference: Microsoft Store for Business and Education](../settings-reference-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Working with Microsoft Store for Education](/education/windows/education-scenarios-store-for-business?toc=/microsoft-store/education/toc.json)
|
||||
## [Find and acquire apps](../find-and-acquire-apps-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Apps in the Microsoft Store for Business and Education](../apps-in-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Acquire apps in the Microsoft Store for Business and Education](../acquire-apps-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Working with line-of-business apps](../working-with-line-of-business-apps.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Get Minecraft: Education Edition](/education/windows/get-minecraft-for-education?toc=/microsoft-store/education/toc.json)
|
||||
### [For teachers: get Minecraft Education Edition](/education/windows/teacher-get-minecraft?toc=/microsoft-store/education/toc.json)
|
||||
### [For IT administrators: get Minecraft Education Edition](/education/windows/school-get-minecraft?toc=/microsoft-store/education/toc.json)
|
||||
### [Get Minecraft: Education Edition with Windows 10 device promotion](/education/windows/get-minecraft-device-promotion?toc=/microsoft-store/education/toc.json)
|
||||
## [Distribute apps to your employees from the Microsoft Store for Business and Education](../distribute-apps-to-your-employees-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Distribute apps using your private store](../distribute-apps-from-your-private-store.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Assign apps to employees](../assign-apps-to-employees.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Distribute apps with a management tool](../distribute-apps-with-management-tool.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Distribute offline apps](../distribute-offline-apps.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Manage products and services](../manage-apps-microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [App inventory management for Microsoft Store for Business](../app-inventory-management-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage app orders in Microsoft Store for Business and Education](../manage-orders-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage access to private store](../manage-access-to-private-store.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage private store settings](../manage-private-store-settings.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Configure MDM provider](../configure-mdm-provider-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage Windows device deployment with Windows Autopilot Deployment](../add-profile-to-devices.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Microsoft Store for Business and Education PowerShell module - preview](../microsoft-store-for-business-education-powershell-module.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business](../manage-mpsa-software-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Device Guard signing portal](../device-guard-signing-portal.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Add unsigned app to code integrity policy](../add-unsigned-app-to-code-integrity-policy.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Sign code integrity policy with Device Guard signing](../sign-code-integrity-policy-with-device-guard-signing.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Manage settings in the Microsoft Store for Business and Education](../manage-settings-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Update Microsoft Store for Business and Microsoft Store for Education account settings](../update-microsoft-store-for-business-account-settings.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
### [Manage user accounts in Microsoft Store for Business and Education](../manage-users-and-groups-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Troubleshoot Microsoft Store for Business](../troubleshoot-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
||||
## [Notifications in Microsoft Store for Business and Education](../notifications-microsoft-store-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json)
|
86
store-for-business/education/TOC.yml
Normal file
86
store-for-business/education/TOC.yml
Normal file
@ -0,0 +1,86 @@
|
||||
- name: Microsoft Store for Education
|
||||
href: ../index.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: What's new in Microsoft Store for Business and Education
|
||||
href: ../whats-new-microsoft-store-business-education.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Sign up and get started
|
||||
href: ../sign-up-microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: Microsoft Store for Business and Education overview
|
||||
href: ../microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Prerequisites for Microsoft Store for Business and Education
|
||||
href: ../prerequisites-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Sign up for Microsoft Store for Business or Microsoft Store for Education
|
||||
href: /microsoft-store/sign-up-microsoft-store-for-business?toc=/microsoft-store/education/toc.json
|
||||
- name: Roles and permissions in the Microsoft Store for Business and Education
|
||||
href: ../roles-and-permissions-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: "Settings reference: Microsoft Store for Business and Education"
|
||||
href: ../settings-reference-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Working with Microsoft Store for Education
|
||||
href: /education/windows/education-scenarios-store-for-business?toc=/microsoft-store/education/toc.json
|
||||
- name: Find and acquire apps
|
||||
href: ../find-and-acquire-apps-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: Apps in the Microsoft Store for Business and Education
|
||||
href: ../apps-in-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Acquire apps in the Microsoft Store for Business and Education
|
||||
href: ../acquire-apps-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Working with line-of-business apps
|
||||
href: ../working-with-line-of-business-apps.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: "Get Minecraft: Education Edition"
|
||||
href: /education/windows/get-minecraft-for-education?toc=/microsoft-store/education/toc.json
|
||||
items:
|
||||
- name: "For teachers: get Minecraft Education Edition"
|
||||
href: /education/windows/teacher-get-minecraft?toc=/microsoft-store/education/toc.json
|
||||
- name: "For IT administrators: get Minecraft Education Edition"
|
||||
href: /education/windows/school-get-minecraft?toc=/microsoft-store/education/toc.json
|
||||
- name: "Get Minecraft: Education Edition with Windows 10 device promotion"
|
||||
href: /education/windows/get-minecraft-device-promotion?toc=/microsoft-store/education/toc.json
|
||||
- name: Distribute apps to your employees from the Microsoft Store for Business and Education
|
||||
href: ../distribute-apps-to-your-employees-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: Distribute apps using your private store
|
||||
href: ../distribute-apps-from-your-private-store.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Assign apps to employees
|
||||
href: ../assign-apps-to-employees.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Distribute apps with a management tool
|
||||
href: ../distribute-apps-with-management-tool.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Distribute offline apps
|
||||
href: ../distribute-offline-apps.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage products and services
|
||||
href: ../manage-apps-microsoft-store-for-business-overview.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: App inventory management for Microsoft Store for Business
|
||||
href: ../app-inventory-management-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage app orders in Microsoft Store for Business and Education
|
||||
href: ../manage-orders-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage access to private store
|
||||
href: ../manage-access-to-private-store.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage private store settings
|
||||
href: ../manage-private-store-settings.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Configure MDM provider
|
||||
href: ../configure-mdm-provider-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage Windows device deployment with Windows Autopilot Deployment
|
||||
href: ../add-profile-to-devices.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Microsoft Store for Business and Education PowerShell module - preview
|
||||
href: ../microsoft-store-for-business-education-powershell-module.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage software purchased with Microsoft Products and Services agreement in Microsoft Store for Business
|
||||
href: ../manage-mpsa-software-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Device Guard signing portal
|
||||
href: ../device-guard-signing-portal.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: Add unsigned app to code integrity policy
|
||||
href: ../add-unsigned-app-to-code-integrity-policy.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Sign code integrity policy with Device Guard signing
|
||||
href: ../sign-code-integrity-policy-with-device-guard-signing.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage settings in the Microsoft Store for Business and Education
|
||||
href: ../manage-settings-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
items:
|
||||
- name: Update Microsoft Store for Business and Microsoft Store for Education account settings
|
||||
href: ../update-microsoft-store-for-business-account-settings.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Manage user accounts in Microsoft Store for Business and Education
|
||||
href: ../manage-users-and-groups-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Troubleshoot Microsoft Store for Business
|
||||
href: ../troubleshoot-microsoft-store-for-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
||||
- name: Notifications in Microsoft Store for Business and Education
|
||||
href: ../notifications-microsoft-store-business.md?toc=%2fmicrosoft-store%2feducation%2ftoc.json
|
@ -1,112 +0,0 @@
|
||||
# [Manage applications in Windows 10](index.md)
|
||||
## [Sideload apps](sideload-apps-in-windows-10.md)
|
||||
## [Remove background task resource restrictions](enterprise-background-activity-controls.md)
|
||||
## [Enable or block Windows Mixed Reality apps in the enterprise](manage-windows-mixed-reality.md)
|
||||
## [Understand apps in Windows 10](apps-in-windows-10.md)
|
||||
## [Add apps and features in Windows 10](add-apps-and-features.md)
|
||||
## [Repackage win32 apps in the MSIX format](msix-app-packaging-tool.md)
|
||||
## [Application Virtualization (App-V) for Windows](app-v/appv-for-windows.md)
|
||||
### [Getting Started with App-V](app-v/appv-getting-started.md)
|
||||
#### [What's new in App-V for Windows 10, version 1703 and earlier](app-v/appv-about-appv.md)
|
||||
##### [Release Notes for App-V for Windows 10, version 1607](app-v/appv-release-notes-for-appv-for-windows.md)
|
||||
##### [Release Notes for App-V for Windows 10, version 1703](app-v/appv-release-notes-for-appv-for-windows-1703.md)
|
||||
#### [Evaluating App-V](app-v/appv-evaluating-appv.md)
|
||||
#### [High Level Architecture for App-V](app-v/appv-high-level-architecture.md)
|
||||
### [Planning for App-V](app-v/appv-planning-for-appv.md)
|
||||
#### [Preparing Your Environment for App-V](app-v/appv-preparing-your-environment.md)
|
||||
##### [App-V Prerequisites](app-v/appv-prerequisites.md)
|
||||
##### [App-V Security Considerations](app-v/appv-security-considerations.md)
|
||||
#### [Planning to Deploy App-V](app-v/appv-planning-to-deploy-appv.md)
|
||||
##### [App-V Supported Configurations](app-v/appv-supported-configurations.md)
|
||||
##### [App-V Capacity Planning](app-v/appv-capacity-planning.md)
|
||||
##### [Planning for High Availability with App-V](app-v/appv-planning-for-high-availability-with-appv.md)
|
||||
##### [Planning to Deploy App-V with an Electronic Software Distribution System](app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md)
|
||||
##### [Planning for the App-V Server Deployment](app-v/appv-planning-for-appv-server-deployment.md)
|
||||
##### [Planning for the App-V Sequencer and Client Deployment](app-v/appv-planning-for-sequencer-and-client-deployment.md)
|
||||
##### [Planning for Using App-V with Office](app-v/appv-planning-for-using-appv-with-office.md)
|
||||
##### [Planning to Use Folder Redirection with App-V](app-v/appv-planning-folder-redirection-with-appv.md)
|
||||
#### [App-V Planning Checklist](app-v/appv-planning-checklist.md)
|
||||
### [Deploying App-V](app-v/appv-deploying-appv.md)
|
||||
#### [Deploying the App-V Sequencer and Configuring the Client](app-v/appv-deploying-the-appv-sequencer-and-client.md)
|
||||
##### [About Client Configuration Settings](app-v/appv-client-configuration-settings.md)
|
||||
##### [Enable the App-V desktop client](app-v/appv-enable-the-app-v-desktop-client.md)
|
||||
##### [How to Install the Sequencer](app-v/appv-install-the-sequencer.md)
|
||||
#### [Deploying the App-V Server](app-v/appv-deploying-the-appv-server.md)
|
||||
##### [How to Deploy the App-V Server](app-v/appv-deploy-the-appv-server.md)
|
||||
##### [How to Deploy the App-V Server Using a Script](app-v/appv-deploy-the-appv-server-with-a-script.md)
|
||||
##### [How to Deploy the App-V Databases by Using SQL Scripts](app-v/appv-deploy-appv-databases-with-sql-scripts.md)
|
||||
##### [How to Install the Publishing Server on a Remote Computer](app-v/appv-install-the-publishing-server-on-a-remote-computer.md)
|
||||
##### [How to Install the Management and Reporting Databases on Separate Computers from the Management and Reporting Services](app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md)
|
||||
##### [How to install the Management Server on a Standalone Computer and Connect it to the Database](app-v/appv-install-the-management-server-on-a-standalone-computer.md)
|
||||
##### [About App-V Reporting](app-v/appv-reporting.md)
|
||||
##### [How to install the Reporting Server on a Standalone Computer and Connect it to the Database](app-v/appv-install-the-reporting-server-on-a-standalone-computer.md)
|
||||
#### [App-V Deployment Checklist](app-v/appv-deployment-checklist.md)
|
||||
#### [Deploying Microsoft Office 2016 by Using App-V](app-v/appv-deploying-microsoft-office-2016-with-appv.md)
|
||||
#### [Deploying Microsoft Office 2013 by Using App-V](app-v/appv-deploying-microsoft-office-2013-with-appv.md)
|
||||
#### [Deploying Microsoft Office 2010 by Using App-V](app-v/appv-deploying-microsoft-office-2010-wth-appv.md)
|
||||
### [Operations for App-V](app-v/appv-operations.md)
|
||||
#### [Creating and Managing App-V Virtualized Applications](app-v/appv-creating-and-managing-virtualized-applications.md)
|
||||
##### [Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)](app-v/appv-auto-provision-a-vm.md)
|
||||
##### [Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](app-v/appv-auto-batch-sequencing.md)
|
||||
##### [Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)](app-v/appv-auto-batch-updating.md)
|
||||
##### [Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)](app-v/appv-sequence-a-new-application.md)
|
||||
##### [How to Modify an Existing Virtual Application Package](app-v/appv-modify-an-existing-virtual-application-package.md)
|
||||
##### [How to Create and Use a Project Template](app-v/appv-create-and-use-a-project-template.md)
|
||||
##### [How to Create a Package Accelerator](app-v/appv-create-a-package-accelerator.md)
|
||||
##### [How to Create a Virtual Application Package Using an App-V Package Accelerator](app-v/appv-create-a-virtual-application-package-package-accelerator.md)
|
||||
#### [Administering App-V Virtual Applications by Using the Management Console](app-v/appv-administering-virtual-applications-with-the-management-console.md)
|
||||
##### [About App-V Dynamic Configuration](app-v/appv-dynamic-configuration.md)
|
||||
##### [How to Connect to the Management Console](app-v/appv-connect-to-the-management-console.md)
|
||||
##### [How to Add or Upgrade Packages by Using the Management Console](app-v/appv-add-or-upgrade-packages-with-the-management-console.md)
|
||||
##### [How to Configure Access to Packages by Using the Management Console](app-v/appv-configure-access-to-packages-with-the-management-console.md)
|
||||
##### [How to Publish a Package by Using the Management Console](app-v/appv-publish-a-packages-with-the-management-console.md)
|
||||
##### [How to Delete a Package in the Management Console](app-v/appv-delete-a-package-with-the-management-console.md)
|
||||
##### [How to Add or Remove an Administrator by Using the Management Console](app-v/appv-add-or-remove-an-administrator-with-the-management-console.md)
|
||||
##### [How to Register and Unregister a Publishing Server by Using the Management Console](app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md)
|
||||
##### [How to Create a Custom Configuration File by Using the App-V Management Console](app-v/appv-create-a-custom-configuration-file-with-the-management-console.md)
|
||||
##### [How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console](app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md)
|
||||
##### [How to Customize Virtual Applications Extensions for a Specific AD Group by Using the Management Console](app-v/appv-customize-virtual-application-extensions-with-the-management-console.md)
|
||||
##### [How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console](app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md)
|
||||
#### [Managing Connection Groups](app-v/appv-managing-connection-groups.md)
|
||||
##### [About the Connection Group Virtual Environment](app-v/appv-connection-group-virtual-environment.md)
|
||||
##### [About the Connection Group File](app-v/appv-connection-group-file.md)
|
||||
##### [How to Create a Connection Group](app-v/appv-create-a-connection-group.md)
|
||||
##### [How to Create a Connection Group with User-Published and Globally Published Packages](app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md)
|
||||
##### [How to Delete a Connection Group](app-v/appv-delete-a-connection-group.md)
|
||||
##### [How to Publish a Connection Group](app-v/appv-publish-a-connection-group.md)
|
||||
##### [How to Make a Connection Group Ignore the Package Version](app-v/appv-configure-connection-groups-to-ignore-the-package-version.md)
|
||||
##### [How to Allow Only Administrators to Enable Connection Groups](app-v/appv-allow-administrators-to-enable-connection-groups.md)
|
||||
#### [Deploying App-V Packages by Using Electronic Software Distribution (ESD)](app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md)
|
||||
##### [How to deploy App-V Packages Using Electronic Software Distribution](app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md)
|
||||
##### [How to Enable Only Administrators to Publish Packages by Using an ESD](app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md)
|
||||
#### [Using the App-V Client Management Console](app-v/appv-using-the-client-management-console.md)
|
||||
##### [Automatically clean-up unpublished packages on the App-V client](app-v/appv-auto-clean-unpublished-packages.md)
|
||||
#### [Migrating to App-V from a Previous Version](app-v/appv-migrating-to-appv-from-a-previous-version.md)
|
||||
##### [How to Convert a Package Created in a Previous Version of App-V](app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md)
|
||||
#### [Maintaining App-V](app-v/appv-maintaining-appv.md)
|
||||
##### [How to Move the App-V Server to Another Computer](app-v/appv-move-the-appv-server-to-another-computer.md)
|
||||
#### [Administering App-V by Using Windows PowerShell](app-v/appv-administering-appv-with-powershell.md)
|
||||
##### [How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help](app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md)
|
||||
##### [How to Manage App-V Packages Running on a Stand-Alone Computer by Using Windows PowerShell](app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md)
|
||||
##### [How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell](app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md)
|
||||
##### [How to Modify Client Configuration by Using Windows PowerShell](app-v/appv-modify-client-configuration-with-powershell.md)
|
||||
##### [How to Configure the Client to Receive Package and Connection Groups Updates From the Publishing Server](app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md)
|
||||
##### [How to Apply the User Configuration File by Using Windows PowerShell](app-v/appv-apply-the-user-configuration-file-with-powershell.md)
|
||||
##### [How to Apply the Deployment Configuration File by Using Windows PowerShell](app-v/appv-apply-the-deployment-configuration-file-with-powershell.md)
|
||||
##### [How to Sequence a Package by Using Windows PowerShell](app-v/appv-sequence-a-package-with-powershell.md)
|
||||
##### [How to Create a Package Accelerator by Using Windows PowerShell](app-v/appv-create-a-package-accelerator-with-powershell.md)
|
||||
##### [How to Enable Reporting on the App-V Client by Using Windows PowerShell](app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md)
|
||||
##### [How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell](app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md)
|
||||
### [Troubleshooting App-V](app-v/appv-troubleshooting.md)
|
||||
### [Technical Reference for App-V](app-v/appv-technical-reference.md)
|
||||
#### [Available Mobile Device Management (MDM) settings for App-V](app-v/appv-available-mdm-settings.md)
|
||||
#### [Performance Guidance for Application Virtualization](app-v/appv-performance-guidance.md)
|
||||
#### [Application Publishing and Client Interaction](app-v/appv-application-publishing-and-client-interaction.md)
|
||||
#### [Viewing App-V Server Publishing Metadata](app-v/appv-viewing-appv-server-publishing-metadata.md)
|
||||
#### [Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications](app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md)
|
||||
## [Service Host process refactoring](svchost-service-refactoring.md)
|
||||
## [Per-user services in Windows](per-user-services-in-windows.md)
|
||||
## [Disabling System Services in Windows Server](/windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server)
|
||||
## [Deploy app upgrades on Windows 10 Mobile](deploy-app-upgrades-windows-10-mobile.md)
|
||||
## [Change history for Application management](change-history-for-application-management.md)
|
||||
## [How to keep apps removed from Windows 10 from returning during an update](remove-provisioned-apps-during-update.md)
|
244
windows/application-management/TOC.yml
Normal file
244
windows/application-management/TOC.yml
Normal file
@ -0,0 +1,244 @@
|
||||
- name: Manage applications in Windows 10
|
||||
href: index.md
|
||||
items:
|
||||
- name: Sideload apps
|
||||
href: sideload-apps-in-windows-10.md
|
||||
- name: Remove background task resource restrictions
|
||||
href: enterprise-background-activity-controls.md
|
||||
- name: Enable or block Windows Mixed Reality apps in the enterprise
|
||||
href: manage-windows-mixed-reality.md
|
||||
- name: Understand apps in Windows 10
|
||||
href: apps-in-windows-10.md
|
||||
- name: Add apps and features in Windows 10
|
||||
href: add-apps-and-features.md
|
||||
- name: Repackage win32 apps in the MSIX format
|
||||
href: msix-app-packaging-tool.md
|
||||
- name: Application Virtualization (App-V) for Windows
|
||||
href: app-v/appv-for-windows.md
|
||||
items:
|
||||
- name: Getting Started with App-V
|
||||
href: app-v/appv-getting-started.md
|
||||
items:
|
||||
- name: What's new in App-V for Windows 10, version 1703 and earlier
|
||||
href: app-v/appv-about-appv.md
|
||||
items:
|
||||
- name: Release Notes for App-V for Windows 10, version 1607
|
||||
href: app-v/appv-release-notes-for-appv-for-windows.md
|
||||
- name: Release Notes for App-V for Windows 10, version 1703
|
||||
href: app-v/appv-release-notes-for-appv-for-windows-1703.md
|
||||
- name: Evaluating App-V
|
||||
href: app-v/appv-evaluating-appv.md
|
||||
- name: High Level Architecture for App-V
|
||||
href: app-v/appv-high-level-architecture.md
|
||||
- name: Planning for App-V
|
||||
href: app-v/appv-planning-for-appv.md
|
||||
items:
|
||||
- name: Preparing Your Environment for App-V
|
||||
href: app-v/appv-preparing-your-environment.md
|
||||
items:
|
||||
- name: App-V Prerequisites
|
||||
href: app-v/appv-prerequisites.md
|
||||
- name: App-V Security Considerations
|
||||
href: app-v/appv-security-considerations.md
|
||||
- name: Planning to Deploy App-V
|
||||
href: app-v/appv-planning-to-deploy-appv.md
|
||||
items:
|
||||
- name: App-V Supported Configurations
|
||||
href: app-v/appv-supported-configurations.md
|
||||
- name: App-V Capacity Planning
|
||||
href: app-v/appv-capacity-planning.md
|
||||
- name: Planning for High Availability with App-V
|
||||
href: app-v/appv-planning-for-high-availability-with-appv.md
|
||||
- name: Planning to Deploy App-V with an Electronic Software Distribution System
|
||||
href: app-v/appv-planning-to-deploy-appv-with-electronic-software-distribution-solutions.md
|
||||
- name: Planning for the App-V Server Deployment
|
||||
href: app-v/appv-planning-for-appv-server-deployment.md
|
||||
- name: Planning for the App-V Sequencer and Client Deployment
|
||||
href: app-v/appv-planning-for-sequencer-and-client-deployment.md
|
||||
- name: Planning for Using App-V with Office
|
||||
href: app-v/appv-planning-for-using-appv-with-office.md
|
||||
- name: Planning to Use Folder Redirection with App-V
|
||||
href: app-v/appv-planning-folder-redirection-with-appv.md
|
||||
- name: App-V Planning Checklist
|
||||
href: app-v/appv-planning-checklist.md
|
||||
- name: Deploying App-V
|
||||
href: app-v/appv-deploying-appv.md
|
||||
items:
|
||||
- name: Deploying the App-V Sequencer and Configuring the Client
|
||||
href: app-v/appv-deploying-the-appv-sequencer-and-client.md
|
||||
items:
|
||||
- name: About Client Configuration Settings
|
||||
href: app-v/appv-client-configuration-settings.md
|
||||
- name: Enable the App-V desktop client
|
||||
href: app-v/appv-enable-the-app-v-desktop-client.md
|
||||
- name: How to Install the Sequencer
|
||||
href: app-v/appv-install-the-sequencer.md
|
||||
- name: Deploying the App-V Server
|
||||
href: app-v/appv-deploying-the-appv-server.md
|
||||
items:
|
||||
- name: How to Deploy the App-V Server
|
||||
href: app-v/appv-deploy-the-appv-server.md
|
||||
- name: How to Deploy the App-V Server Using a Script
|
||||
href: app-v/appv-deploy-the-appv-server-with-a-script.md
|
||||
- name: How to Deploy the App-V Databases by Using SQL Scripts
|
||||
href: app-v/appv-deploy-appv-databases-with-sql-scripts.md
|
||||
- name: How to Install the Publishing Server on a Remote Computer
|
||||
href: app-v/appv-install-the-publishing-server-on-a-remote-computer.md
|
||||
- name: How to Install the Management and Reporting Databases on Separate Computers from the Management and Reporting Services
|
||||
href: app-v/appv-install-the-management-and-reporting-databases-on-separate-computers.md
|
||||
- name: How to install the Management Server on a Standalone Computer and Connect it to the Database
|
||||
href: app-v/appv-install-the-management-server-on-a-standalone-computer.md
|
||||
- name: About App-V Reporting
|
||||
href: app-v/appv-reporting.md
|
||||
- name: How to install the Reporting Server on a Standalone Computer and Connect it to the Database
|
||||
href: app-v/appv-install-the-reporting-server-on-a-standalone-computer.md
|
||||
- name: App-V Deployment Checklist
|
||||
href: app-v/appv-deployment-checklist.md
|
||||
- name: Deploying Microsoft Office 2016 by Using App-V
|
||||
href: app-v/appv-deploying-microsoft-office-2016-with-appv.md
|
||||
- name: Deploying Microsoft Office 2013 by Using App-V
|
||||
href: app-v/appv-deploying-microsoft-office-2013-with-appv.md
|
||||
- name: Deploying Microsoft Office 2010 by Using App-V
|
||||
href: app-v/appv-deploying-microsoft-office-2010-wth-appv.md
|
||||
- name: Operations for App-V
|
||||
href: app-v/appv-operations.md
|
||||
items:
|
||||
- name: Creating and Managing App-V Virtualized Applications
|
||||
href: app-v/appv-creating-and-managing-virtualized-applications.md
|
||||
items:
|
||||
- name: Automatically provision your sequencing environment using Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
||||
href: app-v/appv-auto-provision-a-vm.md
|
||||
- name: Automatically sequence multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
||||
href: app-v/appv-auto-batch-sequencing.md
|
||||
- name: Automatically update multiple apps at the same time using Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
||||
href: app-v/appv-auto-batch-updating.md
|
||||
- name: Manually sequence a new app using Microsoft Application Virtualization Sequencer (App-V Sequencer)
|
||||
href: app-v/appv-sequence-a-new-application.md
|
||||
- name: How to Modify an Existing Virtual Application Package
|
||||
href: app-v/appv-modify-an-existing-virtual-application-package.md
|
||||
- name: How to Create and Use a Project Template
|
||||
href: app-v/appv-create-and-use-a-project-template.md
|
||||
- name: How to Create a Package Accelerator
|
||||
href: app-v/appv-create-a-package-accelerator.md
|
||||
- name: How to Create a Virtual Application Package Using an App-V Package Accelerator
|
||||
href: app-v/appv-create-a-virtual-application-package-package-accelerator.md
|
||||
- name: Administering App-V Virtual Applications by Using the Management Console
|
||||
href: app-v/appv-administering-virtual-applications-with-the-management-console.md
|
||||
items:
|
||||
- name: About App-V Dynamic Configuration
|
||||
href: app-v/appv-dynamic-configuration.md
|
||||
- name: How to Connect to the Management Console
|
||||
href: app-v/appv-connect-to-the-management-console.md
|
||||
- name: How to Add or Upgrade Packages by Using the Management Console
|
||||
href: app-v/appv-add-or-upgrade-packages-with-the-management-console.md
|
||||
- name: How to Configure Access to Packages by Using the Management Console
|
||||
href: app-v/appv-configure-access-to-packages-with-the-management-console.md
|
||||
- name: How to Publish a Package by Using the Management Console
|
||||
href: app-v/appv-publish-a-packages-with-the-management-console.md
|
||||
- name: How to Delete a Package in the Management Console
|
||||
href: app-v/appv-delete-a-package-with-the-management-console.md
|
||||
- name: How to Add or Remove an Administrator by Using the Management Console
|
||||
href: app-v/appv-add-or-remove-an-administrator-with-the-management-console.md
|
||||
- name: How to Register and Unregister a Publishing Server by Using the Management Console
|
||||
href: app-v/appv-register-and-unregister-a-publishing-server-with-the-management-console.md
|
||||
- name: How to Create a Custom Configuration File by Using the App-V Management Console
|
||||
href: app-v/appv-create-a-custom-configuration-file-with-the-management-console.md
|
||||
- name: How to Transfer Access and Configurations to Another Version of a Package by Using the Management Console
|
||||
href: app-v/appv-transfer-access-and-configurations-to-another-version-of-a-package-with-the-management-console.md
|
||||
- name: How to Customize Virtual Applications Extensions for a Specific AD Group by Using the Management Console
|
||||
href: app-v/appv-customize-virtual-application-extensions-with-the-management-console.md
|
||||
- name: How to View and Configure Applications and Default Virtual Application Extensions by Using the Management Console
|
||||
href: app-v/appv-view-and-configure-applications-and-default-virtual-application-extensions-with-the-management-console.md
|
||||
- name: Managing Connection Groups
|
||||
href: app-v/appv-managing-connection-groups.md
|
||||
items:
|
||||
- name: About the Connection Group Virtual Environment
|
||||
href: app-v/appv-connection-group-virtual-environment.md
|
||||
- name: About the Connection Group File
|
||||
href: app-v/appv-connection-group-file.md
|
||||
- name: How to Create a Connection Group
|
||||
href: app-v/appv-create-a-connection-group.md
|
||||
- name: How to Create a Connection Group with User-Published and Globally Published Packages
|
||||
href: app-v/appv-create-a-connection-group-with-user-published-and-globally-published-packages.md
|
||||
- name: How to Delete a Connection Group
|
||||
href: app-v/appv-delete-a-connection-group.md
|
||||
- name: How to Publish a Connection Group
|
||||
href: app-v/appv-publish-a-connection-group.md
|
||||
- name: How to Make a Connection Group Ignore the Package Version
|
||||
href: app-v/appv-configure-connection-groups-to-ignore-the-package-version.md
|
||||
- name: How to Allow Only Administrators to Enable Connection Groups
|
||||
href: app-v/appv-allow-administrators-to-enable-connection-groups.md
|
||||
- name: Deploying App-V Packages by Using Electronic Software Distribution (ESD)
|
||||
href: app-v/appv-deploying-packages-with-electronic-software-distribution-solutions.md
|
||||
items:
|
||||
- name: How to deploy App-V Packages Using Electronic Software Distribution
|
||||
href: app-v/appv-deploy-appv-packages-with-electronic-software-distribution-solutions.md
|
||||
- name: How to Enable Only Administrators to Publish Packages by Using an ESD
|
||||
href: app-v/appv-enable-administrators-to-publish-packages-with-electronic-software-distribution-solutions.md
|
||||
- name: Using the App-V Client Management Console
|
||||
href: app-v/appv-using-the-client-management-console.md
|
||||
items:
|
||||
- name: Automatically clean-up unpublished packages on the App-V client
|
||||
href: app-v/appv-auto-clean-unpublished-packages.md
|
||||
- name: Migrating to App-V from a Previous Version
|
||||
href: app-v/appv-migrating-to-appv-from-a-previous-version.md
|
||||
items:
|
||||
- name: How to Convert a Package Created in a Previous Version of App-V
|
||||
href: app-v/appv-convert-a-package-created-in-a-previous-version-of-appv.md
|
||||
- name: Maintaining App-V
|
||||
href: app-v/appv-maintaining-appv.md
|
||||
items:
|
||||
- name: How to Move the App-V Server to Another Computer
|
||||
href: app-v/appv-move-the-appv-server-to-another-computer.md
|
||||
- name: Administering App-V by Using Windows PowerShell
|
||||
href: app-v/appv-administering-appv-with-powershell.md
|
||||
items:
|
||||
- name: How to Load the Windows PowerShell Cmdlets for App-V and Get Cmdlet Help
|
||||
href: app-v/appv-load-the-powershell-cmdlets-and-get-cmdlet-help.md
|
||||
- name: How to Manage App-V Packages Running on a Stand-Alone Computer by Using Windows PowerShell
|
||||
href: app-v/appv-manage-appv-packages-running-on-a-stand-alone-computer-with-powershell.md
|
||||
- name: How to Manage Connection Groups on a Stand-alone Computer by Using Windows PowerShell
|
||||
href: app-v/appv-manage-connection-groups-on-a-stand-alone-computer-with-powershell.md
|
||||
- name: How to Modify Client Configuration by Using Windows PowerShell
|
||||
href: app-v/appv-modify-client-configuration-with-powershell.md
|
||||
- name: How to Configure the Client to Receive Package and Connection Groups Updates From the Publishing Server
|
||||
href: app-v/appv-configure-the-client-to-receive-updates-from-the-publishing-server.md
|
||||
- name: How to Apply the User Configuration File by Using Windows PowerShell
|
||||
href: app-v/appv-apply-the-user-configuration-file-with-powershell.md
|
||||
- name: How to Apply the Deployment Configuration File by Using Windows PowerShell
|
||||
href: app-v/appv-apply-the-deployment-configuration-file-with-powershell.md
|
||||
- name: How to Sequence a Package by Using Windows PowerShell
|
||||
href: app-v/appv-sequence-a-package-with-powershell.md
|
||||
- name: How to Create a Package Accelerator by Using Windows PowerShell
|
||||
href: app-v/appv-create-a-package-accelerator-with-powershell.md
|
||||
- name: How to Enable Reporting on the App-V Client by Using Windows PowerShell
|
||||
href: app-v/appv-enable-reporting-on-the-appv-client-with-powershell.md
|
||||
- name: How to Install the App-V Databases and Convert the Associated Security Identifiers by Using Windows PowerShell
|
||||
href: app-v/appv-install-the-appv-databases-and-convert-the-associated-security-identifiers-with-powershell.md
|
||||
- name: Troubleshooting App-V
|
||||
href: app-v/appv-troubleshooting.md
|
||||
- name: Technical Reference for App-V
|
||||
href: app-v/appv-technical-reference.md
|
||||
items:
|
||||
- name: Available Mobile Device Management (MDM) settings for App-V
|
||||
href: app-v/appv-available-mdm-settings.md
|
||||
- name: Performance Guidance for Application Virtualization
|
||||
href: app-v/appv-performance-guidance.md
|
||||
- name: Application Publishing and Client Interaction
|
||||
href: app-v/appv-application-publishing-and-client-interaction.md
|
||||
- name: Viewing App-V Server Publishing Metadata
|
||||
href: app-v/appv-viewing-appv-server-publishing-metadata.md
|
||||
- name: Running a Locally Installed Application Inside a Virtual Environment with Virtualized Applications
|
||||
href: app-v/appv-running-locally-installed-applications-inside-a-virtual-environment.md
|
||||
- name: Service Host process refactoring
|
||||
href: svchost-service-refactoring.md
|
||||
- name: Per-user services in Windows
|
||||
href: per-user-services-in-windows.md
|
||||
- name: Disabling System Services in Windows Server
|
||||
href: /windows-server/security/windows-services/security-guidelines-for-disabling-system-services-in-windows-server
|
||||
- name: Deploy app upgrades on Windows 10 Mobile
|
||||
href: deploy-app-upgrades-windows-10-mobile.md
|
||||
- name: Change history for Application management
|
||||
href: change-history-for-application-management.md
|
||||
- name: How to keep apps removed from Windows 10 from returning during an update
|
||||
href: remove-provisioned-apps-during-update.md
|
@ -1,38 +0,0 @@
|
||||
# [Manage clients in Windows 10](index.md)
|
||||
## [Administrative Tools in Windows 10](administrative-tools-in-windows-10.md)
|
||||
### [Use Quick Assist to help users](quick-assist.md)
|
||||
## [Create mandatory user profiles](mandatory-user-profile.md)
|
||||
## [Connect to remote Azure Active Directory-joined PC](connect-to-remote-aadj-pc.md)
|
||||
## [Join Windows 10 Mobile to Azure Active Directory](join-windows-10-mobile-to-azure-active-directory.md)
|
||||
## [New policies for Windows 10](new-policies-for-windows-10.md)
|
||||
## [Windows 10 default media removal policy](change-default-removal-policy-external-storage-media.md)
|
||||
## [Group Policies that apply only to Windows 10 Enterprise and Windows 10 Education](group-policies-for-enterprise-and-education-editions.md)
|
||||
## [Manage the Settings app with Group Policy](manage-settings-app-with-group-policy.md)
|
||||
## [What version of Windows am I running](windows-version-search.md)
|
||||
## [Reset a Windows 10 Mobile device](reset-a-windows-10-mobile-device.md)
|
||||
## [Transitioning to modern management](manage-windows-10-in-your-organization-modern-management.md)
|
||||
## [Windows 10 Mobile deployment and management guide](windows-10-mobile-and-mdm.md)
|
||||
## [Windows libraries](windows-libraries.md)
|
||||
## [Troubleshoot Windows 10 clients](windows-10-support-solutions.md)
|
||||
### [Advanced troubleshooting for Windows networking](troubleshoot-networking.md)
|
||||
#### [Advanced troubleshooting Wireless network connectivity](advanced-troubleshooting-wireless-network-connectivity.md)
|
||||
#### [Advanced troubleshooting 802.1X authentication](advanced-troubleshooting-802-authentication.md)
|
||||
##### [Data collection for troubleshooting 802.1X authentication](data-collection-for-802-authentication.md)
|
||||
#### [Advanced troubleshooting for TCP/IP](troubleshoot-tcpip.md)
|
||||
##### [Collect data using Network Monitor](troubleshoot-tcpip-netmon.md)
|
||||
##### [Troubleshoot TCP/IP connectivity](troubleshoot-tcpip-connectivity.md)
|
||||
##### [Troubleshoot port exhaustion](troubleshoot-tcpip-port-exhaust.md)
|
||||
##### [Troubleshoot Remote Procedure Call (RPC) errors](troubleshoot-tcpip-rpc-errors.md)
|
||||
### [Advanced troubleshooting for Windows startup](troubleshoot-windows-startup.md)
|
||||
#### [How to determine the appropriate page file size for 64-bit versions of Windows](determine-appropriate-page-file-size.md)
|
||||
#### [Generate a kernel or complete crash dump](generate-kernel-or-complete-crash-dump.md)
|
||||
#### [Introduction to the page file](introduction-page-file.md)
|
||||
#### [Configure system failure and recovery options in Windows](system-failure-recovery-options.md)
|
||||
#### [Advanced troubleshooting for Windows boot problems](advanced-troubleshooting-boot-problems.md)
|
||||
#### [Advanced troubleshooting for Windows-based computer freeze](troubleshoot-windows-freeze.md)
|
||||
#### [Advanced troubleshooting for stop error or blue screen error](troubleshoot-stop-errors.md)
|
||||
#### [Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device](troubleshoot-inaccessible-boot-device.md)
|
||||
#### [Advanced troubleshooting for Event ID 41 "The system has rebooted without cleanly shutting down first"](troubleshoot-event-id-41-restart.md)
|
||||
#### [Stop error occurs when you update the in-box Broadcom network adapter driver](troubleshoot-stop-error-on-broadcom-driver-update.md)
|
||||
## [Mobile device management for solution providers](mdm/index.md)
|
||||
## [Change history for Client management](change-history-for-client-management.md)
|
83
windows/client-management/TOC.yml
Normal file
83
windows/client-management/TOC.yml
Normal file
@ -0,0 +1,83 @@
|
||||
- name: Manage clients in Windows 10
|
||||
href: index.md
|
||||
items:
|
||||
- name: Administrative Tools in Windows 10
|
||||
href: administrative-tools-in-windows-10.md
|
||||
items:
|
||||
- name: Use Quick Assist to help users
|
||||
href: quick-assist.md
|
||||
- name: Create mandatory user profiles
|
||||
href: mandatory-user-profile.md
|
||||
- name: Connect to remote Azure Active Directory-joined PC
|
||||
href: connect-to-remote-aadj-pc.md
|
||||
- name: Join Windows 10 Mobile to Azure Active Directory
|
||||
href: join-windows-10-mobile-to-azure-active-directory.md
|
||||
- name: New policies for Windows 10
|
||||
href: new-policies-for-windows-10.md
|
||||
- name: Windows 10 default media removal policy
|
||||
href: change-default-removal-policy-external-storage-media.md
|
||||
- name: Group Policies that apply only to Windows 10 Enterprise and Windows 10 Education
|
||||
href: group-policies-for-enterprise-and-education-editions.md
|
||||
- name: Manage the Settings app with Group Policy
|
||||
href: manage-settings-app-with-group-policy.md
|
||||
- name: What version of Windows am I running
|
||||
href: windows-version-search.md
|
||||
- name: Reset a Windows 10 Mobile device
|
||||
href: reset-a-windows-10-mobile-device.md
|
||||
- name: Transitioning to modern management
|
||||
href: manage-windows-10-in-your-organization-modern-management.md
|
||||
- name: Windows 10 Mobile deployment and management guide
|
||||
href: windows-10-mobile-and-mdm.md
|
||||
- name: Windows libraries
|
||||
href: windows-libraries.md
|
||||
- name: Troubleshoot Windows 10 clients
|
||||
href: windows-10-support-solutions.md
|
||||
items:
|
||||
- name: Advanced troubleshooting for Windows networking
|
||||
href: troubleshoot-networking.md
|
||||
items:
|
||||
- name: Advanced troubleshooting Wireless network connectivity
|
||||
href: advanced-troubleshooting-wireless-network-connectivity.md
|
||||
- name: Advanced troubleshooting 802.1X authentication
|
||||
href: advanced-troubleshooting-802-authentication.md
|
||||
items:
|
||||
- name: Data collection for troubleshooting 802.1X authentication
|
||||
href: data-collection-for-802-authentication.md
|
||||
- name: Advanced troubleshooting for TCP/IP
|
||||
href: troubleshoot-tcpip.md
|
||||
items:
|
||||
- name: Collect data using Network Monitor
|
||||
href: troubleshoot-tcpip-netmon.md
|
||||
- name: Troubleshoot TCP/IP connectivity
|
||||
href: troubleshoot-tcpip-connectivity.md
|
||||
- name: Troubleshoot port exhaustion
|
||||
href: troubleshoot-tcpip-port-exhaust.md
|
||||
- name: Troubleshoot Remote Procedure Call (RPC) errors
|
||||
href: troubleshoot-tcpip-rpc-errors.md
|
||||
- name: Advanced troubleshooting for Windows startup
|
||||
href: troubleshoot-windows-startup.md
|
||||
items:
|
||||
- name: How to determine the appropriate page file size for 64-bit versions of Windows
|
||||
href: determine-appropriate-page-file-size.md
|
||||
- name: Generate a kernel or complete crash dump
|
||||
href: generate-kernel-or-complete-crash-dump.md
|
||||
- name: Introduction to the page file
|
||||
href: introduction-page-file.md
|
||||
- name: Configure system failure and recovery options in Windows
|
||||
href: system-failure-recovery-options.md
|
||||
- name: Advanced troubleshooting for Windows boot problems
|
||||
href: advanced-troubleshooting-boot-problems.md
|
||||
- name: Advanced troubleshooting for Windows-based computer freeze
|
||||
href: troubleshoot-windows-freeze.md
|
||||
- name: Advanced troubleshooting for stop error or blue screen error
|
||||
href: troubleshoot-stop-errors.md
|
||||
- name: Advanced troubleshooting for stop error 7B or Inaccessible_Boot_Device
|
||||
href: troubleshoot-inaccessible-boot-device.md
|
||||
- name: Advanced troubleshooting for Event ID 41 "The system has rebooted without cleanly shutting down first"
|
||||
href: troubleshoot-event-id-41-restart.md
|
||||
- name: Stop error occurs when you update the in-box Broadcom network adapter driver
|
||||
href: troubleshoot-stop-error-on-broadcom-driver-update.md
|
||||
- name: Mobile device management for solution providers
|
||||
href: mdm/index.md
|
||||
- name: Change history for Client management
|
||||
href: change-history-for-client-management.md
|
@ -1,435 +0,0 @@
|
||||
# [Mobile device management](index.md)
|
||||
## [What's new in MDM enrollment and management](new-in-windows-mdm-enrollment-management.md)
|
||||
### [Change history for MDM documentation](change-history-for-mdm-documentation.md)
|
||||
## [Mobile device enrollment](mobile-device-enrollment.md)
|
||||
### [MDM enrollment of Windows devices](mdm-enrollment-of-windows-devices.md)
|
||||
#### [Azure AD and Microsoft Intune: Automatic MDM enrollment in the new Portal](azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md)
|
||||
### [Enroll a Windows 10 device automatically using Group Policy](enroll-a-windows-10-device-automatically-using-group-policy.md)
|
||||
### [Federated authentication device enrollment](federated-authentication-device-enrollment.md)
|
||||
### [Certificate authentication device enrollment](certificate-authentication-device-enrollment.md)
|
||||
### [On-premises authentication device enrollment](on-premise-authentication-device-enrollment.md)
|
||||
## [Understanding ADMX-backed policies](understanding-admx-backed-policies.md)
|
||||
## [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md)
|
||||
## [Win32 and Desktop Bridge app policy configuration](win32-and-centennial-app-policy-configuration.md)
|
||||
## [Implement server-side support for mobile application management on Windows](implement-server-side-mobile-application-management.md)
|
||||
## [Diagnose MDM failures in Windows 10](diagnose-mdm-failures-in-windows-10.md)
|
||||
## [Deploy and configure App-V apps using MDM](appv-deploy-and-config.md)
|
||||
## [Azure Active Directory integration with MDM](azure-active-directory-integration-with-mdm.md)
|
||||
### [Add an Azure AD tenant and Azure AD subscription](add-an-azure-ad-tenant-and-azure-ad-subscription.md)
|
||||
### [Register your free Azure Active Directory subscription](register-your-free-azure-active-directory-subscription.md)
|
||||
## [Enterprise app management](enterprise-app-management.md)
|
||||
## [Mobile device management (MDM) for device updates](device-update-management.md)
|
||||
## [Bulk enrollment](bulk-enrollment-using-windows-provisioning-tool.md)
|
||||
## [Management tool for the Microsoft Store for Business](management-tool-for-windows-store-for-business.md)
|
||||
### [REST API reference for Microsoft Store for Business](rest-api-reference-windows-store-for-business.md)
|
||||
#### [Data structures for Microsoft Store for Business](data-structures-windows-store-for-business.md)
|
||||
#### [Get Inventory](get-inventory.md)
|
||||
#### [Get product details](get-product-details.md)
|
||||
#### [Get localized product details](get-localized-product-details.md)
|
||||
#### [Get offline license](get-offline-license.md)
|
||||
#### [Get product packages](get-product-packages.md)
|
||||
#### [Get product package](get-product-package.md)
|
||||
#### [Get seats](get-seats.md)
|
||||
#### [Get seat](get-seat.md)
|
||||
#### [Assign seats](assign-seats.md)
|
||||
#### [Reclaim seat from user](reclaim-seat-from-user.md)
|
||||
#### [Bulk assign and reclaim seats from users](bulk-assign-and-reclaim-seats-from-user.md)
|
||||
#### [Get seats assigned to a user](get-seats-assigned-to-a-user.md)
|
||||
## [Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices](enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md)
|
||||
## [Certificate renewal](certificate-renewal-windows-mdm.md)
|
||||
## [Disconnecting from the management infrastructure (unenrollment)](disconnecting-from-mdm-unenrollment.md)
|
||||
## [Enterprise settings, policies, and app management](windows-mdm-enterprise-settings.md)
|
||||
## [Push notification support for device management](push-notification-windows-mdm.md)
|
||||
## [OMA DM protocol support](oma-dm-protocol-support.md)
|
||||
## [Structure of OMA DM provisioning files](structure-of-oma-dm-provisioning-files.md)
|
||||
## [Server requirements for OMA DM](server-requirements-windows-mdm.md)
|
||||
## [DMProcessConfigXMLFiltered](dmprocessconfigxmlfiltered.md)
|
||||
## [Using PowerShell scripting with the WMI Bridge Provider](using-powershell-scripting-with-the-wmi-bridge-provider.md)
|
||||
## [WMI providers supported in Windows 10](wmi-providers-supported-in-windows.md)
|
||||
## [Configuration service provider reference](configuration-service-provider-reference.md)
|
||||
### [AccountManagement CSP](accountmanagement-csp.md)
|
||||
#### [AccountManagement DDF file](accountmanagement-ddf.md)
|
||||
### [Accounts CSP](accounts-csp.md)
|
||||
#### [Accounts DDF file](accounts-ddf-file.md)
|
||||
### [ActiveSync CSP](activesync-csp.md)
|
||||
#### [ActiveSync DDF file](activesync-ddf-file.md)
|
||||
### [AllJoynManagement CSP](alljoynmanagement-csp.md)
|
||||
#### [AllJoynManagement DDF](alljoynmanagement-ddf.md)
|
||||
### [APPLICATION CSP](application-csp.md)
|
||||
### [ApplicationControl CSP](applicationcontrol-csp.md)
|
||||
#### [ApplicationControl DDF file](applicationcontrol-csp-ddf.md)
|
||||
### [AppLocker CSP](applocker-csp.md)
|
||||
#### [AppLocker DDF file](applocker-ddf-file.md)
|
||||
#### [AppLocker XSD](applocker-xsd.md)
|
||||
### [AssignedAccess CSP](assignedaccess-csp.md)
|
||||
#### [AssignedAccess DDF file](assignedaccess-ddf.md)
|
||||
### [BitLocker CSP](bitlocker-csp.md)
|
||||
#### [BitLocker DDF file](bitlocker-ddf-file.md)
|
||||
### [BOOTSTRAP CSP](bootstrap-csp.md)
|
||||
### [BrowserFavorite CSP](browserfavorite-csp.md)
|
||||
### [CellularSettings CSP](cellularsettings-csp.md)
|
||||
### [CertificateStore CSP](certificatestore-csp.md)
|
||||
#### [CertificateStore DDF file](certificatestore-ddf-file.md)
|
||||
### [CleanPC CSP](cleanpc-csp.md)
|
||||
#### [CleanPC DDF](cleanpc-ddf.md)
|
||||
### [ClientCertificateInstall CSP](clientcertificateinstall-csp.md)
|
||||
#### [ClientCertificateInstall DDF file](clientcertificateinstall-ddf-file.md)
|
||||
### [CM_CellularEntries CSP](cm-cellularentries-csp.md)
|
||||
### [CM_ProxyEntries CSP](cm-proxyentries-csp.md)
|
||||
### [CMPolicy CSP](cmpolicy-csp.md)
|
||||
### [CMPolicyEnterprise CSP](cmpolicyenterprise-csp.md)
|
||||
#### [CMPolicyEnterprise DDF file](cmpolicyenterprise-ddf-file.md)
|
||||
### [CustomDeviceUI CSP](customdeviceui-csp.md)
|
||||
#### [CustomDeviceUI DDF file](customdeviceui-ddf.md)
|
||||
### [Defender CSP](defender-csp.md)
|
||||
#### [Defender DDF file](defender-ddf.md)
|
||||
### [DevDetail CSP](devdetail-csp.md)
|
||||
#### [DevDetail DDF file](devdetail-ddf-file.md)
|
||||
### [DeveloperSetup CSP](developersetup-csp.md)
|
||||
#### [DeveloperSetup DDF](developersetup-ddf.md)
|
||||
### [DeviceInstanceService CSP](deviceinstanceservice-csp.md)
|
||||
### [DeviceLock CSP](devicelock-csp.md)
|
||||
#### [DeviceLock DDF file](devicelock-ddf-file.md)
|
||||
### [DeviceManageability CSP](devicemanageability-csp.md)
|
||||
#### [DeviceManageability DDF](devicemanageability-ddf.md)
|
||||
### [DeviceStatus CSP](devicestatus-csp.md)
|
||||
#### [DeviceStatus DDF](devicestatus-ddf.md)
|
||||
### [DevInfo CSP](devinfo-csp.md)
|
||||
#### [DevInfo DDF file](devinfo-ddf-file.md)
|
||||
### [DiagnosticLog CSP](diagnosticlog-csp.md)
|
||||
#### [DiagnosticLog DDF file](diagnosticlog-ddf.md)
|
||||
### [DMAcc CSP](dmacc-csp.md)
|
||||
#### [DMAcc DDF file](dmacc-ddf-file.md)
|
||||
### [DMClient CSP](dmclient-csp.md)
|
||||
#### [DMClient DDF file](dmclient-ddf-file.md)
|
||||
### [DMSessionActions CSP](dmsessionactions-csp.md)
|
||||
#### [DMSessionActions DDF file](dmsessionactions-ddf.md)
|
||||
### [DynamicManagement CSP](dynamicmanagement-csp.md)
|
||||
#### [DynamicManagement DDF file](dynamicmanagement-ddf.md)
|
||||
### [EMAIL2 CSP](email2-csp.md)
|
||||
#### [EMAIL2 DDF file](email2-ddf-file.md)
|
||||
### [EnrollmentStatusTracking CSP](enrollmentstatustracking-csp.md)
|
||||
#### [EnrollmentStatusTracking DDF file](enrollmentstatustracking-csp-ddf.md)
|
||||
### [EnterpriseAPN CSP](enterpriseapn-csp.md)
|
||||
#### [EnterpriseAPN DDF](enterpriseapn-ddf.md)
|
||||
### [EnterpriseAppManagement CSP](enterpriseappmanagement-csp.md)
|
||||
### [EnterpriseAppVManagement CSP](enterpriseappvmanagement-csp.md)
|
||||
#### [EnterpriseAppVManagement DDF file](enterpriseappvmanagement-ddf.md)
|
||||
### [EnterpriseAssignedAccess CSP](enterpriseassignedaccess-csp.md)
|
||||
#### [EnterpriseAssignedAccess DDF file](enterpriseassignedaccess-ddf.md)
|
||||
#### [EnterpriseAssignedAccess XSD](enterpriseassignedaccess-xsd.md)
|
||||
### [EnterpriseDataProtection CSP](enterprisedataprotection-csp.md)
|
||||
#### [EnterpriseDataProtection DDF file](enterprisedataprotection-ddf-file.md)
|
||||
### [EnterpriseDesktopAppManagement CSP](enterprisedesktopappmanagement-csp.md)
|
||||
#### [EnterpriseDesktopAppManagement DDF](enterprisedesktopappmanagement-ddf-file.md)
|
||||
#### [EnterpriseDesktopAppManagement XSD](enterprisedesktopappmanagement2-xsd.md)
|
||||
### [EnterpriseExt CSP](enterpriseext-csp.md)
|
||||
#### [EnterpriseExt DDF file](enterpriseext-ddf.md)
|
||||
### [EnterpriseExtFileSystem CSP](enterpriseextfilessystem-csp.md)
|
||||
#### [EnterpriseExtFileSystem DDF file](enterpriseextfilesystem-ddf.md)
|
||||
### [EnterpriseModernAppManagement CSP](enterprisemodernappmanagement-csp.md)
|
||||
#### [EnterpriseModernAppManagement DDF](enterprisemodernappmanagement-ddf.md)
|
||||
#### [EnterpriseModernAppManagement XSD](enterprisemodernappmanagement-xsd.md)
|
||||
### [eUICCs CSP](euiccs-csp.md)
|
||||
#### [eUICCs DDF file](euiccs-ddf-file.md)
|
||||
### [FileSystem CSP](filesystem-csp.md)
|
||||
### [Firewall CSP](firewall-csp.md)
|
||||
#### [Firewall DDF file](firewall-ddf-file.md)
|
||||
### [HealthAttestation CSP](healthattestation-csp.md)
|
||||
#### [HealthAttestation DDF](healthattestation-ddf.md)
|
||||
### [HotSpot CSP](hotspot-csp.md)
|
||||
### [Maps CSP](maps-csp.md)
|
||||
#### [Maps DDF](maps-ddf-file.md)
|
||||
### [Messaging CSP](messaging-csp.md)
|
||||
#### [Messaging DDF file](messaging-ddf.md)
|
||||
### [MultiSIM CSP](multisim-csp.md)
|
||||
#### [MultiSIM DDF file](multisim-ddf.md)
|
||||
### [NAP CSP](nap-csp.md)
|
||||
### [NAPDEF CSP](napdef-csp.md)
|
||||
### [NetworkProxy CSP](networkproxy-csp.md)
|
||||
#### [NetworkProxy DDF file](networkproxy-ddf.md)
|
||||
### [NetworkQoSPolicy CSP](networkqospolicy-csp.md)
|
||||
#### [NetworkQoSPolicy DDF file](networkqospolicy-ddf.md)
|
||||
### [NodeCache CSP](nodecache-csp.md)
|
||||
#### [NodeCache DDF file](nodecache-ddf-file.md)
|
||||
### [Office CSP](office-csp.md)
|
||||
#### [Office DDF](office-ddf.md)
|
||||
### [PassportForWork CSP](passportforwork-csp.md)
|
||||
#### [PassportForWork DDF file](passportforwork-ddf.md)
|
||||
### [Personalization CSP](personalization-csp.md)
|
||||
#### [Personalization DDF file](personalization-ddf.md)
|
||||
### [Policy CSP](policy-configuration-service-provider.md)
|
||||
#### [Policy CSP DDF file](policy-ddf-file.md)
|
||||
#### [Policies in Policy CSP supported by Group Policy](policies-in-policy-csp-supported-by-group-policy.md)
|
||||
#### [ADMX-backed policies in Policy CSP](policies-in-policy-csp-admx-backed.md)
|
||||
#### [Policies in Policy CSP supported by HoloLens 2](policies-in-policy-csp-supported-by-hololens2.md)
|
||||
#### [Policies in Policy CSP supported by HoloLens (1st gen) Commercial Suite](policies-in-policy-csp-supported-by-hololens-1st-gen-commercial-suite.md)
|
||||
#### [Policies in Policy CSP supported by HoloLens (1st gen) Development Edition](policies-in-policy-csp-supported-by-hololens-1st-gen-development-edition.md)
|
||||
#### [Policies in Policy CSP supported by Windows 10 IoT Enterprise](./configuration-service-provider-reference.md)
|
||||
#### [Policies in Policy CSP supported by Windows 10 IoT Core](policies-in-policy-csp-supported-by-iot-core.md)
|
||||
#### [Policies in Policy CSP supported by Microsoft Surface Hub](policies-in-policy-csp-supported-by-surface-hub.md)
|
||||
#### [Policy CSPs that can be set using Exchange Active Sync (EAS)](policies-in-policy-csp-that-can-be-set-using-eas.md)
|
||||
#### [AboveLock](policy-csp-abovelock.md)
|
||||
#### [Accounts](policy-csp-accounts.md)
|
||||
#### [ActiveXControls](policy-csp-activexcontrols.md)
|
||||
#### [ADMX_ActiveXInstallService](policy-csp-admx-activexinstallservice.md)
|
||||
#### [ADMX_AddRemovePrograms](policy-csp-admx-addremoveprograms.md)
|
||||
#### [ADMX_AppCompat](policy-csp-admx-appcompat.md)
|
||||
#### [ADMX_AppxPackageManager](policy-csp-admx-appxpackagemanager.md)
|
||||
#### [ADMX_AppXRuntime](policy-csp-admx-appxruntime.md)
|
||||
#### [ADMX_AttachmentManager](policy-csp-admx-attachmentmanager.md)
|
||||
#### [ADMX_AuditSettings](policy-csp-admx-auditsettings.md)
|
||||
#### [ADMX_Bits](policy-csp-admx-bits.md)
|
||||
#### [ADMX_CipherSuiteOrder](policy-csp-admx-ciphersuiteorder.md)
|
||||
#### [ADMX_COM](policy-csp-admx-com.md)
|
||||
#### [ADMX_ControlPanel](policy-csp-admx-controlpanel.md)
|
||||
#### [ADMX_ControlPanelDisplay](policy-csp-admx-controlpaneldisplay.md)
|
||||
#### [ADMX_Cpls](policy-csp-admx-cpls.md)
|
||||
#### [ADMX_CredentialProviders](policy-csp-admx-credentialproviders.md)
|
||||
#### [ADMX_CredSsp](policy-csp-admx-credssp.md)
|
||||
#### [ADMX_CredUI](policy-csp-admx-credui.md)
|
||||
#### [ADMX_CtrlAltDel](policy-csp-admx-ctrlaltdel.md)
|
||||
#### [ADMX_DataCollection](policy-csp-admx-datacollection.md)
|
||||
#### [ADMX_Desktop](policy-csp-admx-desktop.md)
|
||||
#### [ADMX_DeviceInstallation](policy-csp-admx-deviceinstallation.md)
|
||||
#### [ADMX_DeviceSetup](policy-csp-admx-devicesetup.md)
|
||||
#### [ADMX_DigitalLocker](policy-csp-admx-digitallocker.md)
|
||||
#### [ADMX_DistributedLinkTracking](policy-csp-admx-distributedlinktracking.md)
|
||||
#### [ADMX_DnsClient](policy-csp-admx-dnsclient.md)
|
||||
#### [ADMX_DWM](policy-csp-admx-dwm.md)
|
||||
#### [ADMX_EAIME](policy-csp-admx-eaime.md)
|
||||
#### [ADMX_EncryptFilesonMove](policy-csp-admx-encryptfilesonmove.md)
|
||||
#### [ADMX_EnhancedStorage](policy-csp-admx-enhancedstorage.md)
|
||||
#### [ADMX_ErrorReporting](policy-csp-admx-errorreporting.md)
|
||||
#### [ADMX_EventForwarding](policy-csp-admx-eventforwarding.md)
|
||||
#### [ADMX_EventLog](policy-csp-admx-eventlog.md)
|
||||
#### [ADMX_Explorer](policy-csp-admx-explorer.md)
|
||||
#### [ADMX_FileRecovery](policy-csp-admx-filerecovery.md)
|
||||
#### [ADMX_FileServerVSSProvider](policy-csp-admx-fileservervssprovider.md)
|
||||
#### [ADMX_FileSys](policy-csp-admx-filesys.md)
|
||||
#### [ADMX_FolderRedirection](policy-csp-admx-folderredirection.md)
|
||||
#### [ADMX_Globalization](policy-csp-admx-globalization.md)
|
||||
#### [ADMX_GroupPolicy](policy-csp-admx-grouppolicy.md)
|
||||
#### [ADMX_Help](policy-csp-admx-help.md)
|
||||
#### [ADMX_HelpAndSupport](policy-csp-admx-helpandsupport.md)
|
||||
#### [ADMX_ICM](policy-csp-admx-icm.md)
|
||||
#### [ADMX_kdc](policy-csp-admx-kdc.md)
|
||||
#### [ADMX_Kerberos](policy-csp-admx-kerberos.md)
|
||||
#### [ADMX_LanmanServer](policy-csp-admx-lanmanserver.md)
|
||||
#### [ADMX_LanmanWorkstation](policy-csp-admx-lanmanworkstation.md)
|
||||
#### [ADMX_LinkLayerTopologyDiscovery](policy-csp-admx-linklayertopologydiscovery.md)
|
||||
#### [ADMX_Logon](policy-csp-admx-logon.md)
|
||||
#### [ADMX_MicrosoftDefenderAntivirus](policy-csp-admx-microsoftdefenderantivirus.md)
|
||||
#### [ADMX_MMC](policy-csp-admx-mmc.md)
|
||||
#### [ADMX_MMCSnapins](policy-csp-admx-mmcsnapins.md)
|
||||
#### [ADMX_MSAPolicy](policy-csp-admx-msapolicy.md)
|
||||
#### [ADMX_msched](policy-csp-admx-msched.md)
|
||||
#### [ADMX_MSDT](policy-csp-admx-msdt.md)
|
||||
#### [ADMX_MSI](policy-csp-admx-msi.md)
|
||||
#### [ADMX_nca](policy-csp-admx-nca.md)
|
||||
#### [ADMX_NCSI](policy-csp-admx-ncsi.md)
|
||||
#### [ADMX_Netlogon](policy-csp-admx-netlogon.md)
|
||||
#### [ADMX_NetworkConnections](policy-csp-admx-networkconnections.md)
|
||||
#### [ADMX_OfflineFiles](policy-csp-admx-offlinefiles.md)
|
||||
#### [ADMX_PeerToPeerCaching](policy-csp-admx-peertopeercaching.md)
|
||||
#### [ADMX_PerformanceDiagnostics](policy-csp-admx-performancediagnostics.md)
|
||||
#### [ADMX_Power](policy-csp-admx-power.md)
|
||||
#### [ADMX_PowerShellExecutionPolicy](policy-csp-admx-powershellexecutionpolicy.md)
|
||||
#### [ADMX_Printing](policy-csp-admx-printing.md)
|
||||
#### [ADMX_Printing2](policy-csp-admx-printing2.md)
|
||||
#### [ADMX_Programs](policy-csp-admx-programs.md)
|
||||
#### [ADMX_Reliability](policy-csp-admx-reliability.md)
|
||||
#### [ADMX_RemoteAssistance](policy-csp-admx-remoteassistance.md)
|
||||
#### [ADMX_RemovableStorage](policy-csp-admx-removablestorage.md)
|
||||
#### [ADMX_RPC](policy-csp-admx-rpc.md)
|
||||
#### [ADMX_Scripts](policy-csp-admx-scripts.md)
|
||||
#### [ADMX_sdiageng](policy-csp-admx-sdiageng.md)
|
||||
#### [ADMX_Securitycenter](policy-csp-admx-securitycenter.md)
|
||||
#### [ADMX_Sensors](policy-csp-admx-sensors.md)
|
||||
#### [ADMX_Servicing](policy-csp-admx-servicing.md)
|
||||
#### [ADMX_SettingSync](policy-csp-admx-settingsync.md)
|
||||
#### [ADMX_SharedFolders](policy-csp-admx-sharedfolders.md)
|
||||
#### [ADMX_Sharing](policy-csp-admx-sharing.md)
|
||||
#### [ADMX_ShellCommandPromptRegEditTools](policy-csp-admx-shellcommandpromptregedittools.md)
|
||||
#### [ADMX_SkyDrive](policy-csp-admx-skydrive.md)
|
||||
#### [ADMX_Smartcard](policy-csp-admx-smartcard.md)
|
||||
#### [ADMX_Snmp](policy-csp-admx-snmp.md)
|
||||
#### [ADMX_StartMenu](policy-csp-admx-startmenu.md)
|
||||
#### [ADMX_SystemRestore](policy-csp-admx-systemrestore.md)
|
||||
#### [ADMX_Taskbar](policy-csp-admx-taskbar.md)
|
||||
#### [ADMX_tcpip](policy-csp-admx-tcpip.md)
|
||||
#### [ADMX_Thumbnails](policy-csp-admx-thumbnails.md)
|
||||
#### [ADMX_TPM](policy-csp-admx-tpm.md)
|
||||
#### [ADMX_UserExperienceVirtualization](policy-csp-admx-userexperiencevirtualization.md)
|
||||
#### [ADMX_UserProfiles](policy-csp-admx-userprofiles.md)
|
||||
#### [ADMX_W32Time](policy-csp-admx-w32time.md)
|
||||
#### [ADMX_WCM](policy-csp-admx-wcm.md)
|
||||
#### [ADMX_WinCal](policy-csp-admx-wincal.md)
|
||||
#### [ADMX_WindowsAnytimeUpgrade](policy-csp-admx-windowsanytimeupgrade.md)
|
||||
#### [ADMX_WindowsConnectNow](policy-csp-admx-windowsconnectnow.md)
|
||||
#### [ADMX_WindowsExplorer](policy-csp-admx-windowsexplorer.md)
|
||||
#### [ADMX_WindowsFileProtection](policy-csp-admx-windowsfileprotection.md)
|
||||
#### [ADMX_WindowsMediaDRM](policy-csp-admx-windowsmediadrm.md)
|
||||
#### [ADMX_WindowsMediaPlayer](policy-csp-admx-windowsmediaplayer.md)
|
||||
#### [ADMX_WindowsRemoteManagement](policy-csp-admx-windowsremotemanagement.md)
|
||||
#### [ADMX_WindowsStore](policy-csp-admx-windowsstore.md)
|
||||
#### [ADMX_WinInit](policy-csp-admx-wininit.md)
|
||||
#### [ADMX_WinLogon](policy-csp-admx-winlogon.md)
|
||||
#### [ADMX-Winsrv](policy-csp-admx-winsrv.md)
|
||||
#### [ADMX_wlansvc](policy-csp-admx-wlansvc.md)
|
||||
#### [ADMX_WPN](policy-csp-admx-wpn.md)
|
||||
#### [ApplicationDefaults](policy-csp-applicationdefaults.md)
|
||||
#### [ApplicationManagement](policy-csp-applicationmanagement.md)
|
||||
#### [AppRuntime](policy-csp-appruntime.md)
|
||||
#### [AppVirtualization](policy-csp-appvirtualization.md)
|
||||
#### [AttachmentManager](policy-csp-attachmentmanager.md)
|
||||
#### [Audit](policy-csp-audit.md)
|
||||
#### [Authentication](policy-csp-authentication.md)
|
||||
#### [Autoplay](policy-csp-autoplay.md)
|
||||
#### [BitLocker](policy-csp-bitlocker.md)
|
||||
#### [BITS](policy-csp-bits.md)
|
||||
#### [Bluetooth](policy-csp-bluetooth.md)
|
||||
#### [Browser](policy-csp-browser.md)
|
||||
#### [Camera](policy-csp-camera.md)
|
||||
#### [Cellular](policy-csp-cellular.md)
|
||||
#### [Connectivity](policy-csp-connectivity.md)
|
||||
#### [ControlPolicyConflict](policy-csp-controlpolicyconflict.md)
|
||||
#### [CredentialsDelegation](policy-csp-credentialsdelegation.md)
|
||||
#### [CredentialProviders](policy-csp-credentialproviders.md)
|
||||
#### [CredentialsUI](policy-csp-credentialsui.md)
|
||||
#### [Cryptography](policy-csp-cryptography.md)
|
||||
#### [DataProtection](policy-csp-dataprotection.md)
|
||||
#### [DataUsage](policy-csp-datausage.md)
|
||||
#### [Defender](policy-csp-defender.md)
|
||||
#### [DeliveryOptimization](policy-csp-deliveryoptimization.md)
|
||||
#### [Desktop](policy-csp-desktop.md)
|
||||
#### [DeviceGuard](policy-csp-deviceguard.md)
|
||||
#### [DeviceHealthMonitoring](policy-csp-devicehealthmonitoring.md)
|
||||
#### [DeviceInstallation](policy-csp-deviceinstallation.md)
|
||||
#### [DeviceLock](policy-csp-devicelock.md)
|
||||
#### [Display](policy-csp-display.md)
|
||||
#### [DmaGuard](policy-csp-dmaguard.md)
|
||||
#### [Education](policy-csp-education.md)
|
||||
#### [EnterpriseCloudPrint](policy-csp-enterprisecloudprint.md)
|
||||
#### [ErrorReporting](policy-csp-errorreporting.md)
|
||||
#### [EventLogService](policy-csp-eventlogservice.md)
|
||||
#### [Experience](policy-csp-experience.md)
|
||||
#### [ExploitGuard](policy-csp-exploitguard.md)
|
||||
#### [FileExplorer](policy-csp-fileexplorer.md)
|
||||
#### [Games](policy-csp-games.md)
|
||||
#### [Handwriting](policy-csp-handwriting.md)
|
||||
#### [InternetExplorer](policy-csp-internetexplorer.md)
|
||||
#### [Kerberos](policy-csp-kerberos.md)
|
||||
#### [KioskBrowser](policy-csp-kioskbrowser.md)
|
||||
#### [LanmanWorkstation](policy-csp-lanmanworkstation.md)
|
||||
#### [Licensing](policy-csp-licensing.md)
|
||||
#### [LocalPoliciesSecurityOptions](policy-csp-localpoliciessecurityoptions.md)
|
||||
#### [LocalUsersAndGroups](policy-csp-localusersandgroups.md)
|
||||
#### [LockDown](policy-csp-lockdown.md)
|
||||
#### [Maps](policy-csp-maps.md)
|
||||
#### [Messaging](policy-csp-messaging.md)
|
||||
#### [MixedReality](policy-csp-mixedreality.md)
|
||||
#### [MSSecurityGuide](policy-csp-mssecurityguide.md)
|
||||
#### [MSSLegacy](policy-csp-msslegacy.md)
|
||||
#### [Multitasking](policy-csp-multitasking.md)
|
||||
#### [NetworkIsolation](policy-csp-networkisolation.md)
|
||||
#### [Notifications](policy-csp-notifications.md)
|
||||
#### [Power](policy-csp-power.md)
|
||||
#### [Printers](policy-csp-printers.md)
|
||||
#### [Privacy](policy-csp-privacy.md)
|
||||
#### [RemoteAssistance](policy-csp-remoteassistance.md)
|
||||
#### [RemoteDesktopServices](policy-csp-remotedesktopservices.md)
|
||||
#### [RemoteManagement](policy-csp-remotemanagement.md)
|
||||
#### [RemoteProcedureCall](policy-csp-remoteprocedurecall.md)
|
||||
#### [RemoteShell](policy-csp-remoteshell.md)
|
||||
#### [RestrictedGroups](policy-csp-restrictedgroups.md)
|
||||
#### [Search](policy-csp-search.md)
|
||||
#### [Security](policy-csp-security.md)
|
||||
#### [ServiceControlManager](policy-csp-servicecontrolmanager.md)
|
||||
#### [Settings](policy-csp-settings.md)
|
||||
#### [Speech](policy-csp-speech.md)
|
||||
#### [Start](policy-csp-start.md)
|
||||
#### [Storage](policy-csp-storage.md)
|
||||
#### [System](policy-csp-system.md)
|
||||
#### [SystemServices](policy-csp-systemservices.md)
|
||||
#### [TaskManager](policy-csp-taskmanager.md)
|
||||
#### [TaskScheduler](policy-csp-taskscheduler.md)
|
||||
#### [TextInput](policy-csp-textinput.md)
|
||||
#### [TimeLanguageSettings](policy-csp-timelanguagesettings.md)
|
||||
#### [Troubleshooting](policy-csp-troubleshooting.md)
|
||||
#### [Update](policy-csp-update.md)
|
||||
#### [UserRights](policy-csp-userrights.md)
|
||||
#### [Wifi](policy-csp-wifi.md)
|
||||
#### [WindowsConnectionManager](policy-csp-windowsconnectionmanager.md)
|
||||
#### [WindowsDefenderSecurityCenter](policy-csp-windowsdefendersecuritycenter.md)
|
||||
#### [WindowsDefenderSmartScreen](policy-csp-smartscreen.md)
|
||||
#### [WindowsInkWorkspace](policy-csp-windowsinkworkspace.md)
|
||||
#### [WindowsLogon](policy-csp-windowslogon.md)
|
||||
#### [WindowsPowerShell](policy-csp-windowspowershell.md)
|
||||
#### [WindowsSandbox](policy-csp-windowssandbox.md)
|
||||
#### [WirelessDisplay](policy-csp-wirelessdisplay.md)
|
||||
### [PolicyManager CSP](policymanager-csp.md)
|
||||
### [Provisioning CSP](provisioning-csp.md)
|
||||
### [PROXY CSP](proxy-csp.md)
|
||||
### [PXLOGICAL CSP](pxlogical-csp.md)
|
||||
### [Reboot CSP](reboot-csp.md)
|
||||
#### [Reboot DDF file](reboot-ddf-file.md)
|
||||
### [Registry CSP](registry-csp.md)
|
||||
#### [Registry DDF file](registry-ddf-file.md)
|
||||
### [RemoteFind CSP](remotefind-csp.md)
|
||||
#### [RemoteFind DDF file](remotefind-ddf-file.md)
|
||||
### [RemoteLock CSP](remotelock-csp.md)
|
||||
#### [RemoteLock DDF file](remotelock-ddf-file.md)
|
||||
### [RemoteRing CSP](remotering-csp.md)
|
||||
#### [RemoteRing DDF file](remotering-ddf-file.md)
|
||||
### [RemoteWipe CSP](remotewipe-csp.md)
|
||||
#### [RemoteWipe DDF file](remotewipe-ddf-file.md)
|
||||
### [Reporting CSP](reporting-csp.md)
|
||||
#### [Reporting DDF file](reporting-ddf-file.md)
|
||||
### [RootCATrustedCertificates CSP](rootcacertificates-csp.md)
|
||||
#### [RootCATrustedCertificates DDF file](rootcacertificates-ddf-file.md)
|
||||
### [SecureAssessment CSP](secureassessment-csp.md)
|
||||
#### [SecureAssessment DDF file](secureassessment-ddf-file.md)
|
||||
### [SecurityPolicy CSP](securitypolicy-csp.md)
|
||||
### [SharedPC CSP](sharedpc-csp.md)
|
||||
#### [SharedPC DDF file](sharedpc-ddf-file.md)
|
||||
### [Storage CSP](storage-csp.md)
|
||||
#### [Storage DDF file](storage-ddf-file.md)
|
||||
### [SUPL CSP](supl-csp.md)
|
||||
#### [SUPL DDF file](supl-ddf-file.md)
|
||||
### [SurfaceHub CSP](surfacehub-csp.md)
|
||||
#### [SurfaceHub DDF file](surfacehub-ddf-file.md)
|
||||
### [TenantLockdown CSP](tenantlockdown-csp.md)
|
||||
#### [TenantLockdown DDF file](tenantlockdown-ddf.md)
|
||||
### [TPMPolicy CSP](tpmpolicy-csp.md)
|
||||
#### [TPMPolicy DDF file](tpmpolicy-ddf-file.md)
|
||||
### [UEFI CSP](uefi-csp.md)
|
||||
#### [UEFI DDF file](uefi-ddf.md)
|
||||
### [UnifiedWriteFilter CSP](unifiedwritefilter-csp.md)
|
||||
#### [UnifiedWriteFilter DDF file](unifiedwritefilter-ddf.md)
|
||||
### [Update CSP](update-csp.md)
|
||||
#### [Update DDF file](update-ddf-file.md)
|
||||
### [VPN CSP](vpn-csp.md)
|
||||
#### [VPN DDF file](vpn-ddf-file.md)
|
||||
### [VPNv2 CSP](vpnv2-csp.md)
|
||||
#### [VPNv2 DDF file](vpnv2-ddf-file.md)
|
||||
#### [ProfileXML XSD](vpnv2-profile-xsd.md)
|
||||
#### [EAP configuration](eap-configuration.md)
|
||||
### [w4 APPLICATION CSP](w4-application-csp.md)
|
||||
### [w7 APPLICATION CSP](w7-application-csp.md)
|
||||
### [WiFi CSP](wifi-csp.md)
|
||||
#### [WiFi DDF file](wifi-ddf-file.md)
|
||||
### [Win32AppInventory CSP](win32appinventory-csp.md)
|
||||
#### [Win32AppInventory DDF file](win32appinventory-ddf-file.md)
|
||||
### [Win32CompatibilityAppraiser CSP](win32compatibilityappraiser-csp.md)
|
||||
#### [Win32CompatibilityAppraiser DDF file](win32compatibilityappraiser-ddf.md)
|
||||
### [WindowsAdvancedThreatProtection CSP](windowsadvancedthreatprotection-csp.md)
|
||||
#### [WindowsAdvancedThreatProtection DDF file](windowsadvancedthreatprotection-ddf.md)
|
||||
### [WindowsDefenderApplicationGuard CSP](windowsdefenderapplicationguard-csp.md)
|
||||
#### [WindowsDefenderApplicationGuard DDF file](windowsdefenderapplicationguard-ddf-file.md)
|
||||
### [WindowsLicensing CSP](windowslicensing-csp.md)
|
||||
#### [WindowsLicensing DDF file](windowslicensing-ddf-file.md)
|
||||
### [WindowsSecurityAuditing CSP](windowssecurityauditing-csp.md)
|
||||
#### [WindowsSecurityAuditing DDF file](windowssecurityauditing-ddf-file.md)
|
||||
### [WiredNetwork CSP](wirednetwork-csp.md)
|
||||
#### [WiredNetwork DDF file](wirednetwork-ddf-file.md)
|
954
windows/client-management/mdm/TOC.yml
Normal file
954
windows/client-management/mdm/TOC.yml
Normal file
@ -0,0 +1,954 @@
|
||||
- name: Mobile device management
|
||||
href: index.md
|
||||
items:
|
||||
- name: What's new in MDM enrollment and management
|
||||
href: new-in-windows-mdm-enrollment-management.md
|
||||
items:
|
||||
- name: Change history for MDM documentation
|
||||
href: change-history-for-mdm-documentation.md
|
||||
- name: Mobile device enrollment
|
||||
href: mobile-device-enrollment.md
|
||||
items:
|
||||
- name: MDM enrollment of Windows devices
|
||||
href: mdm-enrollment-of-windows-devices.md
|
||||
items:
|
||||
- name: "Azure AD and Microsoft Intune: Automatic MDM enrollment in the new Portal"
|
||||
href: azure-ad-and-microsoft-intune-automatic-mdm-enrollment-in-the-new-portal.md
|
||||
- name: Enroll a Windows 10 device automatically using Group Policy
|
||||
href: enroll-a-windows-10-device-automatically-using-group-policy.md
|
||||
- name: Federated authentication device enrollment
|
||||
href: federated-authentication-device-enrollment.md
|
||||
- name: Certificate authentication device enrollment
|
||||
href: certificate-authentication-device-enrollment.md
|
||||
- name: On-premises authentication device enrollment
|
||||
href: on-premise-authentication-device-enrollment.md
|
||||
- name: Understanding ADMX-backed policies
|
||||
href: understanding-admx-backed-policies.md
|
||||
- name: Enable ADMX-backed policies in MDM
|
||||
href: enable-admx-backed-policies-in-mdm.md
|
||||
- name: Win32 and Desktop Bridge app policy configuration
|
||||
href: win32-and-centennial-app-policy-configuration.md
|
||||
- name: Implement server-side support for mobile application management on Windows
|
||||
href: implement-server-side-mobile-application-management.md
|
||||
- name: Diagnose MDM failures in Windows 10
|
||||
href: diagnose-mdm-failures-in-windows-10.md
|
||||
- name: Deploy and configure App-V apps using MDM
|
||||
href: appv-deploy-and-config.md
|
||||
- name: Azure Active Directory integration with MDM
|
||||
href: azure-active-directory-integration-with-mdm.md
|
||||
items:
|
||||
- name: Add an Azure AD tenant and Azure AD subscription
|
||||
href: add-an-azure-ad-tenant-and-azure-ad-subscription.md
|
||||
- name: Register your free Azure Active Directory subscription
|
||||
href: register-your-free-azure-active-directory-subscription.md
|
||||
- name: Enterprise app management
|
||||
href: enterprise-app-management.md
|
||||
- name: Mobile device management (MDM) for device updates
|
||||
href: device-update-management.md
|
||||
- name: Bulk enrollment
|
||||
href: bulk-enrollment-using-windows-provisioning-tool.md
|
||||
- name: Management tool for the Microsoft Store for Business
|
||||
href: management-tool-for-windows-store-for-business.md
|
||||
items:
|
||||
- name: REST API reference for Microsoft Store for Business
|
||||
href: rest-api-reference-windows-store-for-business.md
|
||||
items:
|
||||
- name: Data structures for Microsoft Store for Business
|
||||
href: data-structures-windows-store-for-business.md
|
||||
- name: Get Inventory
|
||||
href: get-inventory.md
|
||||
- name: Get product details
|
||||
href: get-product-details.md
|
||||
- name: Get localized product details
|
||||
href: get-localized-product-details.md
|
||||
- name: Get offline license
|
||||
href: get-offline-license.md
|
||||
- name: Get product packages
|
||||
href: get-product-packages.md
|
||||
- name: Get product package
|
||||
href: get-product-package.md
|
||||
- name: Get seats
|
||||
href: get-seats.md
|
||||
- name: Get seat
|
||||
href: get-seat.md
|
||||
- name: Assign seats
|
||||
href: assign-seats.md
|
||||
- name: Reclaim seat from user
|
||||
href: reclaim-seat-from-user.md
|
||||
- name: Bulk assign and reclaim seats from users
|
||||
href: bulk-assign-and-reclaim-seats-from-user.md
|
||||
- name: Get seats assigned to a user
|
||||
href: get-seats-assigned-to-a-user.md
|
||||
- name: Enable offline upgrades to Windows 10 for Windows Embedded 8.1 Handheld devices
|
||||
href: enable-offline-updates-for-windows-embedded-8-1-handheld-devices-to-windows-10.md
|
||||
- name: Certificate renewal
|
||||
href: certificate-renewal-windows-mdm.md
|
||||
- name: Disconnecting from the management infrastructure (unenrollment)
|
||||
href: disconnecting-from-mdm-unenrollment.md
|
||||
- name: Enterprise settings, policies, and app management
|
||||
href: windows-mdm-enterprise-settings.md
|
||||
- name: Push notification support for device management
|
||||
href: push-notification-windows-mdm.md
|
||||
- name: OMA DM protocol support
|
||||
href: oma-dm-protocol-support.md
|
||||
- name: Structure of OMA DM provisioning files
|
||||
href: structure-of-oma-dm-provisioning-files.md
|
||||
- name: Server requirements for OMA DM
|
||||
href: server-requirements-windows-mdm.md
|
||||
- name: DMProcessConfigXMLFiltered
|
||||
href: dmprocessconfigxmlfiltered.md
|
||||
- name: Using PowerShell scripting with the WMI Bridge Provider
|
||||
href: using-powershell-scripting-with-the-wmi-bridge-provider.md
|
||||
- name: WMI providers supported in Windows 10
|
||||
href: wmi-providers-supported-in-windows.md
|
||||
- name: Configuration service provider reference
|
||||
href: configuration-service-provider-reference.md
|
||||
items:
|
||||
- name: AccountManagement CSP
|
||||
href: accountmanagement-csp.md
|
||||
items:
|
||||
- name: AccountManagement DDF file
|
||||
href: accountmanagement-ddf.md
|
||||
- name: Accounts CSP
|
||||
href: accounts-csp.md
|
||||
items:
|
||||
- name: Accounts DDF file
|
||||
href: accounts-ddf-file.md
|
||||
- name: ActiveSync CSP
|
||||
href: activesync-csp.md
|
||||
items:
|
||||
- name: ActiveSync DDF file
|
||||
href: activesync-ddf-file.md
|
||||
- name: AllJoynManagement CSP
|
||||
href: alljoynmanagement-csp.md
|
||||
items:
|
||||
- name: AllJoynManagement DDF
|
||||
href: alljoynmanagement-ddf.md
|
||||
- name: APPLICATION CSP
|
||||
href: application-csp.md
|
||||
- name: ApplicationControl CSP
|
||||
href: applicationcontrol-csp.md
|
||||
items:
|
||||
- name: ApplicationControl DDF file
|
||||
href: applicationcontrol-csp-ddf.md
|
||||
- name: AppLocker CSP
|
||||
href: applocker-csp.md
|
||||
items:
|
||||
- name: AppLocker DDF file
|
||||
href: applocker-ddf-file.md
|
||||
- name: AppLocker XSD
|
||||
href: applocker-xsd.md
|
||||
- name: AssignedAccess CSP
|
||||
href: assignedaccess-csp.md
|
||||
items:
|
||||
- name: AssignedAccess DDF file
|
||||
href: assignedaccess-ddf.md
|
||||
- name: BitLocker CSP
|
||||
href: bitlocker-csp.md
|
||||
items:
|
||||
- name: BitLocker DDF file
|
||||
href: bitlocker-ddf-file.md
|
||||
- name: BOOTSTRAP CSP
|
||||
href: bootstrap-csp.md
|
||||
- name: BrowserFavorite CSP
|
||||
href: browserfavorite-csp.md
|
||||
- name: CellularSettings CSP
|
||||
href: cellularsettings-csp.md
|
||||
- name: CertificateStore CSP
|
||||
href: certificatestore-csp.md
|
||||
items:
|
||||
- name: CertificateStore DDF file
|
||||
href: certificatestore-ddf-file.md
|
||||
- name: CleanPC CSP
|
||||
href: cleanpc-csp.md
|
||||
items:
|
||||
- name: CleanPC DDF
|
||||
href: cleanpc-ddf.md
|
||||
- name: ClientCertificateInstall CSP
|
||||
href: clientcertificateinstall-csp.md
|
||||
items:
|
||||
- name: ClientCertificateInstall DDF file
|
||||
href: clientcertificateinstall-ddf-file.md
|
||||
- name: CM_CellularEntries CSP
|
||||
href: cm-cellularentries-csp.md
|
||||
- name: CM_ProxyEntries CSP
|
||||
href: cm-proxyentries-csp.md
|
||||
- name: CMPolicy CSP
|
||||
href: cmpolicy-csp.md
|
||||
- name: CMPolicyEnterprise CSP
|
||||
href: cmpolicyenterprise-csp.md
|
||||
items:
|
||||
- name: CMPolicyEnterprise DDF file
|
||||
href: cmpolicyenterprise-ddf-file.md
|
||||
- name: CustomDeviceUI CSP
|
||||
href: customdeviceui-csp.md
|
||||
items:
|
||||
- name: CustomDeviceUI DDF file
|
||||
href: customdeviceui-ddf.md
|
||||
- name: Defender CSP
|
||||
href: defender-csp.md
|
||||
items:
|
||||
- name: Defender DDF file
|
||||
href: defender-ddf.md
|
||||
- name: DevDetail CSP
|
||||
href: devdetail-csp.md
|
||||
items:
|
||||
- name: DevDetail DDF file
|
||||
href: devdetail-ddf-file.md
|
||||
- name: DeveloperSetup CSP
|
||||
href: developersetup-csp.md
|
||||
items:
|
||||
- name: DeveloperSetup DDF
|
||||
href: developersetup-ddf.md
|
||||
- name: DeviceInstanceService CSP
|
||||
href: deviceinstanceservice-csp.md
|
||||
- name: DeviceLock CSP
|
||||
href: devicelock-csp.md
|
||||
items:
|
||||
- name: DeviceLock DDF file
|
||||
href: devicelock-ddf-file.md
|
||||
- name: DeviceManageability CSP
|
||||
href: devicemanageability-csp.md
|
||||
items:
|
||||
- name: DeviceManageability DDF
|
||||
href: devicemanageability-ddf.md
|
||||
- name: DeviceStatus CSP
|
||||
href: devicestatus-csp.md
|
||||
items:
|
||||
- name: DeviceStatus DDF
|
||||
href: devicestatus-ddf.md
|
||||
- name: DevInfo CSP
|
||||
href: devinfo-csp.md
|
||||
items:
|
||||
- name: DevInfo DDF file
|
||||
href: devinfo-ddf-file.md
|
||||
- name: DiagnosticLog CSP
|
||||
href: diagnosticlog-csp.md
|
||||
items:
|
||||
- name: DiagnosticLog DDF file
|
||||
href: diagnosticlog-ddf.md
|
||||
- name: DMAcc CSP
|
||||
href: dmacc-csp.md
|
||||
items:
|
||||
- name: DMAcc DDF file
|
||||
href: dmacc-ddf-file.md
|
||||
- name: DMClient CSP
|
||||
href: dmclient-csp.md
|
||||
items:
|
||||
- name: DMClient DDF file
|
||||
href: dmclient-ddf-file.md
|
||||
- name: DMSessionActions CSP
|
||||
href: dmsessionactions-csp.md
|
||||
items:
|
||||
- name: DMSessionActions DDF file
|
||||
href: dmsessionactions-ddf.md
|
||||
- name: DynamicManagement CSP
|
||||
href: dynamicmanagement-csp.md
|
||||
items:
|
||||
- name: DynamicManagement DDF file
|
||||
href: dynamicmanagement-ddf.md
|
||||
- name: EMAIL2 CSP
|
||||
href: email2-csp.md
|
||||
items:
|
||||
- name: EMAIL2 DDF file
|
||||
href: email2-ddf-file.md
|
||||
- name: EnrollmentStatusTracking CSP
|
||||
href: enrollmentstatustracking-csp.md
|
||||
items:
|
||||
- name: EnrollmentStatusTracking DDF file
|
||||
href: enrollmentstatustracking-csp-ddf.md
|
||||
- name: EnterpriseAPN CSP
|
||||
href: enterpriseapn-csp.md
|
||||
items:
|
||||
- name: EnterpriseAPN DDF
|
||||
href: enterpriseapn-ddf.md
|
||||
- name: EnterpriseAppManagement CSP
|
||||
href: enterpriseappmanagement-csp.md
|
||||
- name: EnterpriseAppVManagement CSP
|
||||
href: enterpriseappvmanagement-csp.md
|
||||
items:
|
||||
- name: EnterpriseAppVManagement DDF file
|
||||
href: enterpriseappvmanagement-ddf.md
|
||||
- name: EnterpriseAssignedAccess CSP
|
||||
href: enterpriseassignedaccess-csp.md
|
||||
items:
|
||||
- name: EnterpriseAssignedAccess DDF file
|
||||
href: enterpriseassignedaccess-ddf.md
|
||||
- name: EnterpriseAssignedAccess XSD
|
||||
href: enterpriseassignedaccess-xsd.md
|
||||
- name: EnterpriseDataProtection CSP
|
||||
href: enterprisedataprotection-csp.md
|
||||
items:
|
||||
- name: EnterpriseDataProtection DDF file
|
||||
href: enterprisedataprotection-ddf-file.md
|
||||
- name: EnterpriseDesktopAppManagement CSP
|
||||
href: enterprisedesktopappmanagement-csp.md
|
||||
items:
|
||||
- name: EnterpriseDesktopAppManagement DDF
|
||||
href: enterprisedesktopappmanagement-ddf-file.md
|
||||
- name: EnterpriseDesktopAppManagement XSD
|
||||
href: enterprisedesktopappmanagement2-xsd.md
|
||||
- name: EnterpriseExt CSP
|
||||
href: enterpriseext-csp.md
|
||||
items:
|
||||
- name: EnterpriseExt DDF file
|
||||
href: enterpriseext-ddf.md
|
||||
- name: EnterpriseExtFileSystem CSP
|
||||
href: enterpriseextfilessystem-csp.md
|
||||
items:
|
||||
- name: EnterpriseExtFileSystem DDF file
|
||||
href: enterpriseextfilesystem-ddf.md
|
||||
- name: EnterpriseModernAppManagement CSP
|
||||
href: enterprisemodernappmanagement-csp.md
|
||||
items:
|
||||
- name: EnterpriseModernAppManagement DDF
|
||||
href: enterprisemodernappmanagement-ddf.md
|
||||
- name: EnterpriseModernAppManagement XSD
|
||||
href: enterprisemodernappmanagement-xsd.md
|
||||
- name: eUICCs CSP
|
||||
href: euiccs-csp.md
|
||||
items:
|
||||
- name: eUICCs DDF file
|
||||
href: euiccs-ddf-file.md
|
||||
- name: FileSystem CSP
|
||||
href: filesystem-csp.md
|
||||
- name: Firewall CSP
|
||||
href: firewall-csp.md
|
||||
items:
|
||||
- name: Firewall DDF file
|
||||
href: firewall-ddf-file.md
|
||||
- name: HealthAttestation CSP
|
||||
href: healthattestation-csp.md
|
||||
items:
|
||||
- name: HealthAttestation DDF
|
||||
href: healthattestation-ddf.md
|
||||
- name: HotSpot CSP
|
||||
href: hotspot-csp.md
|
||||
- name: Maps CSP
|
||||
href: maps-csp.md
|
||||
items:
|
||||
- name: Maps DDF
|
||||
href: maps-ddf-file.md
|
||||
- name: Messaging CSP
|
||||
href: messaging-csp.md
|
||||
items:
|
||||
- name: Messaging DDF file
|
||||
href: messaging-ddf.md
|
||||
- name: MultiSIM CSP
|
||||
href: multisim-csp.md
|
||||
items:
|
||||
- name: MultiSIM DDF file
|
||||
href: multisim-ddf.md
|
||||
- name: NAP CSP
|
||||
href: nap-csp.md
|
||||
- name: NAPDEF CSP
|
||||
href: napdef-csp.md
|
||||
- name: NetworkProxy CSP
|
||||
href: networkproxy-csp.md
|
||||
items:
|
||||
- name: NetworkProxy DDF file
|
||||
href: networkproxy-ddf.md
|
||||
- name: NetworkQoSPolicy CSP
|
||||
href: networkqospolicy-csp.md
|
||||
items:
|
||||
- name: NetworkQoSPolicy DDF file
|
||||
href: networkqospolicy-ddf.md
|
||||
- name: NodeCache CSP
|
||||
href: nodecache-csp.md
|
||||
items:
|
||||
- name: NodeCache DDF file
|
||||
href: nodecache-ddf-file.md
|
||||
- name: Office CSP
|
||||
href: office-csp.md
|
||||
items:
|
||||
- name: Office DDF
|
||||
href: office-ddf.md
|
||||
- name: PassportForWork CSP
|
||||
href: passportforwork-csp.md
|
||||
items:
|
||||
- name: PassportForWork DDF file
|
||||
href: passportforwork-ddf.md
|
||||
- name: Personalization CSP
|
||||
href: personalization-csp.md
|
||||
items:
|
||||
- name: Personalization DDF file
|
||||
href: personalization-ddf.md
|
||||
- name: Policy CSP
|
||||
href: policy-configuration-service-provider.md
|
||||
items:
|
||||
- name: Policy CSP DDF file
|
||||
href: policy-ddf-file.md
|
||||
- name: Policies in Policy CSP supported by Group Policy
|
||||
href: policies-in-policy-csp-supported-by-group-policy.md
|
||||
- name: ADMX-backed policies in Policy CSP
|
||||
href: policies-in-policy-csp-admx-backed.md
|
||||
- name: Policies in Policy CSP supported by HoloLens 2
|
||||
href: policies-in-policy-csp-supported-by-hololens2.md
|
||||
- name: Policies in Policy CSP supported by HoloLens (1st gen) Commercial Suite
|
||||
href: policies-in-policy-csp-supported-by-hololens-1st-gen-commercial-suite.md
|
||||
- name: Policies in Policy CSP supported by HoloLens (1st gen) Development Edition
|
||||
href: policies-in-policy-csp-supported-by-hololens-1st-gen-development-edition.md
|
||||
- name: Policies in Policy CSP supported by Windows 10 IoT Enterprise
|
||||
href: ./configuration-service-provider-reference.md
|
||||
- name: Policies in Policy CSP supported by Windows 10 IoT Core
|
||||
href: policies-in-policy-csp-supported-by-iot-core.md
|
||||
- name: Policies in Policy CSP supported by Microsoft Surface Hub
|
||||
href: policies-in-policy-csp-supported-by-surface-hub.md
|
||||
- name: Policy CSPs that can be set using Exchange Active Sync (EAS)
|
||||
href: policies-in-policy-csp-that-can-be-set-using-eas.md
|
||||
- name: AboveLock
|
||||
href: policy-csp-abovelock.md
|
||||
- name: Accounts
|
||||
href: policy-csp-accounts.md
|
||||
- name: ActiveXControls
|
||||
href: policy-csp-activexcontrols.md
|
||||
- name: ADMX_ActiveXInstallService
|
||||
href: policy-csp-admx-activexinstallservice.md
|
||||
- name: ADMX_AddRemovePrograms
|
||||
href: policy-csp-admx-addremoveprograms.md
|
||||
- name: ADMX_AppCompat
|
||||
href: policy-csp-admx-appcompat.md
|
||||
- name: ADMX_AppxPackageManager
|
||||
href: policy-csp-admx-appxpackagemanager.md
|
||||
- name: ADMX_AppXRuntime
|
||||
href: policy-csp-admx-appxruntime.md
|
||||
- name: ADMX_AttachmentManager
|
||||
href: policy-csp-admx-attachmentmanager.md
|
||||
- name: ADMX_AuditSettings
|
||||
href: policy-csp-admx-auditsettings.md
|
||||
- name: ADMX_Bits
|
||||
href: policy-csp-admx-bits.md
|
||||
- name: ADMX_CipherSuiteOrder
|
||||
href: policy-csp-admx-ciphersuiteorder.md
|
||||
- name: ADMX_COM
|
||||
href: policy-csp-admx-com.md
|
||||
- name: ADMX_ControlPanel
|
||||
href: policy-csp-admx-controlpanel.md
|
||||
- name: ADMX_ControlPanelDisplay
|
||||
href: policy-csp-admx-controlpaneldisplay.md
|
||||
- name: ADMX_Cpls
|
||||
href: policy-csp-admx-cpls.md
|
||||
- name: ADMX_CredentialProviders
|
||||
href: policy-csp-admx-credentialproviders.md
|
||||
- name: ADMX_CredSsp
|
||||
href: policy-csp-admx-credssp.md
|
||||
- name: ADMX_CredUI
|
||||
href: policy-csp-admx-credui.md
|
||||
- name: ADMX_CtrlAltDel
|
||||
href: policy-csp-admx-ctrlaltdel.md
|
||||
- name: ADMX_DataCollection
|
||||
href: policy-csp-admx-datacollection.md
|
||||
- name: ADMX_Desktop
|
||||
href: policy-csp-admx-desktop.md
|
||||
- name: ADMX_DeviceInstallation
|
||||
href: policy-csp-admx-deviceinstallation.md
|
||||
- name: ADMX_DeviceSetup
|
||||
href: policy-csp-admx-devicesetup.md
|
||||
- name: ADMX_DigitalLocker
|
||||
href: policy-csp-admx-digitallocker.md
|
||||
- name: ADMX_DistributedLinkTracking
|
||||
href: policy-csp-admx-distributedlinktracking.md
|
||||
- name: ADMX_DnsClient
|
||||
href: policy-csp-admx-dnsclient.md
|
||||
- name: ADMX_DWM
|
||||
href: policy-csp-admx-dwm.md
|
||||
- name: ADMX_EAIME
|
||||
href: policy-csp-admx-eaime.md
|
||||
- name: ADMX_EncryptFilesonMove
|
||||
href: policy-csp-admx-encryptfilesonmove.md
|
||||
- name: ADMX_EnhancedStorage
|
||||
href: policy-csp-admx-enhancedstorage.md
|
||||
- name: ADMX_ErrorReporting
|
||||
href: policy-csp-admx-errorreporting.md
|
||||
- name: ADMX_EventForwarding
|
||||
href: policy-csp-admx-eventforwarding.md
|
||||
- name: ADMX_EventLog
|
||||
href: policy-csp-admx-eventlog.md
|
||||
- name: ADMX_Explorer
|
||||
href: policy-csp-admx-explorer.md
|
||||
- name: ADMX_FileRecovery
|
||||
href: policy-csp-admx-filerecovery.md
|
||||
- name: ADMX_FileServerVSSProvider
|
||||
href: policy-csp-admx-fileservervssprovider.md
|
||||
- name: ADMX_FileSys
|
||||
href: policy-csp-admx-filesys.md
|
||||
- name: ADMX_FolderRedirection
|
||||
href: policy-csp-admx-folderredirection.md
|
||||
- name: ADMX_Globalization
|
||||
href: policy-csp-admx-globalization.md
|
||||
- name: ADMX_GroupPolicy
|
||||
href: policy-csp-admx-grouppolicy.md
|
||||
- name: ADMX_Help
|
||||
href: policy-csp-admx-help.md
|
||||
- name: ADMX_HelpAndSupport
|
||||
href: policy-csp-admx-helpandsupport.md
|
||||
- name: ADMX_ICM
|
||||
href: policy-csp-admx-icm.md
|
||||
- name: ADMX_kdc
|
||||
href: policy-csp-admx-kdc.md
|
||||
- name: ADMX_Kerberos
|
||||
href: policy-csp-admx-kerberos.md
|
||||
- name: ADMX_LanmanServer
|
||||
href: policy-csp-admx-lanmanserver.md
|
||||
- name: ADMX_LanmanWorkstation
|
||||
href: policy-csp-admx-lanmanworkstation.md
|
||||
- name: ADMX_LinkLayerTopologyDiscovery
|
||||
href: policy-csp-admx-linklayertopologydiscovery.md
|
||||
- name: ADMX_Logon
|
||||
href: policy-csp-admx-logon.md
|
||||
- name: ADMX_MicrosoftDefenderAntivirus
|
||||
href: policy-csp-admx-microsoftdefenderantivirus.md
|
||||
- name: ADMX_MMC
|
||||
href: policy-csp-admx-mmc.md
|
||||
- name: ADMX_MMCSnapins
|
||||
href: policy-csp-admx-mmcsnapins.md
|
||||
- name: ADMX_MSAPolicy
|
||||
href: policy-csp-admx-msapolicy.md
|
||||
- name: ADMX_msched
|
||||
href: policy-csp-admx-msched.md
|
||||
- name: ADMX_MSDT
|
||||
href: policy-csp-admx-msdt.md
|
||||
- name: ADMX_MSI
|
||||
href: policy-csp-admx-msi.md
|
||||
- name: ADMX_nca
|
||||
href: policy-csp-admx-nca.md
|
||||
- name: ADMX_NCSI
|
||||
href: policy-csp-admx-ncsi.md
|
||||
- name: ADMX_Netlogon
|
||||
href: policy-csp-admx-netlogon.md
|
||||
- name: ADMX_NetworkConnections
|
||||
href: policy-csp-admx-networkconnections.md
|
||||
- name: ADMX_OfflineFiles
|
||||
href: policy-csp-admx-offlinefiles.md
|
||||
- name: ADMX_PeerToPeerCaching
|
||||
href: policy-csp-admx-peertopeercaching.md
|
||||
- name: ADMX_PerformanceDiagnostics
|
||||
href: policy-csp-admx-performancediagnostics.md
|
||||
- name: ADMX_Power
|
||||
href: policy-csp-admx-power.md
|
||||
- name: ADMX_PowerShellExecutionPolicy
|
||||
href: policy-csp-admx-powershellexecutionpolicy.md
|
||||
- name: ADMX_Printing
|
||||
href: policy-csp-admx-printing.md
|
||||
- name: ADMX_Printing2
|
||||
href: policy-csp-admx-printing2.md
|
||||
- name: ADMX_Programs
|
||||
href: policy-csp-admx-programs.md
|
||||
- name: ADMX_Reliability
|
||||
href: policy-csp-admx-reliability.md
|
||||
- name: ADMX_RemoteAssistance
|
||||
href: policy-csp-admx-remoteassistance.md
|
||||
- name: ADMX_RemovableStorage
|
||||
href: policy-csp-admx-removablestorage.md
|
||||
- name: ADMX_RPC
|
||||
href: policy-csp-admx-rpc.md
|
||||
- name: ADMX_Scripts
|
||||
href: policy-csp-admx-scripts.md
|
||||
- name: ADMX_sdiageng
|
||||
href: policy-csp-admx-sdiageng.md
|
||||
- name: ADMX_Securitycenter
|
||||
href: policy-csp-admx-securitycenter.md
|
||||
- name: ADMX_Sensors
|
||||
href: policy-csp-admx-sensors.md
|
||||
- name: ADMX_Servicing
|
||||
href: policy-csp-admx-servicing.md
|
||||
- name: ADMX_SettingSync
|
||||
href: policy-csp-admx-settingsync.md
|
||||
- name: ADMX_SharedFolders
|
||||
href: policy-csp-admx-sharedfolders.md
|
||||
- name: ADMX_Sharing
|
||||
href: policy-csp-admx-sharing.md
|
||||
- name: ADMX_ShellCommandPromptRegEditTools
|
||||
href: policy-csp-admx-shellcommandpromptregedittools.md
|
||||
- name: ADMX_SkyDrive
|
||||
href: policy-csp-admx-skydrive.md
|
||||
- name: ADMX_Smartcard
|
||||
href: policy-csp-admx-smartcard.md
|
||||
- name: ADMX_Snmp
|
||||
href: policy-csp-admx-snmp.md
|
||||
- name: ADMX_StartMenu
|
||||
href: policy-csp-admx-startmenu.md
|
||||
- name: ADMX_SystemRestore
|
||||
href: policy-csp-admx-systemrestore.md
|
||||
- name: ADMX_Taskbar
|
||||
href: policy-csp-admx-taskbar.md
|
||||
- name: ADMX_tcpip
|
||||
href: policy-csp-admx-tcpip.md
|
||||
- name: ADMX_Thumbnails
|
||||
href: policy-csp-admx-thumbnails.md
|
||||
- name: ADMX_TPM
|
||||
href: policy-csp-admx-tpm.md
|
||||
- name: ADMX_UserExperienceVirtualization
|
||||
href: policy-csp-admx-userexperiencevirtualization.md
|
||||
- name: ADMX_UserProfiles
|
||||
href: policy-csp-admx-userprofiles.md
|
||||
- name: ADMX_W32Time
|
||||
href: policy-csp-admx-w32time.md
|
||||
- name: ADMX_WCM
|
||||
href: policy-csp-admx-wcm.md
|
||||
- name: ADMX_WinCal
|
||||
href: policy-csp-admx-wincal.md
|
||||
- name: ADMX_WindowsAnytimeUpgrade
|
||||
href: policy-csp-admx-windowsanytimeupgrade.md
|
||||
- name: ADMX_WindowsConnectNow
|
||||
href: policy-csp-admx-windowsconnectnow.md
|
||||
- name: ADMX_WindowsExplorer
|
||||
href: policy-csp-admx-windowsexplorer.md
|
||||
- name: ADMX_WindowsFileProtection
|
||||
href: policy-csp-admx-windowsfileprotection.md
|
||||
- name: ADMX_WindowsMediaDRM
|
||||
href: policy-csp-admx-windowsmediadrm.md
|
||||
- name: ADMX_WindowsMediaPlayer
|
||||
href: policy-csp-admx-windowsmediaplayer.md
|
||||
- name: ADMX_WindowsRemoteManagement
|
||||
href: policy-csp-admx-windowsremotemanagement.md
|
||||
- name: ADMX_WindowsStore
|
||||
href: policy-csp-admx-windowsstore.md
|
||||
- name: ADMX_WinInit
|
||||
href: policy-csp-admx-wininit.md
|
||||
- name: ADMX_WinLogon
|
||||
href: policy-csp-admx-winlogon.md
|
||||
- name: ADMX-Winsrv
|
||||
href: policy-csp-admx-winsrv.md
|
||||
- name: ADMX_wlansvc
|
||||
href: policy-csp-admx-wlansvc.md
|
||||
- name: ADMX_WPN
|
||||
href: policy-csp-admx-wpn.md
|
||||
- name: ApplicationDefaults
|
||||
href: policy-csp-applicationdefaults.md
|
||||
- name: ApplicationManagement
|
||||
href: policy-csp-applicationmanagement.md
|
||||
- name: AppRuntime
|
||||
href: policy-csp-appruntime.md
|
||||
- name: AppVirtualization
|
||||
href: policy-csp-appvirtualization.md
|
||||
- name: AttachmentManager
|
||||
href: policy-csp-attachmentmanager.md
|
||||
- name: Audit
|
||||
href: policy-csp-audit.md
|
||||
- name: Authentication
|
||||
href: policy-csp-authentication.md
|
||||
- name: Autoplay
|
||||
href: policy-csp-autoplay.md
|
||||
- name: BitLocker
|
||||
href: policy-csp-bitlocker.md
|
||||
- name: BITS
|
||||
href: policy-csp-bits.md
|
||||
- name: Bluetooth
|
||||
href: policy-csp-bluetooth.md
|
||||
- name: Browser
|
||||
href: policy-csp-browser.md
|
||||
- name: Camera
|
||||
href: policy-csp-camera.md
|
||||
- name: Cellular
|
||||
href: policy-csp-cellular.md
|
||||
- name: Connectivity
|
||||
href: policy-csp-connectivity.md
|
||||
- name: ControlPolicyConflict
|
||||
href: policy-csp-controlpolicyconflict.md
|
||||
- name: CredentialsDelegation
|
||||
href: policy-csp-credentialsdelegation.md
|
||||
- name: CredentialProviders
|
||||
href: policy-csp-credentialproviders.md
|
||||
- name: CredentialsUI
|
||||
href: policy-csp-credentialsui.md
|
||||
- name: Cryptography
|
||||
href: policy-csp-cryptography.md
|
||||
- name: DataProtection
|
||||
href: policy-csp-dataprotection.md
|
||||
- name: DataUsage
|
||||
href: policy-csp-datausage.md
|
||||
- name: Defender
|
||||
href: policy-csp-defender.md
|
||||
- name: DeliveryOptimization
|
||||
href: policy-csp-deliveryoptimization.md
|
||||
- name: Desktop
|
||||
href: policy-csp-desktop.md
|
||||
- name: DeviceGuard
|
||||
href: policy-csp-deviceguard.md
|
||||
- name: DeviceHealthMonitoring
|
||||
href: policy-csp-devicehealthmonitoring.md
|
||||
- name: DeviceInstallation
|
||||
href: policy-csp-deviceinstallation.md
|
||||
- name: DeviceLock
|
||||
href: policy-csp-devicelock.md
|
||||
- name: Display
|
||||
href: policy-csp-display.md
|
||||
- name: DmaGuard
|
||||
href: policy-csp-dmaguard.md
|
||||
- name: Education
|
||||
href: policy-csp-education.md
|
||||
- name: EnterpriseCloudPrint
|
||||
href: policy-csp-enterprisecloudprint.md
|
||||
- name: ErrorReporting
|
||||
href: policy-csp-errorreporting.md
|
||||
- name: EventLogService
|
||||
href: policy-csp-eventlogservice.md
|
||||
- name: Experience
|
||||
href: policy-csp-experience.md
|
||||
- name: ExploitGuard
|
||||
href: policy-csp-exploitguard.md
|
||||
- name: FileExplorer
|
||||
href: policy-csp-fileexplorer.md
|
||||
- name: Games
|
||||
href: policy-csp-games.md
|
||||
- name: Handwriting
|
||||
href: policy-csp-handwriting.md
|
||||
- name: InternetExplorer
|
||||
href: policy-csp-internetexplorer.md
|
||||
- name: Kerberos
|
||||
href: policy-csp-kerberos.md
|
||||
- name: KioskBrowser
|
||||
href: policy-csp-kioskbrowser.md
|
||||
- name: LanmanWorkstation
|
||||
href: policy-csp-lanmanworkstation.md
|
||||
- name: Licensing
|
||||
href: policy-csp-licensing.md
|
||||
- name: LocalPoliciesSecurityOptions
|
||||
href: policy-csp-localpoliciessecurityoptions.md
|
||||
- name: LocalUsersAndGroups
|
||||
href: policy-csp-localusersandgroups.md
|
||||
- name: LockDown
|
||||
href: policy-csp-lockdown.md
|
||||
- name: Maps
|
||||
href: policy-csp-maps.md
|
||||
- name: Messaging
|
||||
href: policy-csp-messaging.md
|
||||
- name: MixedReality
|
||||
href: policy-csp-mixedreality.md
|
||||
- name: MSSecurityGuide
|
||||
href: policy-csp-mssecurityguide.md
|
||||
- name: MSSLegacy
|
||||
href: policy-csp-msslegacy.md
|
||||
- name: Multitasking
|
||||
href: policy-csp-multitasking.md
|
||||
- name: NetworkIsolation
|
||||
href: policy-csp-networkisolation.md
|
||||
- name: Notifications
|
||||
href: policy-csp-notifications.md
|
||||
- name: Power
|
||||
href: policy-csp-power.md
|
||||
- name: Printers
|
||||
href: policy-csp-printers.md
|
||||
- name: Privacy
|
||||
href: policy-csp-privacy.md
|
||||
- name: RemoteAssistance
|
||||
href: policy-csp-remoteassistance.md
|
||||
- name: RemoteDesktopServices
|
||||
href: policy-csp-remotedesktopservices.md
|
||||
- name: RemoteManagement
|
||||
href: policy-csp-remotemanagement.md
|
||||
- name: RemoteProcedureCall
|
||||
href: policy-csp-remoteprocedurecall.md
|
||||
- name: RemoteShell
|
||||
href: policy-csp-remoteshell.md
|
||||
- name: RestrictedGroups
|
||||
href: policy-csp-restrictedgroups.md
|
||||
- name: Search
|
||||
href: policy-csp-search.md
|
||||
- name: Security
|
||||
href: policy-csp-security.md
|
||||
- name: ServiceControlManager
|
||||
href: policy-csp-servicecontrolmanager.md
|
||||
- name: Settings
|
||||
href: policy-csp-settings.md
|
||||
- name: Speech
|
||||
href: policy-csp-speech.md
|
||||
- name: Start
|
||||
href: policy-csp-start.md
|
||||
- name: Storage
|
||||
href: policy-csp-storage.md
|
||||
- name: System
|
||||
href: policy-csp-system.md
|
||||
- name: SystemServices
|
||||
href: policy-csp-systemservices.md
|
||||
- name: TaskManager
|
||||
href: policy-csp-taskmanager.md
|
||||
- name: TaskScheduler
|
||||
href: policy-csp-taskscheduler.md
|
||||
- name: TextInput
|
||||
href: policy-csp-textinput.md
|
||||
- name: TimeLanguageSettings
|
||||
href: policy-csp-timelanguagesettings.md
|
||||
- name: Troubleshooting
|
||||
href: policy-csp-troubleshooting.md
|
||||
- name: Update
|
||||
href: policy-csp-update.md
|
||||
- name: UserRights
|
||||
href: policy-csp-userrights.md
|
||||
- name: Wifi
|
||||
href: policy-csp-wifi.md
|
||||
- name: WindowsConnectionManager
|
||||
href: policy-csp-windowsconnectionmanager.md
|
||||
- name: WindowsDefenderSecurityCenter
|
||||
href: policy-csp-windowsdefendersecuritycenter.md
|
||||
- name: WindowsDefenderSmartScreen
|
||||
href: policy-csp-smartscreen.md
|
||||
- name: WindowsInkWorkspace
|
||||
href: policy-csp-windowsinkworkspace.md
|
||||
- name: WindowsLogon
|
||||
href: policy-csp-windowslogon.md
|
||||
- name: WindowsPowerShell
|
||||
href: policy-csp-windowspowershell.md
|
||||
- name: WindowsSandbox
|
||||
href: policy-csp-windowssandbox.md
|
||||
- name: WirelessDisplay
|
||||
href: policy-csp-wirelessdisplay.md
|
||||
- name: PolicyManager CSP
|
||||
href: policymanager-csp.md
|
||||
- name: Provisioning CSP
|
||||
href: provisioning-csp.md
|
||||
- name: PROXY CSP
|
||||
href: proxy-csp.md
|
||||
- name: PXLOGICAL CSP
|
||||
href: pxlogical-csp.md
|
||||
- name: Reboot CSP
|
||||
href: reboot-csp.md
|
||||
items:
|
||||
- name: Reboot DDF file
|
||||
href: reboot-ddf-file.md
|
||||
- name: Registry CSP
|
||||
href: registry-csp.md
|
||||
items:
|
||||
- name: Registry DDF file
|
||||
href: registry-ddf-file.md
|
||||
- name: RemoteFind CSP
|
||||
href: remotefind-csp.md
|
||||
items:
|
||||
- name: RemoteFind DDF file
|
||||
href: remotefind-ddf-file.md
|
||||
- name: RemoteLock CSP
|
||||
href: remotelock-csp.md
|
||||
items:
|
||||
- name: RemoteLock DDF file
|
||||
href: remotelock-ddf-file.md
|
||||
- name: RemoteRing CSP
|
||||
href: remotering-csp.md
|
||||
items:
|
||||
- name: RemoteRing DDF file
|
||||
href: remotering-ddf-file.md
|
||||
- name: RemoteWipe CSP
|
||||
href: remotewipe-csp.md
|
||||
items:
|
||||
- name: RemoteWipe DDF file
|
||||
href: remotewipe-ddf-file.md
|
||||
- name: Reporting CSP
|
||||
href: reporting-csp.md
|
||||
items:
|
||||
- name: Reporting DDF file
|
||||
href: reporting-ddf-file.md
|
||||
- name: RootCATrustedCertificates CSP
|
||||
href: rootcacertificates-csp.md
|
||||
items:
|
||||
- name: RootCATrustedCertificates DDF file
|
||||
href: rootcacertificates-ddf-file.md
|
||||
- name: SecureAssessment CSP
|
||||
href: secureassessment-csp.md
|
||||
items:
|
||||
- name: SecureAssessment DDF file
|
||||
href: secureassessment-ddf-file.md
|
||||
- name: SecurityPolicy CSP
|
||||
href: securitypolicy-csp.md
|
||||
- name: SharedPC CSP
|
||||
href: sharedpc-csp.md
|
||||
items:
|
||||
- name: SharedPC DDF file
|
||||
href: sharedpc-ddf-file.md
|
||||
- name: Storage CSP
|
||||
href: storage-csp.md
|
||||
items:
|
||||
- name: Storage DDF file
|
||||
href: storage-ddf-file.md
|
||||
- name: SUPL CSP
|
||||
href: supl-csp.md
|
||||
items:
|
||||
- name: SUPL DDF file
|
||||
href: supl-ddf-file.md
|
||||
- name: SurfaceHub CSP
|
||||
href: surfacehub-csp.md
|
||||
items:
|
||||
- name: SurfaceHub DDF file
|
||||
href: surfacehub-ddf-file.md
|
||||
- name: TenantLockdown CSP
|
||||
href: tenantlockdown-csp.md
|
||||
items:
|
||||
- name: TenantLockdown DDF file
|
||||
href: tenantlockdown-ddf.md
|
||||
- name: TPMPolicy CSP
|
||||
href: tpmpolicy-csp.md
|
||||
items:
|
||||
- name: TPMPolicy DDF file
|
||||
href: tpmpolicy-ddf-file.md
|
||||
- name: UEFI CSP
|
||||
href: uefi-csp.md
|
||||
items:
|
||||
- name: UEFI DDF file
|
||||
href: uefi-ddf.md
|
||||
- name: UnifiedWriteFilter CSP
|
||||
href: unifiedwritefilter-csp.md
|
||||
items:
|
||||
- name: UnifiedWriteFilter DDF file
|
||||
href: unifiedwritefilter-ddf.md
|
||||
- name: Update CSP
|
||||
href: update-csp.md
|
||||
items:
|
||||
- name: Update DDF file
|
||||
href: update-ddf-file.md
|
||||
- name: VPN CSP
|
||||
href: vpn-csp.md
|
||||
items:
|
||||
- name: VPN DDF file
|
||||
href: vpn-ddf-file.md
|
||||
- name: VPNv2 CSP
|
||||
href: vpnv2-csp.md
|
||||
items:
|
||||
- name: VPNv2 DDF file
|
||||
href: vpnv2-ddf-file.md
|
||||
- name: ProfileXML XSD
|
||||
href: vpnv2-profile-xsd.md
|
||||
- name: EAP configuration
|
||||
href: eap-configuration.md
|
||||
- name: w4 APPLICATION CSP
|
||||
href: w4-application-csp.md
|
||||
- name: w7 APPLICATION CSP
|
||||
href: w7-application-csp.md
|
||||
- name: WiFi CSP
|
||||
href: wifi-csp.md
|
||||
items:
|
||||
- name: WiFi DDF file
|
||||
href: wifi-ddf-file.md
|
||||
- name: Win32AppInventory CSP
|
||||
href: win32appinventory-csp.md
|
||||
items:
|
||||
- name: Win32AppInventory DDF file
|
||||
href: win32appinventory-ddf-file.md
|
||||
- name: Win32CompatibilityAppraiser CSP
|
||||
href: win32compatibilityappraiser-csp.md
|
||||
items:
|
||||
- name: Win32CompatibilityAppraiser DDF file
|
||||
href: win32compatibilityappraiser-ddf.md
|
||||
- name: WindowsAdvancedThreatProtection CSP
|
||||
href: windowsadvancedthreatprotection-csp.md
|
||||
items:
|
||||
- name: WindowsAdvancedThreatProtection DDF file
|
||||
href: windowsadvancedthreatprotection-ddf.md
|
||||
- name: WindowsDefenderApplicationGuard CSP
|
||||
href: windowsdefenderapplicationguard-csp.md
|
||||
items:
|
||||
- name: WindowsDefenderApplicationGuard DDF file
|
||||
href: windowsdefenderapplicationguard-ddf-file.md
|
||||
- name: WindowsLicensing CSP
|
||||
href: windowslicensing-csp.md
|
||||
items:
|
||||
- name: WindowsLicensing DDF file
|
||||
href: windowslicensing-ddf-file.md
|
||||
- name: WindowsSecurityAuditing CSP
|
||||
href: windowssecurityauditing-csp.md
|
||||
items:
|
||||
- name: WindowsSecurityAuditing DDF file
|
||||
href: windowssecurityauditing-ddf-file.md
|
||||
- name: WiredNetwork CSP
|
||||
href: wirednetwork-csp.md
|
||||
items:
|
||||
- name: WiredNetwork DDF file
|
||||
href: wirednetwork-ddf-file.md
|
@ -37,7 +37,7 @@ The Policy configuration service provider has the following sub-categories:
|
||||
> - **./Device/Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy.
|
||||
> - **./Device/Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result.
|
||||
>
|
||||
> For device wide configuration the **_Device/_** portion may be omitted from the path, deeming the following paths respectively equivalent:
|
||||
> For device wide configuration the **_Device/_** portion may be omitted from the path, deeming the following paths respectively equivalent to the paths provided above:
|
||||
>
|
||||
> - **./Vendor/MSFT/Policy/Config/_AreaName/PolicyName_** to configure the policy.
|
||||
> - **./Vendor/MSFT/Policy/Result/_AreaName/PolicyName_** to get the result.
|
||||
|
@ -104,17 +104,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -939,17 +939,8 @@ ADMX Info:
|
||||
<!--/Validation-->
|
||||
<!--/Policy-->
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -729,17 +729,8 @@ ADMX Info:
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -106,16 +106,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
@ -323,17 +323,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -407,17 +407,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -104,17 +104,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -1086,17 +1086,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -188,16 +188,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
@ -182,17 +182,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -348,16 +348,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
@ -1811,16 +1811,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
@ -102,17 +102,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -254,17 +254,9 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are for upcoming release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
These policies are currently only available as part of a Windows Insider release.
|
@ -954,17 +954,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -170,17 +170,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -324,17 +324,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -99,17 +99,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are for upcoming release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -2168,16 +2168,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -605,15 +605,6 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
@ -173,16 +173,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -175,17 +175,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -101,17 +101,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -1710,16 +1710,7 @@ ADMX Info:
|
||||
<!--/ADMXBacked-->
|
||||
<!--/Policy-->
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -476,16 +476,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -956,17 +956,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -101,17 +101,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -461,17 +461,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -2187,16 +2187,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -185,17 +185,8 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -1573,17 +1573,7 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
||||
|
||||
|
@ -386,15 +386,6 @@ ADMX Info:
|
||||
<!--/Policy-->
|
||||
<hr/>
|
||||
|
||||
Footnotes:
|
||||
|
||||
- 1 - Available in Windows 10, version 1607
|
||||
- 2 - Available in Windows 10, version 1703
|
||||
- 3 - Available in Windows 10, version 1709
|
||||
- 4 - Available in Windows 10, version 1803
|
||||
- 5 - Available in Windows 10, version 1809
|
||||
- 6 - Available in Windows 10, version 1903
|
||||
- 7 - Available in Windows 10, version 1909
|
||||
- 8 - Available in Windows 10, version 2004
|
||||
- 9 - Available in Windows 10, version 20H2
|
||||
> [!NOTE]
|
||||
> These policies are currently only available as part of a Windows Insider release.
|
||||
<!--/Policies-->
|
@ -1,15 +0,0 @@
|
||||
# Deploy Windows 10 with Microsoft Endpoint Configuration Manager
|
||||
## Prepare for Windows 10 deployment with Configuration Manager
|
||||
### [Prepare for Zero Touch Installation with Configuration Manager](prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md)
|
||||
### [Create a custom Windows PE boot image with Configuration Manager](create-a-custom-windows-pe-boot-image-with-configuration-manager.md)
|
||||
### [Add a Windows 10 operating system image using Configuration Manager](add-a-windows-10-operating-system-image-using-configuration-manager.md)
|
||||
### [Create an application to deploy with Windows 10 using Configuration Manager](create-an-application-to-deploy-with-windows-10-using-configuration-manager.md)
|
||||
### [Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager](add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md)
|
||||
### [Create a task sequence with Configuration Manager and MDT](create-a-task-sequence-with-configuration-manager-and-mdt.md)
|
||||
### [Finalize the operating system configuration for Windows 10 deployment with Configuration Manager](finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md)
|
||||
|
||||
## Deploy Windows 10 with Configuration Manager
|
||||
### [Deploy Windows 10 using PXE and Configuration Manager](deploy-windows-10-using-pxe-and-configuration-manager.md)
|
||||
### [Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager](refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||
### [Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager](replace-a-windows-7-client-with-windows-10-using-configuration-manager.md)
|
||||
### [Perform an in-place upgrade to Windows 10 using Configuration Manager](upgrade-to-windows-10-with-configuraton-manager.md)
|
28
windows/deployment/deploy-windows-cm/TOC.yml
Normal file
28
windows/deployment/deploy-windows-cm/TOC.yml
Normal file
@ -0,0 +1,28 @@
|
||||
- name: Deploy Windows 10 with Microsoft Endpoint Configuration Manager
|
||||
items:
|
||||
- name: Prepare for Windows 10 deployment with Configuration Manager
|
||||
items:
|
||||
- name: Prepare for Zero Touch Installation with Configuration Manager
|
||||
href: prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md
|
||||
- name: Create a custom Windows PE boot image with Configuration Manager
|
||||
href: create-a-custom-windows-pe-boot-image-with-configuration-manager.md
|
||||
- name: Add a Windows 10 operating system image using Configuration Manager
|
||||
href: add-a-windows-10-operating-system-image-using-configuration-manager.md
|
||||
- name: Create an application to deploy with Windows 10 using Configuration Manager
|
||||
href: create-an-application-to-deploy-with-windows-10-using-configuration-manager.md
|
||||
- name: Add drivers to a Windows 10 deployment with Windows PE using Configuration Manager
|
||||
href: add-drivers-to-a-windows-10-deployment-with-windows-pe-using-configuration-manager.md
|
||||
- name: Create a task sequence with Configuration Manager and MDT
|
||||
href: create-a-task-sequence-with-configuration-manager-and-mdt.md
|
||||
- name: Finalize the operating system configuration for Windows 10 deployment with Configuration Manager
|
||||
href: finalize-the-os-configuration-for-windows-10-deployment-with-configuration-manager.md
|
||||
- name: Deploy Windows 10 with Configuration Manager
|
||||
items:
|
||||
- name: Deploy Windows 10 using PXE and Configuration Manager
|
||||
href: deploy-windows-10-using-pxe-and-configuration-manager.md
|
||||
- name: Refresh a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
href: refresh-a-windows-7-client-with-windows-10-using-configuration-manager.md
|
||||
- name: Replace a Windows 7 SP1 client with Windows 10 using Configuration Manager
|
||||
href: replace-a-windows-7-client-with-windows-10-using-configuration-manager.md
|
||||
- name: Perform an in-place upgrade to Windows 10 using Configuration Manager
|
||||
href: upgrade-to-windows-10-with-configuraton-manager.md
|
@ -1,22 +0,0 @@
|
||||
# Deploy Windows 10 with the Microsoft Deployment Toolkit (MDT)
|
||||
## [Get started with MDT](get-started-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
## Deploy Windows 10 with MDT
|
||||
### [Prepare for deployment with MDT](prepare-for-windows-deployment-with-mdt.md)
|
||||
### [Create a Windows 10 reference image](create-a-windows-10-reference-image.md)
|
||||
### [Deploy a Windows 10 image using MDT](deploy-a-windows-10-image-using-mdt.md)
|
||||
### [Build a distributed environment for Windows 10 deployment](build-a-distributed-environment-for-windows-10-deployment.md)
|
||||
### [Refresh a Windows 7 computer with Windows 10](refresh-a-windows-7-computer-with-windows-10.md)
|
||||
### [Replace a Windows 7 computer with a Windows 10 computer](replace-a-windows-7-computer-with-a-windows-10-computer.md)
|
||||
### [Perform an in-place upgrade to Windows 10 with MDT](upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md)
|
||||
|
||||
## Customize MDT
|
||||
### [Configure MDT settings](configure-mdt-settings.md)
|
||||
### [Set up MDT for BitLocker](set-up-mdt-for-bitlocker.md)
|
||||
### [Configure MDT deployment share rules](configure-mdt-deployment-share-rules.md)
|
||||
### [Configure MDT for UserExit scripts](configure-mdt-for-userexit-scripts.md)
|
||||
### [Simulate a Windows 10 deployment in a test environment](simulate-a-windows-10-deployment-in-a-test-environment.md)
|
||||
### [Use the MDT database to stage Windows 10 deployment information](use-the-mdt-database-to-stage-windows-10-deployment-information.md)
|
||||
### [Assign applications using roles in MDT](assign-applications-using-roles-in-mdt.md)
|
||||
### [Use web services in MDT](use-web-services-in-mdt.md)
|
||||
### [Use Orchestrator runbooks with MDT](use-orchestrator-runbooks-with-mdt.md)
|
40
windows/deployment/deploy-windows-mdt/TOC.yml
Normal file
40
windows/deployment/deploy-windows-mdt/TOC.yml
Normal file
@ -0,0 +1,40 @@
|
||||
- name: Deploy Windows 10 with the Microsoft Deployment Toolkit (MDT)
|
||||
items:
|
||||
- name: Get started with MDT
|
||||
href: get-started-with-the-microsoft-deployment-toolkit.md
|
||||
- name: Deploy Windows 10 with MDT
|
||||
items:
|
||||
- name: Prepare for deployment with MDT
|
||||
href: prepare-for-windows-deployment-with-mdt.md
|
||||
- name: Create a Windows 10 reference image
|
||||
href: create-a-windows-10-reference-image.md
|
||||
- name: Deploy a Windows 10 image using MDT
|
||||
href: deploy-a-windows-10-image-using-mdt.md
|
||||
- name: Build a distributed environment for Windows 10 deployment
|
||||
href: build-a-distributed-environment-for-windows-10-deployment.md
|
||||
- name: Refresh a Windows 7 computer with Windows 10
|
||||
href: refresh-a-windows-7-computer-with-windows-10.md
|
||||
- name: Replace a Windows 7 computer with a Windows 10 computer
|
||||
href: replace-a-windows-7-computer-with-a-windows-10-computer.md
|
||||
- name: Perform an in-place upgrade to Windows 10 with MDT
|
||||
href: upgrade-to-windows-10-with-the-microsoft-deployment-toolkit.md
|
||||
- name: Customize MDT
|
||||
items:
|
||||
- name: Configure MDT settings
|
||||
href: configure-mdt-settings.md
|
||||
- name: Set up MDT for BitLocker
|
||||
href: set-up-mdt-for-bitlocker.md
|
||||
- name: Configure MDT deployment share rules
|
||||
href: configure-mdt-deployment-share-rules.md
|
||||
- name: Configure MDT for UserExit scripts
|
||||
href: configure-mdt-for-userexit-scripts.md
|
||||
- name: Simulate a Windows 10 deployment in a test environment
|
||||
href: simulate-a-windows-10-deployment-in-a-test-environment.md
|
||||
- name: Use the MDT database to stage Windows 10 deployment information
|
||||
href: use-the-mdt-database-to-stage-windows-10-deployment-information.md
|
||||
- name: Assign applications using roles in MDT
|
||||
href: assign-applications-using-roles-in-mdt.md
|
||||
- name: Use web services in MDT
|
||||
href: use-web-services-in-mdt.md
|
||||
- name: Use Orchestrator runbooks with MDT
|
||||
href: use-orchestrator-runbooks-with-mdt.md
|
@ -53,7 +53,7 @@ Typically, the improvements are reliability and performance improvements that do
|
||||
* Servicing stack updates contain the full servicing stack; as a result, typically administrators only need to install the latest servicing stack update for the operating system.
|
||||
* Installing servicing stack update does not require restarting the device, so installation should not be disruptive.
|
||||
* Servicing stack update releases are specific to the operating system version (build number), much like quality updates.
|
||||
* Search to install latest available [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001).
|
||||
* Servicing stack updates can be delivered with Windows Update, or you can perform a search to install the latest available at [Servicing stack update for Windows 10](https://portal.msrc.microsoft.com/security-guidance/advisory/ADV990001).
|
||||
* Once a servicing stack update is installed, it cannot be removed or uninstalled from the machine.
|
||||
|
||||
## Simplifying on-premises deployment of servicing stack updates
|
||||
|
@ -38,9 +38,6 @@ The Semi-Annual Channel is the default servicing channel for all Windows 10 devi
|
||||
| Enterprise LTSB |  |  |  |
|
||||
| Pro Education |  |  |  |
|
||||
| Education |  |  |  |
|
||||
| Mobile |  |  |  |
|
||||
| Mobile Enterprise |  |  |  |
|
||||
|
||||
|
||||
|
||||
>[!NOTE]
|
||||
@ -70,12 +67,6 @@ The Semi-Annual Channel is the default servicing channel for all Windows 10 devi
|
||||
|
||||
../Vendor/MSFT/Policy/Config/Update/**BranchReadinessLevel**
|
||||
|
||||
**To assign Windows 10 Mobile Enterprise devices to the Semi-Annual Channel by using MDM**
|
||||
|
||||
|
||||
- In Windows 10 Mobile Enterprise, version 1607 and later releases:
|
||||
|
||||
../Vendor/MSFT/Policy/Config/Update/BranchReadinessLevel
|
||||
|
||||
## Enroll devices in the Windows Insider Program
|
||||
|
||||
@ -189,4 +180,4 @@ Administrators can disable the "Check for updates" option for users by enabling
|
||||
- [Integrate Windows Update for Business with management solutions](waas-integrate-wufb.md)
|
||||
- [Walkthrough: use Group Policy to configure Windows Update for Business](waas-wufb-group-policy.md)
|
||||
- [Walkthrough: use Intune to configure Windows Update for Business](/intune/windows-update-for-business-configure)
|
||||
- [Manage device restarts after updates](waas-restart.md)
|
||||
- [Manage device restarts after updates](waas-restart.md)
|
||||
|
@ -1,2 +0,0 @@
|
||||
# [Windows Autopilot deployment](index.yml)
|
||||
## [Get started](demonstrate-deployment-on-vm.md)
|
5
windows/deployment/windows-autopilot/TOC.yml
Normal file
5
windows/deployment/windows-autopilot/TOC.yml
Normal file
@ -0,0 +1,5 @@
|
||||
- name: Windows Autopilot deployment
|
||||
href: index.yml
|
||||
items:
|
||||
- name: Get started
|
||||
href: demonstrate-deployment-on-vm.md
|
@ -1,11 +0,0 @@
|
||||
# [Windows 10](index.yml)
|
||||
## [What's new](/windows/whats-new)
|
||||
## [Release information](/windows/release-health)
|
||||
## [Deployment](/windows/deployment)
|
||||
## [Configuration](/windows/configuration)
|
||||
## [Client management](/windows/client-management)
|
||||
## [Application management](/windows/application-management)
|
||||
## [Security](/windows/security)
|
||||
## [Privacy](/windows/privacy)
|
||||
## [Troubleshooting](/windows/client-management/windows-10-support-solutions)
|
||||
## [Previous Windows versions](/previous-versions/windows)
|
23
windows/hub/TOC.yml
Normal file
23
windows/hub/TOC.yml
Normal file
@ -0,0 +1,23 @@
|
||||
- name: Windows 10
|
||||
href: index.yml
|
||||
items:
|
||||
- name: What's new
|
||||
href: /windows/whats-new
|
||||
- name: Release information
|
||||
href: /windows/release-health
|
||||
- name: Deployment
|
||||
href: /windows/deployment
|
||||
- name: Configuration
|
||||
href: /windows/configuration
|
||||
- name: Client management
|
||||
href: /windows/client-management
|
||||
- name: Application management
|
||||
href: /windows/application-management
|
||||
- name: Security
|
||||
href: /windows/security
|
||||
- name: Privacy
|
||||
href: /windows/privacy
|
||||
- name: Troubleshooting
|
||||
href: /windows/client-management/windows-10-support-solutions
|
||||
- name: Previous Windows versions
|
||||
href: /previous-versions/windows
|
@ -1,6 +0,0 @@
|
||||
# [Security](index.yml)
|
||||
## [Identity and access management](identity-protection/index.md)
|
||||
## [Information protection](information-protection/index.md)
|
||||
## [Threat protection](threat-protection/index.md)
|
||||
|
||||
|
9
windows/security/TOC.yml
Normal file
9
windows/security/TOC.yml
Normal file
@ -0,0 +1,9 @@
|
||||
- name: Security
|
||||
href: index.yml
|
||||
items:
|
||||
- name: Identity and access management
|
||||
href: identity-protection/index.md
|
||||
- name: Information protection
|
||||
href: information-protection/index.md
|
||||
- name: Threat protection
|
||||
href: threat-protection/index.md
|
@ -1,75 +0,0 @@
|
||||
# [Identity and access management](index.md)
|
||||
|
||||
## [Technical support policy for lost or forgotten passwords](password-support-policy.md)
|
||||
|
||||
## [Access Control Overview](access-control/access-control.md)
|
||||
### [Dynamic Access Control Overview](access-control/dynamic-access-control.md)
|
||||
### [Security identifiers](access-control/security-identifiers.md)
|
||||
### [Security Principals](access-control/security-principals.md)
|
||||
### [Local Accounts](access-control/local-accounts.md)
|
||||
### [Active Directory Accounts](access-control/active-directory-accounts.md)
|
||||
### [Microsoft Accounts](access-control/microsoft-accounts.md)
|
||||
### [Service Accounts](access-control/service-accounts.md)
|
||||
### [Active Directory Security Groups](access-control/active-directory-security-groups.md)
|
||||
### [Special Identities](access-control/special-identities.md)
|
||||
|
||||
### [User Account Control](user-account-control\user-account-control-overview.md)
|
||||
#### [How User Account Control works](user-account-control\how-user-account-control-works.md)
|
||||
#### [User Account Control security policy settings](user-account-control\user-account-control-security-policy-settings.md)
|
||||
#### [User Account Control Group Policy and registry key settings](user-account-control\user-account-control-group-policy-and-registry-key-settings.md)
|
||||
|
||||
## [Windows Hello for Business](hello-for-business/index.yml)
|
||||
|
||||
## [Protect derived domain credentials with Credential Guard](credential-guard/credential-guard.md)
|
||||
### [How Credential Guard works](credential-guard/credential-guard-how-it-works.md)
|
||||
### [Credential Guard Requirements](credential-guard/credential-guard-requirements.md)
|
||||
### [Manage Credential Guard](credential-guard/credential-guard-manage.md)
|
||||
### [Hardware readiness tool](credential-guard/dg-readiness-tool.md)
|
||||
### [Credential Guard protection limits](credential-guard/credential-guard-protection-limits.md)
|
||||
### [Considerations when using Credential Guard](credential-guard/credential-guard-considerations.md)
|
||||
### [Credential Guard: Additional mitigations](credential-guard/additional-mitigations.md)
|
||||
### [Credential Guard: Known issues](credential-guard/credential-guard-known-issues.md)
|
||||
|
||||
## [Protect Remote Desktop credentials with Remote Credential Guard](remote-credential-guard.md)
|
||||
|
||||
## [Smart Cards](smart-cards/smart-card-windows-smart-card-technical-reference.md)
|
||||
### [How Smart Card Sign-in Works in Windows](smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md)
|
||||
#### [Smart Card Architecture](smart-cards/smart-card-architecture.md)
|
||||
#### [Certificate Requirements and Enumeration](smart-cards/smart-card-certificate-requirements-and-enumeration.md)
|
||||
#### [Smart Card and Remote Desktop Services](smart-cards/smart-card-and-remote-desktop-services.md)
|
||||
#### [Smart Cards for Windows Service](smart-cards/smart-card-smart-cards-for-windows-service.md)
|
||||
#### [Certificate Propagation Service](smart-cards/smart-card-certificate-propagation-service.md)
|
||||
#### [Smart Card Removal Policy Service](smart-cards/smart-card-removal-policy-service.md)
|
||||
### [Smart Card Tools and Settings](smart-cards/smart-card-tools-and-settings.md)
|
||||
#### [Smart Cards Debugging Information](smart-cards/smart-card-debugging-information.md)
|
||||
#### [Smart Card Group Policy and Registry Settings](smart-cards/smart-card-group-policy-and-registry-settings.md)
|
||||
#### [Smart Card Events](smart-cards/smart-card-events.md)
|
||||
|
||||
### [Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-overview.md)
|
||||
#### [Understanding and Evaluating Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-understanding-and-evaluating.md)
|
||||
##### [Get Started with Virtual Smart Cards: Walkthrough Guide](virtual-smart-cards\virtual-smart-card-get-started.md)
|
||||
##### [Use Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-use-virtual-smart-cards.md)
|
||||
##### [Deploy Virtual Smart Cards](virtual-smart-cards\virtual-smart-card-deploy-virtual-smart-cards.md)
|
||||
##### [Evaluate Virtual Smart Card Security](virtual-smart-cards\virtual-smart-card-evaluate-security.md)
|
||||
#### [Tpmvscmgr](virtual-smart-cards\virtual-smart-card-tpmvscmgr.md)
|
||||
|
||||
## [Enterprise Certificate Pinning](enterprise-certificate-pinning.md)
|
||||
|
||||
## [Install digital certificates on Windows 10 Mobile](installing-digital-certificates-on-windows-10-mobile.md)
|
||||
|
||||
## [Windows 10 credential theft mitigation guide abstract](windows-credential-theft-mitigation-guide-abstract.md)
|
||||
|
||||
## [Configure S/MIME for Windows 10 and Windows 10 Mobile](configure-s-mime.md)
|
||||
|
||||
## [VPN technical guide](vpn\vpn-guide.md)
|
||||
### [VPN connection types](vpn\vpn-connection-type.md)
|
||||
### [VPN routing decisions](vpn\vpn-routing.md)
|
||||
### [VPN authentication options](vpn\vpn-authentication.md)
|
||||
### [VPN and conditional access](vpn\vpn-conditional-access.md)
|
||||
### [VPN name resolution](vpn\vpn-name-resolution.md)
|
||||
### [VPN auto-triggered profile options](vpn\vpn-auto-trigger-profile.md)
|
||||
### [VPN security features](vpn\vpn-security-features.md)
|
||||
### [VPN profile options](vpn\vpn-profile-options.md)
|
||||
### [How to configure Diffie Hellman protocol over IKEv2 VPN connections](vpn\how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md)
|
||||
### [How to use single sign-on (SSO) over VPN and Wi-Fi connections](vpn\how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md)
|
||||
### [Optimizing Office 365 traffic with the Windows 10 VPN client](vpn\vpn-office-365-optimization.md)
|
134
windows/security/identity-protection/TOC.yml
Normal file
134
windows/security/identity-protection/TOC.yml
Normal file
@ -0,0 +1,134 @@
|
||||
- name: Identity and access management
|
||||
href: index.md
|
||||
items:
|
||||
- name: Technical support policy for lost or forgotten passwords
|
||||
href: password-support-policy.md
|
||||
- name: Access Control Overview
|
||||
href: access-control/access-control.md
|
||||
items:
|
||||
- name: Dynamic Access Control Overview
|
||||
href: access-control/dynamic-access-control.md
|
||||
- name: Security identifiers
|
||||
href: access-control/security-identifiers.md
|
||||
- name: Security Principals
|
||||
href: access-control/security-principals.md
|
||||
- name: Local Accounts
|
||||
href: access-control/local-accounts.md
|
||||
- name: Active Directory Accounts
|
||||
href: access-control/active-directory-accounts.md
|
||||
- name: Microsoft Accounts
|
||||
href: access-control/microsoft-accounts.md
|
||||
- name: Service Accounts
|
||||
href: access-control/service-accounts.md
|
||||
- name: Active Directory Security Groups
|
||||
href: access-control/active-directory-security-groups.md
|
||||
- name: Special Identities
|
||||
href: access-control/special-identities.md
|
||||
- name: User Account Control
|
||||
href: user-account-control\user-account-control-overview.md
|
||||
items:
|
||||
- name: How User Account Control works
|
||||
href: user-account-control\how-user-account-control-works.md
|
||||
- name: User Account Control security policy settings
|
||||
href: user-account-control\user-account-control-security-policy-settings.md
|
||||
- name: User Account Control Group Policy and registry key settings
|
||||
href: user-account-control\user-account-control-group-policy-and-registry-key-settings.md
|
||||
- name: Windows Hello for Business
|
||||
href: hello-for-business/index.yml
|
||||
- name: Protect derived domain credentials with Credential Guard
|
||||
href: credential-guard/credential-guard.md
|
||||
items:
|
||||
- name: How Credential Guard works
|
||||
href: credential-guard/credential-guard-how-it-works.md
|
||||
- name: Credential Guard Requirements
|
||||
href: credential-guard/credential-guard-requirements.md
|
||||
- name: Manage Credential Guard
|
||||
href: credential-guard/credential-guard-manage.md
|
||||
- name: Hardware readiness tool
|
||||
href: credential-guard/dg-readiness-tool.md
|
||||
- name: Credential Guard protection limits
|
||||
href: credential-guard/credential-guard-protection-limits.md
|
||||
- name: Considerations when using Credential Guard
|
||||
href: credential-guard/credential-guard-considerations.md
|
||||
- name: "Credential Guard: Additional mitigations"
|
||||
href: credential-guard/additional-mitigations.md
|
||||
- name: "Credential Guard: Known issues"
|
||||
href: credential-guard/credential-guard-known-issues.md
|
||||
- name: Protect Remote Desktop credentials with Remote Credential Guard
|
||||
href: remote-credential-guard.md
|
||||
- name: Smart Cards
|
||||
href: smart-cards/smart-card-windows-smart-card-technical-reference.md
|
||||
items:
|
||||
- name: How Smart Card Sign-in Works in Windows
|
||||
href: smart-cards/smart-card-how-smart-card-sign-in-works-in-windows.md
|
||||
items:
|
||||
- name: Smart Card Architecture
|
||||
href: smart-cards/smart-card-architecture.md
|
||||
- name: Certificate Requirements and Enumeration
|
||||
href: smart-cards/smart-card-certificate-requirements-and-enumeration.md
|
||||
- name: Smart Card and Remote Desktop Services
|
||||
href: smart-cards/smart-card-and-remote-desktop-services.md
|
||||
- name: Smart Cards for Windows Service
|
||||
href: smart-cards/smart-card-smart-cards-for-windows-service.md
|
||||
- name: Certificate Propagation Service
|
||||
href: smart-cards/smart-card-certificate-propagation-service.md
|
||||
- name: Smart Card Removal Policy Service
|
||||
href: smart-cards/smart-card-removal-policy-service.md
|
||||
- name: Smart Card Tools and Settings
|
||||
href: smart-cards/smart-card-tools-and-settings.md
|
||||
items:
|
||||
- name: Smart Cards Debugging Information
|
||||
href: smart-cards/smart-card-debugging-information.md
|
||||
- name: Smart Card Group Policy and Registry Settings
|
||||
href: smart-cards/smart-card-group-policy-and-registry-settings.md
|
||||
- name: Smart Card Events
|
||||
href: smart-cards/smart-card-events.md
|
||||
- name: Virtual Smart Cards
|
||||
href: virtual-smart-cards\virtual-smart-card-overview.md
|
||||
items:
|
||||
- name: Understanding and Evaluating Virtual Smart Cards
|
||||
href: virtual-smart-cards\virtual-smart-card-understanding-and-evaluating.md
|
||||
items:
|
||||
- name: "Get Started with Virtual Smart Cards: Walkthrough Guide"
|
||||
href: virtual-smart-cards\virtual-smart-card-get-started.md
|
||||
- name: Use Virtual Smart Cards
|
||||
href: virtual-smart-cards\virtual-smart-card-use-virtual-smart-cards.md
|
||||
- name: Deploy Virtual Smart Cards
|
||||
href: virtual-smart-cards\virtual-smart-card-deploy-virtual-smart-cards.md
|
||||
- name: Evaluate Virtual Smart Card Security
|
||||
href: virtual-smart-cards\virtual-smart-card-evaluate-security.md
|
||||
- name: Tpmvscmgr
|
||||
href: virtual-smart-cards\virtual-smart-card-tpmvscmgr.md
|
||||
- name: Enterprise Certificate Pinning
|
||||
href: enterprise-certificate-pinning.md
|
||||
- name: Install digital certificates on Windows 10 Mobile
|
||||
href: installing-digital-certificates-on-windows-10-mobile.md
|
||||
- name: Windows 10 credential theft mitigation guide abstract
|
||||
href: windows-credential-theft-mitigation-guide-abstract.md
|
||||
- name: Configure S/MIME for Windows 10 and Windows 10 Mobile
|
||||
href: configure-s-mime.md
|
||||
- name: VPN technical guide
|
||||
href: vpn\vpn-guide.md
|
||||
items:
|
||||
- name: VPN connection types
|
||||
href: vpn\vpn-connection-type.md
|
||||
- name: VPN routing decisions
|
||||
href: vpn\vpn-routing.md
|
||||
- name: VPN authentication options
|
||||
href: vpn\vpn-authentication.md
|
||||
- name: VPN and conditional access
|
||||
href: vpn\vpn-conditional-access.md
|
||||
- name: VPN name resolution
|
||||
href: vpn\vpn-name-resolution.md
|
||||
- name: VPN auto-triggered profile options
|
||||
href: vpn\vpn-auto-trigger-profile.md
|
||||
- name: VPN security features
|
||||
href: vpn\vpn-security-features.md
|
||||
- name: VPN profile options
|
||||
href: vpn\vpn-profile-options.md
|
||||
- name: How to configure Diffie Hellman protocol over IKEv2 VPN connections
|
||||
href: vpn\how-to-configure-diffie-hellman-protocol-over-ikev2-vpn-connections.md
|
||||
- name: How to use single sign-on (SSO) over VPN and Wi-Fi connections
|
||||
href: vpn\how-to-use-single-sign-on-sso-over-vpn-and-wi-fi-connections.md
|
||||
- name: Optimizing Office 365 traffic with the Windows 10 VPN client
|
||||
href: vpn\vpn-office-365-optimization.md
|
@ -1,78 +0,0 @@
|
||||
# [Information protection](index.md)
|
||||
|
||||
## [BitLocker](bitlocker\bitlocker-overview.md)
|
||||
### [Overview of BitLocker Device Encryption in Windows 10](bitlocker\bitlocker-device-encryption-overview-windows-10.md)
|
||||
### [BitLocker frequently asked questions (FAQ)](bitlocker\bitlocker-frequently-asked-questions.md)
|
||||
#### [Overview and requirements](bitlocker\bitlocker-overview-and-requirements-faq.yml)
|
||||
#### [Upgrading](bitlocker\bitlocker-upgrading-faq.md)
|
||||
#### [Deployment and administration](bitlocker\bitlocker-deployment-and-administration-faq.yml)
|
||||
#### [Key management](bitlocker\bitlocker-key-management-faq.md)
|
||||
#### [BitLocker To Go](bitlocker\bitlocker-to-go-faq.yml)
|
||||
#### [Active Directory Domain Services](bitlocker\bitlocker-and-adds-faq.yml)
|
||||
#### [Security](bitlocker\bitlocker-security-faq.md)
|
||||
#### [BitLocker Network Unlock](bitlocker\bitlocker-network-unlock-faq.md)
|
||||
#### [General](bitlocker\bitlocker-using-with-other-programs-faq.md)
|
||||
### [Prepare your organization for BitLocker: Planning and policies](bitlocker\prepare-your-organization-for-bitlocker-planning-and-policies.md)
|
||||
### [BitLocker basic deployment](bitlocker\bitlocker-basic-deployment.md)
|
||||
### [BitLocker: How to deploy on Windows Server 2012 and later](bitlocker\bitlocker-how-to-deploy-on-windows-server.md)
|
||||
### [BitLocker: Management for enterprises](bitlocker\bitlocker-management-for-enterprises.md)
|
||||
### [BitLocker: How to enable Network Unlock](bitlocker\bitlocker-how-to-enable-network-unlock.md)
|
||||
### [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](bitlocker\bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md)
|
||||
### [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker\bitlocker-use-bitlocker-recovery-password-viewer.md)
|
||||
### [BitLocker Group Policy settings](bitlocker\bitlocker-group-policy-settings.md)
|
||||
### [BCD settings and BitLocker](bitlocker\bcd-settings-and-bitlocker.md)
|
||||
### [BitLocker Recovery Guide](bitlocker\bitlocker-recovery-guide-plan.md)
|
||||
### [BitLocker Countermeasures](bitlocker\bitlocker-countermeasures.md)
|
||||
### [Protecting cluster shared volumes and storage area networks with BitLocker](bitlocker\protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md)
|
||||
### Troubleshoot BitLocker
|
||||
#### [Troubleshoot BitLocker](bitlocker\troubleshoot-bitlocker.md)
|
||||
#### [BitLocker cannot encrypt a drive: known issues](bitlocker\ts-bitlocker-cannot-encrypt-issues.md)
|
||||
#### [Enforcing BitLocker policies by using Intune: known issues](bitlocker\ts-bitlocker-intune-issues.md)
|
||||
#### [BitLocker Network Unlock: known issues](bitlocker\ts-bitlocker-network-unlock-issues.md)
|
||||
#### [BitLocker recovery: known issues](bitlocker\ts-bitlocker-recovery-issues.md)
|
||||
#### [BitLocker configuration: known issues](bitlocker\ts-bitlocker-config-issues.md)
|
||||
#### Troubleshoot BitLocker and TPM issues
|
||||
##### [BitLocker cannot encrypt a drive: known TPM issues](bitlocker\ts-bitlocker-cannot-encrypt-tpm-issues.md)
|
||||
##### [BitLocker and TPM: other known issues](bitlocker\ts-bitlocker-tpm-issues.md)
|
||||
##### [Decode Measured Boot logs to track PCR changes](bitlocker\ts-bitlocker-decode-measured-boot-logs.md)
|
||||
|
||||
## [Encrypted Hard Drive](encrypted-hard-drive.md)
|
||||
|
||||
## [Kernel DMA Protection](kernel-dma-protection-for-thunderbolt.md)
|
||||
|
||||
## [Protect your enterprise data using Windows Information Protection (WIP)](windows-information-protection\protect-enterprise-data-using-wip.md)
|
||||
### [Create a WIP policy using Microsoft Intune](windows-information-protection\overview-create-wip-policy.md)
|
||||
#### [Create a WIP policy with MDM using the Azure portal for Microsoft Intune](windows-information-protection\create-wip-policy-using-intune-azure.md)
|
||||
##### [Deploy your WIP policy using the Azure portal for Microsoft Intune](windows-information-protection\deploy-wip-policy-using-intune-azure.md)
|
||||
##### [Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune](windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md)
|
||||
#### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
||||
#### [Determine the Enterprise Context of an app running in WIP](windows-information-protection\wip-app-enterprise-context.md)
|
||||
### [Create a WIP policy using Microsoft Endpoint Configuration Manager](windows-information-protection\overview-create-wip-policy-configmgr.md)
|
||||
#### [Create and deploy a WIP policy using Microsoft Endpoint Configuration Manager](windows-information-protection\create-wip-policy-using-configmgr.md)
|
||||
#### [Create and verify an EFS Data Recovery Agent (DRA) certificate](windows-information-protection\create-and-verify-an-efs-dra-certificate.md)
|
||||
#### [Determine the Enterprise Context of an app running in WIP](windows-information-protection\wip-app-enterprise-context.md)
|
||||
### [Mandatory tasks and settings required to turn on WIP](windows-information-protection\mandatory-settings-for-wip.md)
|
||||
### [Testing scenarios for WIP](windows-information-protection\testing-scenarios-for-wip.md)
|
||||
### [Limitations while using WIP](windows-information-protection\limitations-with-wip.md)
|
||||
### [How to collect WIP audit event logs](windows-information-protection\collect-wip-audit-event-logs.md)
|
||||
### [General guidance and best practices for WIP](windows-information-protection\guidance-and-best-practices-wip.md)
|
||||
#### [Enlightened apps for use with WIP](windows-information-protection\enlightened-microsoft-apps-and-wip.md)
|
||||
#### [Unenlightened and enlightened app behavior while using WIP](windows-information-protection\app-behavior-with-wip.md)
|
||||
#### [Recommended Enterprise Cloud Resources and Neutral Resources network settings with WIP](windows-information-protection\recommended-network-definitions-for-wip.md)
|
||||
#### [Using Outlook Web Access with WIP](windows-information-protection\using-owa-with-wip.md)
|
||||
### [Fine-tune WIP Learning](windows-information-protection\wip-learning.md)
|
||||
|
||||
## [Secure the Windows 10 boot process](secure-the-windows-10-boot-process.md)
|
||||
|
||||
## [Trusted Platform Module](tpm/trusted-platform-module-top-node.md)
|
||||
### [Trusted Platform Module Overview](tpm/trusted-platform-module-overview.md)
|
||||
### [TPM fundamentals](tpm/tpm-fundamentals.md)
|
||||
### [How Windows 10 uses the TPM](tpm/how-windows-uses-the-tpm.md)
|
||||
### [TPM Group Policy settings](tpm/trusted-platform-module-services-group-policy-settings.md)
|
||||
### [Back up the TPM recovery information to AD DS](tpm/backup-tpm-recovery-information-to-ad-ds.md)
|
||||
### [View status, clear, or troubleshoot the TPM](tpm/initialize-and-configure-ownership-of-the-tpm.md)
|
||||
### [Understanding PCR banks on TPM 2.0 devices](tpm/switch-pcr-banks-on-tpm-2-0-devices.md)
|
||||
### [TPM recommendations](tpm/tpm-recommendations.md)
|
||||
|
||||
|
||||
|
147
windows/security/information-protection/TOC.yml
Normal file
147
windows/security/information-protection/TOC.yml
Normal file
@ -0,0 +1,147 @@
|
||||
- name: Information protection
|
||||
href: index.md
|
||||
items:
|
||||
- name: BitLocker
|
||||
href: bitlocker\bitlocker-overview.md
|
||||
items:
|
||||
- name: Overview of BitLocker Device Encryption in Windows 10
|
||||
href: bitlocker\bitlocker-device-encryption-overview-windows-10.md
|
||||
- name: BitLocker frequently asked questions (FAQ)
|
||||
href: bitlocker\bitlocker-frequently-asked-questions.md
|
||||
items:
|
||||
- name: Overview and requirements
|
||||
href: bitlocker\bitlocker-overview-and-requirements-faq.yml
|
||||
- name: Upgrading
|
||||
href: bitlocker\bitlocker-upgrading-faq.md
|
||||
- name: Deployment and administration
|
||||
href: bitlocker\bitlocker-deployment-and-administration-faq.yml
|
||||
- name: Key management
|
||||
href: bitlocker\bitlocker-key-management-faq.md
|
||||
- name: BitLocker To Go
|
||||
href: bitlocker\bitlocker-to-go-faq.yml
|
||||
- name: Active Directory Domain Services
|
||||
href: bitlocker\bitlocker-and-adds-faq.yml
|
||||
- name: Security
|
||||
href: bitlocker\bitlocker-security-faq.md
|
||||
- name: BitLocker Network Unlock
|
||||
href: bitlocker\bitlocker-network-unlock-faq.md
|
||||
- name: General
|
||||
href: bitlocker\bitlocker-using-with-other-programs-faq.md
|
||||
- name: "Prepare your organization for BitLocker: Planning and policies"
|
||||
href: bitlocker\prepare-your-organization-for-bitlocker-planning-and-policies.md
|
||||
- name: BitLocker basic deployment
|
||||
href: bitlocker\bitlocker-basic-deployment.md
|
||||
- name: "BitLocker: How to deploy on Windows Server 2012 and later"
|
||||
href: bitlocker\bitlocker-how-to-deploy-on-windows-server.md
|
||||
- name: "BitLocker: Management for enterprises"
|
||||
href: bitlocker\bitlocker-management-for-enterprises.md
|
||||
- name: "BitLocker: How to enable Network Unlock"
|
||||
href: bitlocker\bitlocker-how-to-enable-network-unlock.md
|
||||
- name: "BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker"
|
||||
href: bitlocker\bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md
|
||||
- name: "BitLocker: Use BitLocker Recovery Password Viewer"
|
||||
href: bitlocker\bitlocker-use-bitlocker-recovery-password-viewer.md
|
||||
- name: BitLocker Group Policy settings
|
||||
href: bitlocker\bitlocker-group-policy-settings.md
|
||||
- name: BCD settings and BitLocker
|
||||
href: bitlocker\bcd-settings-and-bitlocker.md
|
||||
- name: BitLocker Recovery Guide
|
||||
href: bitlocker\bitlocker-recovery-guide-plan.md
|
||||
- name: BitLocker Countermeasures
|
||||
href: bitlocker\bitlocker-countermeasures.md
|
||||
- name: Protecting cluster shared volumes and storage area networks with BitLocker
|
||||
href: bitlocker\protecting-cluster-shared-volumes-and-storage-area-networks-with-bitlocker.md
|
||||
- name: Troubleshoot BitLocker
|
||||
items:
|
||||
- name: Troubleshoot BitLocker
|
||||
href: bitlocker\troubleshoot-bitlocker.md
|
||||
- name: "BitLocker cannot encrypt a drive: known issues"
|
||||
href: bitlocker\ts-bitlocker-cannot-encrypt-issues.md
|
||||
- name: "Enforcing BitLocker policies by using Intune: known issues"
|
||||
href: bitlocker\ts-bitlocker-intune-issues.md
|
||||
- name: "BitLocker Network Unlock: known issues"
|
||||
href: bitlocker\ts-bitlocker-network-unlock-issues.md
|
||||
- name: "BitLocker recovery: known issues"
|
||||
href: bitlocker\ts-bitlocker-recovery-issues.md
|
||||
- name: "BitLocker configuration: known issues"
|
||||
href: bitlocker\ts-bitlocker-config-issues.md
|
||||
- name: Troubleshoot BitLocker and TPM issues
|
||||
items:
|
||||
- name: "BitLocker cannot encrypt a drive: known TPM issues"
|
||||
href: bitlocker\ts-bitlocker-cannot-encrypt-tpm-issues.md
|
||||
- name: "BitLocker and TPM: other known issues"
|
||||
href: bitlocker\ts-bitlocker-tpm-issues.md
|
||||
- name: Decode Measured Boot logs to track PCR changes
|
||||
href: bitlocker\ts-bitlocker-decode-measured-boot-logs.md
|
||||
- name: Encrypted Hard Drive
|
||||
href: encrypted-hard-drive.md
|
||||
- name: Kernel DMA Protection
|
||||
href: kernel-dma-protection-for-thunderbolt.md
|
||||
- name: Protect your enterprise data using Windows Information Protection (WIP)
|
||||
href: windows-information-protection\protect-enterprise-data-using-wip.md
|
||||
items:
|
||||
- name: Create a WIP policy using Microsoft Intune
|
||||
href: windows-information-protection\overview-create-wip-policy.md
|
||||
items:
|
||||
- name: Create a WIP policy with MDM using the Azure portal for Microsoft Intune
|
||||
href: windows-information-protection\create-wip-policy-using-intune-azure.md
|
||||
items:
|
||||
- name: Deploy your WIP policy using the Azure portal for Microsoft Intune
|
||||
href: windows-information-protection\deploy-wip-policy-using-intune-azure.md
|
||||
- name: Associate and deploy a VPN policy for WIP using the Azure portal for Microsoft Intune
|
||||
href: windows-information-protection\create-vpn-and-wip-policy-using-intune-azure.md
|
||||
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
||||
href: windows-information-protection\create-and-verify-an-efs-dra-certificate.md
|
||||
- name: Determine the Enterprise Context of an app running in WIP
|
||||
href: windows-information-protection\wip-app-enterprise-context.md
|
||||
- name: Create a WIP policy using Microsoft Endpoint Configuration Manager
|
||||
href: windows-information-protection\overview-create-wip-policy-configmgr.md
|
||||
items:
|
||||
- name: Create and deploy a WIP policy using Microsoft Endpoint Configuration Manager
|
||||
href: windows-information-protection\create-wip-policy-using-configmgr.md
|
||||
- name: Create and verify an EFS Data Recovery Agent (DRA) certificate
|
||||
href: windows-information-protection\create-and-verify-an-efs-dra-certificate.md
|
||||
- name: Determine the Enterprise Context of an app running in WIP
|
||||
href: windows-information-protection\wip-app-enterprise-context.md
|
||||
- name: Mandatory tasks and settings required to turn on WIP
|
||||
href: windows-information-protection\mandatory-settings-for-wip.md
|
||||
- name: Testing scenarios for WIP
|
||||
href: windows-information-protection\testing-scenarios-for-wip.md
|
||||
- name: Limitations while using WIP
|
||||
href: windows-information-protection\limitations-with-wip.md
|
||||
- name: How to collect WIP audit event logs
|
||||
href: windows-information-protection\collect-wip-audit-event-logs.md
|
||||
- name: General guidance and best practices for WIP
|
||||
href: windows-information-protection\guidance-and-best-practices-wip.md
|
||||
items:
|
||||
- name: Enlightened apps for use with WIP
|
||||
href: windows-information-protection\enlightened-microsoft-apps-and-wip.md
|
||||
- name: Unenlightened and enlightened app behavior while using WIP
|
||||
href: windows-information-protection\app-behavior-with-wip.md
|
||||
- name: Recommended Enterprise Cloud Resources and Neutral Resources network settings with WIP
|
||||
href: windows-information-protection\recommended-network-definitions-for-wip.md
|
||||
- name: Using Outlook Web Access with WIP
|
||||
href: windows-information-protection\using-owa-with-wip.md
|
||||
- name: Fine-tune WIP Learning
|
||||
href: windows-information-protection\wip-learning.md
|
||||
- name: Secure the Windows 10 boot process
|
||||
href: secure-the-windows-10-boot-process.md
|
||||
- name: Trusted Platform Module
|
||||
href: tpm/trusted-platform-module-top-node.md
|
||||
items:
|
||||
- name: Trusted Platform Module Overview
|
||||
href: tpm/trusted-platform-module-overview.md
|
||||
- name: TPM fundamentals
|
||||
href: tpm/tpm-fundamentals.md
|
||||
- name: How Windows 10 uses the TPM
|
||||
href: tpm/how-windows-uses-the-tpm.md
|
||||
- name: TPM Group Policy settings
|
||||
href: tpm/trusted-platform-module-services-group-policy-settings.md
|
||||
- name: Back up the TPM recovery information to AD DS
|
||||
href: tpm/backup-tpm-recovery-information-to-ad-ds.md
|
||||
- name: View status, clear, or troubleshoot the TPM
|
||||
href: tpm/initialize-and-configure-ownership-of-the-tpm.md
|
||||
- name: Understanding PCR banks on TPM 2.0 devices
|
||||
href: tpm/switch-pcr-banks-on-tpm-2-0-devices.md
|
||||
- name: TPM recommendations
|
||||
href: tpm/tpm-recommendations.md
|
@ -1,723 +0,0 @@
|
||||
# [Threat protection](index.md)
|
||||
|
||||
## [Next-generation protection with Microsoft Defender Antivirus]()
|
||||
### [Microsoft Defender Antivirus overview](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-in-windows-10)
|
||||
### [Evaluate Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/evaluate-microsoft-defender-antivirus)
|
||||
|
||||
### [Configure Microsoft Defender Antivirus]()
|
||||
#### [Configure Microsoft Defender Antivirus features](/microsoft-365/security/defender-endpoint/configure-microsoft-defender-antivirus-features)
|
||||
|
||||
#### [Use Microsoft cloud-delivered protection](/microsoft-365/security/defender-endpoint/cloud-protection-microsoft-defender-antivirus)
|
||||
##### [Prevent security settings changes with tamper protection](/microsoft-365/security/defender-endpoint/prevent-changes-to-security-settings-with-tamper-protection)
|
||||
##### [Enable Block at first sight](/microsoft-365/security/defender-endpoint/configure-block-at-first-sight-microsoft-defender-antivirus)
|
||||
##### [Configure the cloud block timeout period](/microsoft-365/security/defender-endpoint/configure-cloud-block-timeout-period-microsoft-defender-antivirus)
|
||||
|
||||
#### [Configure behavioral, heuristic, and real-time protection]()
|
||||
##### [Configuration overview](/microsoft-365/security/defender-endpoint/configure-protection-features-microsoft-defender-antivirus)
|
||||
##### [Detect and block Potentially Unwanted Applications](/microsoft-365/security/defender-endpoint/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus)
|
||||
##### [Enable and configure always-on protection and monitoring](/microsoft-365/security/defender-endpoint/configure-real-time-protection-microsoft-defender-antivirus)
|
||||
|
||||
#### [Antivirus on Windows Server](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-on-windows-server)
|
||||
|
||||
#### [Antivirus compatibility]()
|
||||
##### [Compatibility charts](/microsoft-365/security/defender-endpoint/microsoft-defender-antivirus-compatibility)
|
||||
##### [Use limited periodic antivirus scanning](/microsoft-365/security/defender-endpoint/limited-periodic-scanning-microsoft-defender-antivirus)
|
||||
|
||||
#### [Manage Microsoft Defender Antivirus in your business]()
|
||||
##### [Management overview](/microsoft-365/security/defender-endpoint/configuration-management-reference-microsoft-defender-antivirus)
|
||||
##### [Use Microsoft Intune and Microsoft Endpoint Manager to manage Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/use-intune-config-manager-microsoft-defender-antivirus)
|
||||
##### [Use Group Policy settings to manage Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/use-group-policy-microsoft-defender-antivirus)
|
||||
##### [Use PowerShell cmdlets to manage Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/use-powershell-cmdlets-microsoft-defender-antivirus)
|
||||
##### [Use Windows Management Instrumentation (WMI) to manage Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/use-wmi-microsoft-defender-antivirus)
|
||||
##### [Use the mpcmdrun.exe command line tool to manage Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/command-line-arguments-microsoft-defender-antivirus)
|
||||
|
||||
#### [Deploy, manage updates, and report on Microsoft Defender Antivirus]()
|
||||
##### [Preparing to deploy](/microsoft-365/security/defender-endpoint/deploy-manage-report-microsoft-defender-antivirus)
|
||||
##### [Deploy and enable Microsoft Defender Antivirus](/microsoft-365/security/defender-endpoint/deploy-microsoft-defender-antivirus)
|
||||
##### [Deployment guide for VDI environments](/microsoft-365/security/defender-endpoint/deployment-vdi-microsoft-defender-antivirus)
|
||||
|
||||
##### [Report on antivirus protection]()
|
||||
##### [Review protection status and alerts](/microsoft-365/security/defender-endpoint/report-monitor-microsoft-defender-antivirus)
|
||||
##### [Troubleshoot antivirus reporting in Update Compliance](/microsoft-365/security/defender-endpoint/troubleshoot-reporting)
|
||||
##### [Learn about the recent updates](/microsoft-365/security/defender-endpoint/manage-updates-baselines-microsoft-defender-antivirus)
|
||||
##### [Manage protection and security intelligence updates](/microsoft-365/security/defender-endpoint/manage-protection-updates-microsoft-defender-antivirus)
|
||||
##### [Manage when protection updates should be downloaded and applied](/microsoft-365/security/defender-endpoint/manage-protection-update-schedule-microsoft-defender-antivirus)
|
||||
##### [Manage updates for endpoints that are out of date](/microsoft-365/security/defender-endpoint/manage-outdated-endpoints-microsoft-defender-antivirus)
|
||||
##### [Manage event-based forced updates](/microsoft-365/security/defender-endpoint/manage-event-based-updates-microsoft-defender-antivirus)
|
||||
##### [Manage updates for mobile devices and VMs](/microsoft-365/security/defender-endpoint/manage-updates-mobile-devices-vms-microsoft-defender-antivirus)
|
||||
|
||||
#### [Customize, initiate, and review the results of scans and remediation]()
|
||||
##### [Configuration overview](/microsoft-365/security/defender-endpoint/customize-run-review-remediate-scans-microsoft-defender-antivirus)
|
||||
|
||||
##### [Configure and validate exclusions in antivirus scans](/microsoft-365/security/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure and validate exclusions based on file name, extension, and folder location](/microsoft-365/security/defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure and validate exclusions for files opened by processes](/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure antivirus exclusions Windows Server](/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus)
|
||||
##### [Common mistakes when defining exclusions](/microsoft-365/security/defender-endpoint/common-exclusion-mistakes-microsoft-defender-antivirus)
|
||||
##### [Configure scanning antivirus options](/microsoft-365/security/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus)
|
||||
##### [Configure remediation for scans](/microsoft-365/security/defender-endpoint/configure-remediation-microsoft-defender-antivirus)
|
||||
##### [Configure scheduled scans](/microsoft-365/security/defender-endpoint/scheduled-catch-up-scans-microsoft-defender-antivirus)
|
||||
##### [Configure and run scans](/microsoft-365/security/defender-endpoint/run-scan-microsoft-defender-antivirus)
|
||||
##### [Review scan results](/microsoft-365/security/defender-endpoint/review-scan-results-microsoft-defender-antivirus)
|
||||
##### [Run and review the results of an offline scan](/microsoft-365/security/defender-endpoint//microsoft-defender-offline)
|
||||
|
||||
#### [Restore quarantined files](/microsoft-365/security/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus)
|
||||
|
||||
#### [Manage scans and remediation]()
|
||||
##### [Management overview](/microsoft-365/security/defender-endpoint/customize-run-review-remediate-scans-microsoft-defender-antivirus)
|
||||
|
||||
##### [Configure and validate exclusions in antivirus scans]()
|
||||
##### [Exclusions overview](/microsoft-365/security/defender-endpoint/configure-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure and validate exclusions based on file name, extension, and folder location](/microsoft-365/security/defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure and validate exclusions for files opened by processes](/microsoft-365/security/defender-endpoint/configure-process-opened-file-exclusions-microsoft-defender-antivirus)
|
||||
##### [Configure antivirus exclusions on Windows Server](/microsoft-365/security/defender-endpoint/configure-server-exclusions-microsoft-defender-antivirus)
|
||||
|
||||
##### [Configure scanning options](/microsoft-365/security/defender-endpoint/configure-advanced-scan-types-microsoft-defender-antivirus)
|
||||
|
||||
#### [Configure remediation for scans](/microsoft-365/security/defender-endpoint/configure-remediation-microsoft-defender-antivirus)
|
||||
##### [Configure scheduled scans](/microsoft-365/security/defender-endpoint/scheduled-catch-up-scans-microsoft-defender-antivirus)
|
||||
##### [Configure and run scans](/microsoft-365/security/defender-endpoint/run-scan-microsoft-defender-antivirus)
|
||||
##### [Review scan results](/microsoft-365/security/defender-endpoint/review-scan-results-microsoft-defender-antivirus)
|
||||
##### [Run and review the results of an offline scan](/microsoft-365/security/defender-endpoint/microsoft-defender-offline)
|
||||
##### [Restore quarantined files](/microsoft-365/security/defender-endpoint/restore-quarantined-files-microsoft-defender-antivirus)
|
||||
|
||||
### [Troubleshoot Microsoft Defender Antivirus]()
|
||||
#### [Troubleshoot Microsoft Defender Antivirus issues](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus)
|
||||
#### [Troubleshoot Microsoft Defender Antivirus migration issues](/microsoft-365/security/defender-endpoint/troubleshoot-microsoft-defender-antivirus-when-migrating)
|
||||
|
||||
## [Better together: Microsoft Defender Antivirus and Microsoft Defender for Endpoint](/microsoft-365/security/defender-endpoint/why-use-microsoft-defender-antivirus)
|
||||
## [Better together: Microsoft Defender Antivirus and Office 365](/microsoft-365/security/defender-endpoint/office-365-microsoft-defender-antivirus)
|
||||
|
||||
## [Hardware-based isolation]()
|
||||
|
||||
### [Hardware-based isolation evaluation](microsoft-defender-application-guard/test-scenarios-md-app-guard.md)
|
||||
|
||||
### [Application isolation]()
|
||||
#### [Application guard overview](microsoft-defender-application-guard/md-app-guard-overview.md)
|
||||
#### [System requirements](microsoft-defender-application-guard/reqs-md-app-guard.md)
|
||||
#### [Install Microsoft Defender Application Guard](microsoft-defender-application-guard/install-md-app-guard.md)
|
||||
#### [Install Microsoft Defender Application Guard Extension](microsoft-defender-application-guard/md-app-guard-browser-extension.md)
|
||||
|
||||
### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||
#### [Audit Application control policies](windows-defender-application-control/audit-windows-defender-application-control-policies.md)
|
||||
|
||||
### [System isolation](windows-defender-system-guard/system-guard-secure-launch-and-smm-protection.md)
|
||||
|
||||
### [System integrity](windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md)
|
||||
|
||||
## [Code integrity](device-guard/enable-virtualization-based-protection-of-code-integrity.md)
|
||||
## [Network firewall]()
|
||||
### [Network firewall overview](windows-firewall/windows-firewall-with-advanced-security.md)
|
||||
### [Network firewall evaluation](windows-firewall/evaluating-windows-firewall-with-advanced-security-design-examples.md)
|
||||
|
||||
## [Security intelligence](intelligence/index.md)
|
||||
### [Understand malware & other threats](intelligence/understanding-malware.md)
|
||||
#### [Prevent malware infection](intelligence/prevent-malware-infection.md)
|
||||
#### [Malware names](intelligence/malware-naming.md)
|
||||
#### [Coin miners](intelligence/coinminer-malware.md)
|
||||
#### [Exploits and exploit kits](intelligence/exploits-malware.md)
|
||||
#### [Fileless threats](intelligence/fileless-threats.md)
|
||||
#### [Macro malware](intelligence/macro-malware.md)
|
||||
#### [Phishing](intelligence/phishing.md)
|
||||
#### [Ransomware](intelligence/ransomware-malware.md)
|
||||
#### [Rootkits](intelligence/rootkits-malware.md)
|
||||
#### [Supply chain attacks](intelligence/supply-chain-malware.md)
|
||||
#### [Tech support scams](intelligence/support-scams.md)
|
||||
#### [Trojans](intelligence/trojans-malware.md)
|
||||
#### [Unwanted software](intelligence/unwanted-software.md)
|
||||
#### [Worms](intelligence/worms-malware.md)
|
||||
### [How Microsoft identifies malware and PUA](intelligence/criteria.md)
|
||||
### [Submit files for analysis](intelligence/submission-guide.md)
|
||||
### [Safety Scanner download](intelligence/safety-scanner-download.md)
|
||||
### [Industry collaboration programs](intelligence/cybersecurity-industry-partners.md)
|
||||
#### [Virus information alliance](intelligence/virus-information-alliance-criteria.md)
|
||||
#### [Microsoft virus initiative](intelligence/virus-initiative-criteria.md)
|
||||
#### [Coordinated malware eradication](intelligence/coordinated-malware-eradication.md)
|
||||
### [Information for developers]()
|
||||
#### [Software developer FAQ](intelligence/developer-faq.md)
|
||||
#### [Software developer resources](intelligence/developer-resources.md)
|
||||
|
||||
## [The Windows Security app](windows-defender-security-center/windows-defender-security-center.md)
|
||||
### [Customize the Windows Security app for your organization](windows-defender-security-center/wdsc-customize-contact-information.md)
|
||||
### [Hide Windows Security app notifications](windows-defender-security-center/wdsc-hide-notifications.md)
|
||||
### [Manage Windows Security app in Windows 10 in S mode](windows-defender-security-center/wdsc-windows-10-in-s-mode.md)
|
||||
### [Virus and threat protection](windows-defender-security-center/wdsc-virus-threat-protection.md)
|
||||
### [Account protection](windows-defender-security-center/wdsc-account-protection.md)
|
||||
### [Firewall and network protection](windows-defender-security-center/wdsc-firewall-network-protection.md)
|
||||
### [App and browser control](windows-defender-security-center/wdsc-app-browser-control.md)
|
||||
### [Device security](windows-defender-security-center/wdsc-device-security.md)
|
||||
### [Device performance and health](windows-defender-security-center/wdsc-device-performance-health.md)
|
||||
#### [Family options](windows-defender-security-center/wdsc-family-options.md)
|
||||
|
||||
## [Microsoft Defender SmartScreen](microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview.md)
|
||||
### [Microsoft Defender SmartScreen Group Policy and mobile device management (MDM) settings](microsoft-defender-smartscreen/microsoft-defender-smartscreen-available-settings.md)
|
||||
### [Set up and use Microsoft Defender SmartScreen on individual devices](microsoft-defender-smartscreen/microsoft-defender-smartscreen-set-individual-device.md)
|
||||
|
||||
|
||||
## [Windows Sandbox](windows-sandbox/windows-sandbox-overview.md)
|
||||
### [Windows Sandbox architecture](windows-sandbox/windows-sandbox-architecture.md)
|
||||
### [Windows Sandbox configuration](windows-sandbox/windows-sandbox-configure-using-wsb-file.md)
|
||||
|
||||
### [Windows Defender Device Guard: virtualization-based security and WDAC](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||
|
||||
|
||||
## Windows Certifications
|
||||
|
||||
### [FIPS 140 Validations](fips-140-validation.md)
|
||||
### [Common Criteria Certifications](windows-platform-common-criteria.md)
|
||||
|
||||
|
||||
## More Windows 10 security
|
||||
### [Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md)
|
||||
|
||||
### [Mitigate threats by using Windows 10 security features](overview-of-threat-mitigations-in-windows-10.md)
|
||||
|
||||
### [Override Process Mitigation Options to help enforce app-related security policies](override-mitigation-options-for-app-related-security-policies.md)
|
||||
|
||||
### [Use Windows Event Forwarding to help with intrusion detection](use-windows-event-forwarding-to-assist-in-intrusion-detection.md)
|
||||
|
||||
### [Block untrusted fonts in an enterprise](block-untrusted-fonts-in-enterprise.md)
|
||||
|
||||
### [Security auditing](auditing/security-auditing-overview.md)
|
||||
|
||||
#### [Basic security audit policies](auditing/basic-security-audit-policies.md)
|
||||
##### [Create a basic audit policy for an event category](auditing/create-a-basic-audit-policy-settings-for-an-event-category.md)
|
||||
##### [Apply a basic audit policy on a file or folder](auditing/apply-a-basic-audit-policy-on-a-file-or-folder.md)
|
||||
##### [View the security event log](auditing/view-the-security-event-log.md)
|
||||
|
||||
##### [Basic security audit policy settings](auditing/basic-security-audit-policy-settings.md)
|
||||
###### [Audit account logon events](auditing/basic-audit-account-logon-events.md)
|
||||
###### [Audit account management](auditing/basic-audit-account-management.md)
|
||||
###### [Audit directory service access](auditing/basic-audit-directory-service-access.md)
|
||||
###### [Audit logon events](auditing/basic-audit-logon-events.md)
|
||||
###### [Audit object access](auditing/basic-audit-object-access.md)
|
||||
###### [Audit policy change](auditing/basic-audit-policy-change.md)
|
||||
###### [Audit privilege use](auditing/basic-audit-privilege-use.md)
|
||||
###### [Audit process tracking](auditing/basic-audit-process-tracking.md)
|
||||
###### [Audit system events](auditing/basic-audit-system-events.md)
|
||||
|
||||
#### [Advanced security audit policies](auditing/advanced-security-auditing.md)
|
||||
##### [Planning and deploying advanced security audit policies](auditing/planning-and-deploying-advanced-security-audit-policies.md)
|
||||
##### [Advanced security auditing FAQ](auditing/advanced-security-auditing-faq.md)
|
||||
###### [Which editions of Windows support advanced audit policy configuration](auditing/which-editions-of-windows-support-advanced-audit-policy-configuration.md)
|
||||
###### [How to list XML elements in \<EventData>](auditing/how-to-list-xml-elements-in-eventdata.md)
|
||||
|
||||
###### [Using advanced security auditing options to monitor dynamic access control objects](auditing/using-advanced-security-auditing-options-to-monitor-dynamic-access-control-objects.md)
|
||||
####### [Monitor the central access policies that apply on a file server](auditing/monitor-the-central-access-policies-that-apply-on-a-file-server.md)
|
||||
####### [Monitor the use of removable storage devices](auditing/monitor-the-use-of-removable-storage-devices.md)
|
||||
####### [Monitor resource attribute definitions](auditing/monitor-resource-attribute-definitions.md)
|
||||
####### [Monitor central access policy and rule definitions](auditing/monitor-central-access-policy-and-rule-definitions.md)
|
||||
####### [Monitor user and device claims during sign-in](auditing/monitor-user-and-device-claims-during-sign-in.md)
|
||||
####### [Monitor the resource attributes on files and folders](auditing/monitor-the-resource-attributes-on-files-and-folders.md)
|
||||
####### [Monitor the central access policies associated with files and folders](auditing/monitor-the-central-access-policies-associated-with-files-and-folders.md)
|
||||
####### [Monitor claim types](auditing/monitor-claim-types.md)
|
||||
|
||||
###### [Advanced security audit policy settings](auditing/advanced-security-audit-policy-settings.md)
|
||||
####### [Audit Credential Validation](auditing/audit-credential-validation.md)
|
||||
####### [Event 4774 S, F: An account was mapped for logon.](auditing/event-4774.md)
|
||||
####### [Event 4775 F: An account could not be mapped for logon.](auditing/event-4775.md)
|
||||
####### [Event 4776 S, F: The computer attempted to validate the credentials for an account.](auditing/event-4776.md)
|
||||
####### [Event 4777 F: The domain controller failed to validate the credentials for an account.](auditing/event-4777.md)
|
||||
###### [Audit Kerberos Authentication Service](auditing/audit-kerberos-authentication-service.md)
|
||||
####### [Event 4768 S, F: A Kerberos authentication ticket, TGT, was requested.](auditing/event-4768.md)
|
||||
####### [Event 4771 F: Kerberos pre-authentication failed.](auditing/event-4771.md)
|
||||
####### [Event 4772 F: A Kerberos authentication ticket request failed.](auditing/event-4772.md)
|
||||
###### [Audit Kerberos Service Ticket Operations](auditing/audit-kerberos-service-ticket-operations.md)
|
||||
####### [Event 4769 S, F: A Kerberos service ticket was requested.](auditing/event-4769.md)
|
||||
####### [Event 4770 S: A Kerberos service ticket was renewed.](auditing/event-4770.md)
|
||||
####### [Event 4773 F: A Kerberos service ticket request failed.](auditing/event-4773.md)
|
||||
###### [Audit Other Account Logon Events](auditing/audit-other-account-logon-events.md)
|
||||
###### [Audit Application Group Management](auditing/audit-application-group-management.md)
|
||||
###### [Audit Computer Account Management](auditing/audit-computer-account-management.md)
|
||||
####### [Event 4741 S: A computer account was created.](auditing/event-4741.md)
|
||||
####### [Event 4742 S: A computer account was changed.](auditing/event-4742.md)
|
||||
####### [Event 4743 S: A computer account was deleted.](auditing/event-4743.md)
|
||||
###### [Audit Distribution Group Management](auditing/audit-distribution-group-management.md)
|
||||
####### [Event 4749 S: A security-disabled global group was created.](auditing/event-4749.md)
|
||||
####### [Event 4750 S: A security-disabled global group was changed.](auditing/event-4750.md)
|
||||
####### [Event 4751 S: A member was added to a security-disabled global group.](auditing/event-4751.md)
|
||||
####### [Event 4752 S: A member was removed from a security-disabled global group.](auditing/event-4752.md)
|
||||
####### [Event 4753 S: A security-disabled global group was deleted.](auditing/event-4753.md)
|
||||
###### [Audit Other Account Management Events](auditing/audit-other-account-management-events.md)
|
||||
####### [Event 4782 S: The password hash of an account was accessed.](auditing/event-4782.md)
|
||||
####### [Event 4793 S: The Password Policy Checking API was called.](auditing/event-4793.md)
|
||||
###### [Audit Security Group Management](auditing/audit-security-group-management.md)
|
||||
####### [Event 4731 S: A security-enabled local group was created.](auditing/event-4731.md)
|
||||
####### [Event 4732 S: A member was added to a security-enabled local group.](auditing/event-4732.md)
|
||||
####### [Event 4733 S: A member was removed from a security-enabled local group.](auditing/event-4733.md)
|
||||
####### [Event 4734 S: A security-enabled local group was deleted.](auditing/event-4734.md)
|
||||
####### [Event 4735 S: A security-enabled local group was changed.](auditing/event-4735.md)
|
||||
####### [Event 4764 S: A group<75>s type was changed.](auditing/event-4764.md)
|
||||
####### [Event 4799 S: A security-enabled local group membership was enumerated.](auditing/event-4799.md)
|
||||
###### [Audit User Account Management](auditing/audit-user-account-management.md)
|
||||
####### [Event 4720 S: A user account was created.](auditing/event-4720.md)
|
||||
####### [Event 4722 S: A user account was enabled.](auditing/event-4722.md)
|
||||
####### [Event 4723 S, F: An attempt was made to change an account's password.](auditing/event-4723.md)
|
||||
####### [Event 4724 S, F: An attempt was made to reset an account's password.](auditing/event-4724.md)
|
||||
####### [Event 4725 S: A user account was disabled.](auditing/event-4725.md)
|
||||
####### [Event 4726 S: A user account was deleted.](auditing/event-4726.md)
|
||||
####### [Event 4738 S: A user account was changed.](auditing/event-4738.md)
|
||||
####### [Event 4740 S: A user account was locked out.](auditing/event-4740.md)
|
||||
####### [Event 4765 S: SID History was added to an account.](auditing/event-4765.md)
|
||||
####### [Event 4766 F: An attempt to add SID History to an account failed.](auditing/event-4766.md)
|
||||
####### [Event 4767 S: A user account was unlocked.](auditing/event-4767.md)
|
||||
####### [Event 4780 S: The ACL was set on accounts that are members of administrators groups.](auditing/event-4780.md)
|
||||
####### [Event 4781 S: The name of an account was changed.](auditing/event-4781.md)
|
||||
####### [Event 4794 S, F: An attempt was made to set the Directory Services Restore Mode administrator password.](auditing/event-4794.md)
|
||||
####### [Event 4798 S: A user's local group membership was enumerated.](auditing/event-4798.md)
|
||||
####### [Event 5376 S: Credential Manager credentials were backed up.](auditing/event-5376.md)
|
||||
####### [Event 5377 S: Credential Manager credentials were restored from a backup.](auditing/event-5377.md)
|
||||
###### [Audit DPAPI Activity](auditing/audit-dpapi-activity.md)
|
||||
####### [Event 4692 S, F: Backup of data protection master key was attempted.](auditing/event-4692.md)
|
||||
####### [Event 4693 S, F: Recovery of data protection master key was attempted.](auditing/event-4693.md)
|
||||
####### [Event 4694 S, F: Protection of auditable protected data was attempted.](auditing/event-4694.md)
|
||||
####### [Event 4695 S, F: Unprotection of auditable protected data was attempted.](auditing/event-4695.md)
|
||||
###### [Audit PNP Activity](auditing/audit-pnp-activity.md)
|
||||
####### [Event 6416 S: A new external device was recognized by the System.](auditing/event-6416.md)
|
||||
####### [Event 6419 S: A request was made to disable a device.](auditing/event-6419.md)
|
||||
####### [Event 6420 S: A device was disabled.](auditing/event-6420.md)
|
||||
####### [Event 6421 S: A request was made to enable a device.](auditing/event-6421.md)
|
||||
####### [Event 6422 S: A device was enabled.](auditing/event-6422.md)
|
||||
####### [Event 6423 S: The installation of this device is forbidden by system policy.](auditing/event-6423.md)
|
||||
####### [Event 6424 S: The installation of this device was allowed, after having previously been forbidden by policy.](auditing/event-6424.md)
|
||||
###### [Audit Process Creation](auditing/audit-process-creation.md)
|
||||
####### [Event 4688 S: A new process has been created.](auditing/event-4688.md)
|
||||
####### [Event 4696 S: A primary token was assigned to process.](auditing/event-4696.md)
|
||||
###### [Audit Process Termination](auditing/audit-process-termination.md)
|
||||
####### [Event 4689 S: A process has exited.](auditing/event-4689.md)
|
||||
###### [Audit RPC Events](auditing/audit-rpc-events.md)
|
||||
####### [Event 5712 S: A Remote Procedure Call, RPC, was attempted.](auditing/event-5712.md)
|
||||
###### [Audit Token Right Adjusted](auditing/audit-token-right-adjusted.md)
|
||||
####### [Event 4703 S: A user right was adjusted.](auditing/event-4703.md)
|
||||
###### [Audit Detailed Directory Service Replication](auditing/audit-detailed-directory-service-replication.md)
|
||||
####### [Event 4928 S, F: An Active Directory replica source naming context was established.](auditing/event-4928.md)
|
||||
####### [Event 4929 S, F: An Active Directory replica source naming context was removed.](auditing/event-4929.md)
|
||||
####### [Event 4930 S, F: An Active Directory replica source naming context was modified.](auditing/event-4930.md)
|
||||
####### [Event 4931 S, F: An Active Directory replica destination naming context was modified.](auditing/event-4931.md)
|
||||
####### [Event 4934 S: Attributes of an Active Directory object were replicated.](auditing/event-4934.md)
|
||||
####### [Event 4935 F: Replication failure begins.](auditing/event-4935.md)
|
||||
####### [Event 4936 S: Replication failure ends.](auditing/event-4936.md)
|
||||
####### [Event 4937 S: A lingering object was removed from a replica.](auditing/event-4937.md)
|
||||
###### [Audit Directory Service Access](auditing/audit-directory-service-access.md)
|
||||
####### [Event 4662 S, F: An operation was performed on an object.](auditing/event-4662.md)
|
||||
####### [Event 4661 S, F: A handle to an object was requested.](auditing/event-4661.md)
|
||||
###### [Audit Directory Service Changes](auditing/audit-directory-service-changes.md)
|
||||
####### [Event 5136 S: A directory service object was modified.](auditing/event-5136.md)
|
||||
####### [Event 5137 S: A directory service object was created.](auditing/event-5137.md)
|
||||
####### [Event 5138 S: A directory service object was undeleted.](auditing/event-5138.md)
|
||||
####### [Event 5139 S: A directory service object was moved.](auditing/event-5139.md)
|
||||
####### [Event 5141 S: A directory service object was deleted.](auditing/event-5141.md)
|
||||
###### [Audit Directory Service Replication](auditing/audit-directory-service-replication.md)
|
||||
####### [Event 4932 S: Synchronization of a replica of an Active Directory naming context has begun.](auditing/event-4932.md)
|
||||
####### [Event 4933 S, F: Synchronization of a replica of an Active Directory naming context has ended.](auditing/event-4933.md)
|
||||
###### [Audit Account Lockout](auditing/audit-account-lockout.md)
|
||||
####### [Event 4625 F: An account failed to log on.](auditing/event-4625.md)
|
||||
###### [Audit User/Device Claims](auditing/audit-user-device-claims.md)
|
||||
####### [Event 4626 S: User/Device claims information.](auditing/event-4626.md)
|
||||
###### [Audit Group Membership](auditing/audit-group-membership.md)
|
||||
####### [Event 4627 S: Group membership information.](auditing/event-4627.md)
|
||||
###### [Audit IPsec Extended Mode](auditing/audit-ipsec-extended-mode.md)
|
||||
###### [Audit IPsec Main Mode](auditing/audit-ipsec-main-mode.md)
|
||||
###### [Audit IPsec Quick Mode](auditing/audit-ipsec-quick-mode.md)
|
||||
###### [Audit Logoff](auditing/audit-logoff.md)
|
||||
####### [Event 4634 S: An account was logged off.](auditing/event-4634.md)
|
||||
####### [Event 4647 S: User initiated logoff.](auditing/event-4647.md)
|
||||
###### [Audit Logon](auditing/audit-logon.md)
|
||||
####### [Event 4624 S: An account was successfully logged on.](auditing/event-4624.md)
|
||||
####### [Event 4625 F: An account failed to log on.](auditing/event-4625.md)
|
||||
####### [Event 4648 S: A logon was attempted using explicit credentials.](auditing/event-4648.md)
|
||||
####### [Event 4675 S: SIDs were filtered.](auditing/event-4675.md)
|
||||
###### [Audit Network Policy Server](auditing/audit-network-policy-server.md)
|
||||
###### [Audit Other Logon/Logoff Events](auditing/audit-other-logonlogoff-events.md)
|
||||
####### [Event 4649 S: A replay attack was detected.](auditing/event-4649.md)
|
||||
####### [Event 4778 S: A session was reconnected to a Window Station.](auditing/event-4778.md)
|
||||
####### [Event 4779 S: A session was disconnected from a Window Station.](auditing/event-4779.md)
|
||||
####### [Event 4800 S: The workstation was locked.](auditing/event-4800.md)
|
||||
####### [Event 4801 S: The workstation was unlocked.](auditing/event-4801.md)
|
||||
####### [Event 4802 S: The screen saver was invoked.](auditing/event-4802.md)
|
||||
####### [Event 4803 S: The screen saver was dismissed.](auditing/event-4803.md)
|
||||
####### [Event 5378 F: The requested credentials delegation was disallowed by policy.](auditing/event-5378.md)
|
||||
####### [Event 5632 S, F: A request was made to authenticate to a wireless network.](auditing/event-5632.md)
|
||||
####### [Event 5633 S, F: A request was made to authenticate to a wired network.](auditing/event-5633.md)
|
||||
###### [Audit Special Logon](auditing/audit-special-logon.md)
|
||||
####### [Event 4964 S: Special groups have been assigned to a new logon.](auditing/event-4964.md)
|
||||
####### [Event 4672 S: Special privileges assigned to new logon.](auditing/event-4672.md)
|
||||
###### [Audit Application Generated](auditing/audit-application-generated.md)
|
||||
###### [Audit Certification Services](auditing/audit-certification-services.md)
|
||||
###### [Audit Detailed File Share](auditing/audit-detailed-file-share.md)
|
||||
####### [Event 5145 S, F: A network share object was checked to see whether client can be granted desired access.](auditing/event-5145.md)
|
||||
###### [Audit File Share](auditing/audit-file-share.md)
|
||||
####### [Event 5140 S, F: A network share object was accessed.](auditing/event-5140.md)
|
||||
####### [Event 5142 S: A network share object was added.](auditing/event-5142.md)
|
||||
####### [Event 5143 S: A network share object was modified.](auditing/event-5143.md)
|
||||
####### [Event 5144 S: A network share object was deleted.](auditing/event-5144.md)
|
||||
####### [Event 5168 F: SPN check for SMB/SMB2 failed.](auditing/event-5168.md)
|
||||
###### [Audit File System](auditing/audit-file-system.md)
|
||||
####### [Event 4656 S, F: A handle to an object was requested.](auditing/event-4656.md)
|
||||
####### [Event 4658 S: The handle to an object was closed.](auditing/event-4658.md)
|
||||
####### [Event 4660 S: An object was deleted.](auditing/event-4660.md)
|
||||
####### [Event 4663 S: An attempt was made to access an object.](auditing/event-4663.md)
|
||||
####### [Event 4664 S: An attempt was made to create a hard link.](auditing/event-4664.md)
|
||||
####### [Event 4985 S: The state of a transaction has changed.](auditing/event-4985.md)
|
||||
####### [Event 5051: A file was virtualized.](auditing/event-5051.md)
|
||||
####### [Event 4670 S: Permissions on an object were changed.](auditing/event-4670.md)
|
||||
###### [Audit Filtering Platform Connection](auditing/audit-filtering-platform-connection.md)
|
||||
####### [Event 5031 F: The Windows Firewall Service blocked an application from accepting incoming connections on the network.](auditing/event-5031.md)
|
||||
####### [Event 5150: The Windows Filtering Platform blocked a packet.](auditing/event-5150.md)
|
||||
####### [Event 5151: A more restrictive Windows Filtering Platform filter has blocked a packet.](auditing/event-5151.md)
|
||||
####### [Event 5154 S: The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.](auditing/event-5154.md)
|
||||
####### [Event 5155 F: The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.](auditing/event-5155.md)
|
||||
####### [Event 5156 S: The Windows Filtering Platform has permitted a connection.](auditing/event-5156.md)
|
||||
####### [Event 5157 F: The Windows Filtering Platform has blocked a connection.](auditing/event-5157.md)
|
||||
####### [Event 5158 S: The Windows Filtering Platform has permitted a bind to a local port.](auditing/event-5158.md)
|
||||
####### [Event 5159 F: The Windows Filtering Platform has blocked a bind to a local port.](auditing/event-5159.md)
|
||||
###### [Audit Filtering Platform Packet Drop](auditing/audit-filtering-platform-packet-drop.md)
|
||||
####### [Event 5152 F: The Windows Filtering Platform blocked a packet.](auditing/event-5152.md)
|
||||
####### [Event 5153 S: A more restrictive Windows Filtering Platform filter has blocked a packet.](auditing/event-5153.md)
|
||||
###### [Audit Handle Manipulation](auditing/audit-handle-manipulation.md)
|
||||
####### [Event 4690 S: An attempt was made to duplicate a handle to an object.](auditing/event-4690.md)
|
||||
###### [Audit Kernel Object](auditing/audit-kernel-object.md)
|
||||
####### [Event 4656 S, F: A handle to an object was requested.](auditing/event-4656.md)
|
||||
####### [Event 4658 S: The handle to an object was closed.](auditing/event-4658.md)
|
||||
####### [Event 4660 S: An object was deleted.](auditing/event-4660.md)
|
||||
####### [Event 4663 S: An attempt was made to access an object.](auditing/event-4663.md)
|
||||
###### [Audit Other Object Access Events](auditing/audit-other-object-access-events.md)
|
||||
####### [Event 4671: An application attempted to access a blocked ordinal through the TBS.](auditing/event-4671.md)
|
||||
####### [Event 4691 S: Indirect access to an object was requested.](auditing/event-4691.md)
|
||||
####### [Event 5148 F: The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.](auditing/event-5148.md)
|
||||
####### [Event 5149 F: The DoS attack has subsided and normal processing is being resumed.](auditing/event-5149.md)
|
||||
####### [Event 4698 S: A scheduled task was created.](auditing/event-4698.md)
|
||||
####### [Event 4699 S: A scheduled task was deleted.](auditing/event-4699.md)
|
||||
####### [Event 4700 S: A scheduled task was enabled.](auditing/event-4700.md)
|
||||
####### [Event 4701 S: A scheduled task was disabled.](auditing/event-4701.md)
|
||||
####### [Event 4702 S: A scheduled task was updated.](auditing/event-4702.md)
|
||||
####### [Event 5888 S: An object in the COM+ Catalog was modified.](auditing/event-5888.md)
|
||||
####### [Event 5889 S: An object was deleted from the COM+ Catalog.](auditing/event-5889.md)
|
||||
####### [Event 5890 S: An object was added to the COM+ Catalog.](auditing/event-5890.md)
|
||||
###### [Audit Registry](auditing/audit-registry.md)
|
||||
####### [Event 4663 S: An attempt was made to access an object.](auditing/event-4663.md)
|
||||
####### [Event 4656 S, F: A handle to an object was requested.](auditing/event-4656.md)
|
||||
####### [Event 4658 S: The handle to an object was closed.](auditing/event-4658.md)
|
||||
####### [Event 4660 S: An object was deleted.](auditing/event-4660.md)
|
||||
####### [Event 4657 S: A registry value was modified.](auditing/event-4657.md)
|
||||
####### [Event 5039: A registry key was virtualized.](auditing/event-5039.md)
|
||||
####### [Event 4670 S: Permissions on an object were changed.](auditing/event-4670.md)
|
||||
###### [Audit Removable Storage](auditing/audit-removable-storage.md)
|
||||
###### [Audit SAM](auditing/audit-sam.md)
|
||||
####### [Event 4661 S, F: A handle to an object was requested.](auditing/event-4661.md)
|
||||
###### [Audit Central Access Policy Staging](auditing/audit-central-access-policy-staging.md)
|
||||
####### [Event 4818 S: Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.](auditing/event-4818.md)
|
||||
###### [Audit Audit Policy Change](auditing/audit-audit-policy-change.md)
|
||||
####### [Event 4670 S: Permissions on an object were changed.](auditing/event-4670.md)
|
||||
####### [Event 4715 S: The audit policy, SACL, on an object was changed.](auditing/event-4715.md)
|
||||
####### [Event 4719 S: System audit policy was changed.](auditing/event-4719.md)
|
||||
####### [Event 4817 S: Auditing settings on object were changed.](auditing/event-4817.md)
|
||||
####### [Event 4902 S: The Per-user audit policy table was created.](auditing/event-4902.md)
|
||||
####### [Event 4906 S: The CrashOnAuditFail value has changed.](auditing/event-4906.md)
|
||||
####### [Event 4907 S: Auditing settings on object were changed.](auditing/event-4907.md)
|
||||
####### [Event 4908 S: Special Groups Logon table modified.](auditing/event-4908.md)
|
||||
####### [Event 4912 S: Per User Audit Policy was changed.](auditing/event-4912.md)
|
||||
####### [Event 4904 S: An attempt was made to register a security event source.](auditing/event-4904.md)
|
||||
####### [Event 4905 S: An attempt was made to unregister a security event source.](auditing/event-4905.md)
|
||||
###### [Audit Authentication Policy Change](auditing/audit-authentication-policy-change.md)
|
||||
####### [Event 4706 S: A new trust was created to a domain.](auditing/event-4706.md)
|
||||
####### [Event 4707 S: A trust to a domain was removed.](auditing/event-4707.md)
|
||||
####### [Event 4716 S: Trusted domain information was modified.](auditing/event-4716.md)
|
||||
####### [Event 4713 S: Kerberos policy was changed.](auditing/event-4713.md)
|
||||
####### [Event 4717 S: System security access was granted to an account.](auditing/event-4717.md)
|
||||
####### [Event 4718 S: System security access was removed from an account.](auditing/event-4718.md)
|
||||
####### [Event 4739 S: Domain Policy was changed.](auditing/event-4739.md)
|
||||
####### [Event 4864 S: A namespace collision was detected.](auditing/event-4864.md)
|
||||
####### [Event 4865 S: A trusted forest information entry was added.](auditing/event-4865.md)
|
||||
####### [Event 4866 S: A trusted forest information entry was removed.](auditing/event-4866.md)
|
||||
####### [Event 4867 S: A trusted forest information entry was modified.](auditing/event-4867.md)
|
||||
###### [Audit Authorization Policy Change](auditing/audit-authorization-policy-change.md)
|
||||
####### [Event 4703 S: A user right was adjusted.](auditing/event-4703.md)
|
||||
####### [Event 4704 S: A user right was assigned.](auditing/event-4704.md)
|
||||
####### [Event 4705 S: A user right was removed.](auditing/event-4705.md)
|
||||
####### [Event 4670 S: Permissions on an object were changed.](auditing/event-4670.md)
|
||||
####### [Event 4911 S: Resource attributes of the object were changed.](auditing/event-4911.md)
|
||||
####### [Event 4913 S: Central Access Policy on the object was changed.](auditing/event-4913.md)
|
||||
###### [Audit Filtering Platform Policy Change](auditing/audit-filtering-platform-policy-change.md)
|
||||
###### [Audit MPSSVC Rule-Level Policy Change](auditing/audit-mpssvc-rule-level-policy-change.md)
|
||||
####### [Event 4944 S: The following policy was active when the Windows Firewall started.](auditing/event-4944.md)
|
||||
####### [Event 4945 S: A rule was listed when the Windows Firewall started.](auditing/event-4945.md)
|
||||
####### [Event 4946 S: A change has been made to Windows Firewall exception list. A rule was added.](auditing/event-4946.md)
|
||||
####### [Event 4947 S: A change has been made to Windows Firewall exception list. A rule was modified.](auditing/event-4947.md)
|
||||
####### [Event 4948 S: A change has been made to Windows Firewall exception list. A rule was deleted.](auditing/event-4948.md)
|
||||
####### [Event 4949 S: Windows Firewall settings were restored to the default values.](auditing/event-4949.md)
|
||||
####### [Event 4950 S: A Windows Firewall setting has changed.](auditing/event-4950.md)
|
||||
####### [Event 4951 F: A rule has been ignored because its major version number was not recognized by Windows Firewall.](auditing/event-4951.md)
|
||||
####### [Event 4952 F: Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.](auditing/event-4952.md)
|
||||
####### [Event 4953 F: Windows Firewall ignored a rule because it could not be parsed.](auditing/event-4953.md)
|
||||
####### [Event 4954 S: Windows Firewall Group Policy settings have changed. The new settings have been applied.](auditing/event-4954.md)
|
||||
####### [Event 4956 S: Windows Firewall has changed the active profile.](auditing/event-4956.md)
|
||||
####### [Event 4957 F: Windows Firewall did not apply the following rule.](auditing/event-4957.md)
|
||||
####### [Event 4958 F: Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer.](auditing/event-4958.md)
|
||||
###### [Audit Other Policy Change Events](auditing/audit-other-policy-change-events.md)
|
||||
####### [Event 4714 S: Encrypted data recovery policy was changed.](auditing/event-4714.md)
|
||||
####### [Event 4819 S: Central Access Policies on the machine have been changed.](auditing/event-4819.md)
|
||||
####### [Event 4826 S: Boot Configuration Data loaded.](auditing/event-4826.md)
|
||||
####### [Event 4909: The local policy settings for the TBS were changed.](auditing/event-4909.md)
|
||||
####### [Event 4910: The group policy settings for the TBS were changed.](auditing/event-4910.md)
|
||||
####### [Event 5063 S, F: A cryptographic provider operation was attempted.](auditing/event-5063.md)
|
||||
####### [Event 5064 S, F: A cryptographic context operation was attempted.](auditing/event-5064.md)
|
||||
####### [Event 5065 S, F: A cryptographic context modification was attempted.](auditing/event-5065.md)
|
||||
####### [Event 5066 S, F: A cryptographic function operation was attempted.](auditing/event-5066.md)
|
||||
####### [Event 5067 S, F: A cryptographic function modification was attempted.](auditing/event-5067.md)
|
||||
####### [Event 5068 S, F: A cryptographic function provider operation was attempted.](auditing/event-5068.md)
|
||||
####### [Event 5069 S, F: A cryptographic function property operation was attempted.](auditing/event-5069.md)
|
||||
####### [Event 5070 S, F: A cryptographic function property modification was attempted.](auditing/event-5070.md)
|
||||
####### [Event 5447 S: A Windows Filtering Platform filter has been changed.](auditing/event-5447.md)
|
||||
####### [Event 6144 S: Security policy in the group policy objects has been applied successfully.](auditing/event-6144.md)
|
||||
####### [Event 6145 F: One or more errors occurred while processing security policy in the group policy objects.](auditing/event-6145.md)
|
||||
###### [Audit Sensitive Privilege Use](auditing/audit-sensitive-privilege-use.md)
|
||||
####### [Event 4673 S, F: A privileged service was called.](auditing/event-4673.md)
|
||||
####### [Event 4674 S, F: An operation was attempted on a privileged object.](auditing/event-4674.md)
|
||||
####### [Event 4985 S: The state of a transaction has changed.](auditing/event-4985.md)
|
||||
###### [Audit Non Sensitive Privilege Use](auditing/audit-non-sensitive-privilege-use.md)
|
||||
####### [Event 4673 S, F: A privileged service was called.](auditing/event-4673.md)
|
||||
####### [Event 4674 S, F: An operation was attempted on a privileged object.](auditing/event-4674.md)
|
||||
####### [Event 4985 S: The state of a transaction has changed.](auditing/event-4985.md)
|
||||
###### [Audit Other Privilege Use Events](auditing/audit-other-privilege-use-events.md)
|
||||
####### [Event 4985 S: The state of a transaction has changed.](auditing/event-4985.md)
|
||||
###### [Audit IPsec Driver](auditing/audit-ipsec-driver.md)
|
||||
###### [Audit Other System Events](auditing/audit-other-system-events.md)
|
||||
####### [Event 5024 S: The Windows Firewall Service has started successfully.](auditing/event-5024.md)
|
||||
####### [Event 5025 S: The Windows Firewall Service has been stopped.](auditing/event-5025.md)
|
||||
####### [Event 5027 F: The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.](auditing/event-5027.md)
|
||||
####### [Event 5028 F: The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.](auditing/event-5028.md)
|
||||
####### [Event 5029 F: The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.](auditing/event-5029.md)
|
||||
####### [Event 5030 F: The Windows Firewall Service failed to start.](auditing/event-5030.md)
|
||||
####### [Event 5032 F: Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.](auditing/event-5032.md)
|
||||
####### [Event 5033 S: The Windows Firewall Driver has started successfully.](auditing/event-5033.md)
|
||||
####### [Event 5034 S: The Windows Firewall Driver was stopped.](auditing/event-5034.md)
|
||||
####### [Event 5035 F: The Windows Firewall Driver failed to start.](auditing/event-5035.md)
|
||||
####### [Event 5037 F: The Windows Firewall Driver detected critical runtime error. Terminating.](auditing/event-5037.md)
|
||||
####### [Event 5058 S, F: Key file operation.](auditing/event-5058.md)
|
||||
####### [Event 5059 S, F: Key migration operation.](auditing/event-5059.md)
|
||||
####### [Event 6400: BranchCache: Received an incorrectly formatted response while discovering availability of content.](auditing/event-6400.md)
|
||||
####### [Event 6401: BranchCache: Received invalid data from a peer. Data discarded.](auditing/event-6401.md)
|
||||
####### [Event 6402: BranchCache: The message to the hosted cache offering it data is incorrectly formatted.](auditing/event-6402.md)
|
||||
####### [Event 6403: BranchCache: The hosted cache sent an incorrectly formatted response to the client.](auditing/event-6403.md)
|
||||
####### [Event 6404: BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.](auditing/event-6404.md)
|
||||
####### [Event 6405: BranchCache: %2 instances of event id %1 occurred.](auditing/event-6405.md)
|
||||
####### [Event 6406: %1 registered to Windows Firewall to control filtering for the following: %2.](auditing/event-6406.md)
|
||||
####### [Event 6407: 1%.](auditing/event-6407.md)
|
||||
####### [Event 6408: Registered product %1 failed and Windows Firewall is now controlling the filtering for %2.](auditing/event-6408.md)
|
||||
####### [Event 6409: BranchCache: A service connection point object could not be parsed.](auditing/event-6409.md)
|
||||
###### [Audit Security State Change](auditing/audit-security-state-change.md)
|
||||
####### [Event 4608 S: Windows is starting up.](auditing/event-4608.md)
|
||||
####### [Event 4616 S: The system time was changed.](auditing/event-4616.md)
|
||||
####### [Event 4621 S: Administrator recovered system from CrashOnAuditFail.](auditing/event-4621.md)
|
||||
###### [Audit Security System Extension](auditing/audit-security-system-extension.md)
|
||||
####### [Event 4610 S: An authentication package has been loaded by the Local Security Authority.](auditing/event-4610.md)
|
||||
####### [Event 4611 S: A trusted logon process has been registered with the Local Security Authority.](auditing/event-4611.md)
|
||||
####### [Event 4614 S: A notification package has been loaded by the Security Account Manager.](auditing/event-4614.md)
|
||||
####### [Event 4622 S: A security package has been loaded by the Local Security Authority.](auditing/event-4622.md)
|
||||
####### [Event 4697 S: A service was installed in the system.](auditing/event-4697.md)
|
||||
###### [Audit System Integrity](auditing/audit-system-integrity.md)
|
||||
####### [Event 4612 S: Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.](auditing/event-4612.md)
|
||||
####### [Event 4615 S: Invalid use of LPC port.](auditing/event-4615.md)
|
||||
####### [Event 4618 S: A monitored security event pattern has occurred.](auditing/event-4618.md)
|
||||
####### [Event 4816 S: RPC detected an integrity violation while decrypting an incoming message.](auditing/event-4816.md)
|
||||
####### [Event 5038 F: Code integrity determined that the image hash of a file is not valid.](auditing/event-5038.md)
|
||||
####### [Event 5056 S: A cryptographic self-test was performed.](auditing/event-5056.md)
|
||||
####### [Event 5062 S: A kernel-mode cryptographic self-test was performed.](auditing/event-5062.md)
|
||||
####### [Event 5057 F: A cryptographic primitive operation failed.](auditing/event-5057.md)
|
||||
####### [Event 5060 F: Verification operation failed.](auditing/event-5060.md)
|
||||
####### [Event 5061 S, F: Cryptographic operation.](auditing/event-5061.md)
|
||||
####### [Event 6281 F: Code Integrity determined that the page hashes of an image file are not valid.](auditing/event-6281.md)
|
||||
####### [Event 6410 F: Code integrity determined that a file does not meet the security requirements to load into a process.](auditing/event-6410.md)
|
||||
###### [Other Events](auditing/other-events.md)
|
||||
####### [Event 1100 S: The event logging service has shut down.](auditing/event-1100.md)
|
||||
####### [Event 1102 S: The audit log was cleared.](auditing/event-1102.md)
|
||||
####### [Event 1104 S: The security log is now full.](auditing/event-1104.md)
|
||||
####### [Event 1105 S: Event log automatic backup.](auditing/event-1105.md)
|
||||
####### [Event 1108 S: The event logging service encountered an error while processing an incoming event published from %1.](auditing/event-1108.md)
|
||||
###### [Appendix A: Security monitoring recommendations for many audit events](auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md)
|
||||
###### [Registry (Global Object Access Auditing)](auditing/registry-global-object-access-auditing.md)
|
||||
###### [File System (Global Object Access Auditing)](auditing/file-system-global-object-access-auditing.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
### [Security policy settings](security-policy-settings/security-policy-settings.md)
|
||||
#### [Administer security policy settings](security-policy-settings/administer-security-policy-settings.md)
|
||||
##### [Network List Manager policies](security-policy-settings/network-list-manager-policies.md)
|
||||
#### [Configure security policy settings](security-policy-settings/how-to-configure-security-policy-settings.md)
|
||||
#### [Security policy settings reference](security-policy-settings/security-policy-settings-reference.md)
|
||||
##### [Account Policies](security-policy-settings/account-policies.md)
|
||||
###### [Password Policy](security-policy-settings/password-policy.md)
|
||||
####### [Enforce password history](security-policy-settings/enforce-password-history.md)
|
||||
####### [Maximum password age](security-policy-settings/maximum-password-age.md)
|
||||
####### [Minimum password age](security-policy-settings/minimum-password-age.md)
|
||||
####### [Minimum password length](security-policy-settings/minimum-password-length.md)
|
||||
####### [Password must meet complexity requirements](security-policy-settings/password-must-meet-complexity-requirements.md)
|
||||
####### [Store passwords using reversible encryption](security-policy-settings/store-passwords-using-reversible-encryption.md)
|
||||
###### [Account Lockout Policy](security-policy-settings/account-lockout-policy.md)
|
||||
####### [Account lockout duration](security-policy-settings/account-lockout-duration.md)
|
||||
####### [Account lockout threshold](security-policy-settings/account-lockout-threshold.md)
|
||||
####### [Reset account lockout counter after](security-policy-settings/reset-account-lockout-counter-after.md)
|
||||
###### [Kerberos Policy](security-policy-settings/kerberos-policy.md)
|
||||
####### [Enforce user logon restrictions](security-policy-settings/enforce-user-logon-restrictions.md)
|
||||
####### [Maximum lifetime for service ticket](security-policy-settings/maximum-lifetime-for-service-ticket.md)
|
||||
####### [Maximum lifetime for user ticket](security-policy-settings/maximum-lifetime-for-user-ticket.md)
|
||||
####### [Maximum lifetime for user ticket renewal](security-policy-settings/maximum-lifetime-for-user-ticket-renewal.md)
|
||||
####### [Maximum tolerance for computer clock synchronization](security-policy-settings/maximum-tolerance-for-computer-clock-synchronization.md)
|
||||
##### [Audit Policy](security-policy-settings/audit-policy.md)
|
||||
##### [Security Options](security-policy-settings/security-options.md)
|
||||
###### [Accounts: Administrator account status](security-policy-settings/accounts-administrator-account-status.md)
|
||||
###### [Accounts: Block Microsoft accounts](security-policy-settings/accounts-block-microsoft-accounts.md)
|
||||
###### [Accounts: Guest account status](security-policy-settings/accounts-guest-account-status.md)
|
||||
###### [Accounts: Limit local account use of blank passwords to console logon only](security-policy-settings/accounts-limit-local-account-use-of-blank-passwords-to-console-logon-only.md)
|
||||
###### [Accounts: Rename administrator account](security-policy-settings/accounts-rename-administrator-account.md)
|
||||
###### [Accounts: Rename guest account](security-policy-settings/accounts-rename-guest-account.md)
|
||||
###### [Audit: Audit the access of global system objects](security-policy-settings/audit-audit-the-access-of-global-system-objects.md)
|
||||
###### [Audit: Audit the use of Backup and Restore privilege](security-policy-settings/audit-audit-the-use-of-backup-and-restore-privilege.md)
|
||||
###### [Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings](security-policy-settings/audit-force-audit-policy-subcategory-settings-to-override.md)
|
||||
###### [Audit: Shut down system immediately if unable to log security audits](security-policy-settings/audit-shut-down-system-immediately-if-unable-to-log-security-audits.md)
|
||||
###### [DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax](security-policy-settings/dcom-machine-access-restrictions-in-security-descriptor-definition-language-sddl-syntax.md)
|
||||
###### [DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax](security-policy-settings/dcom-machine-launch-restrictions-in-security-descriptor-definition-language-sddl-syntax.md)
|
||||
###### [Devices: Allow undock without having to log on](security-policy-settings/devices-allow-undock-without-having-to-log-on.md)
|
||||
###### [Devices: Allowed to format and eject removable media](security-policy-settings/devices-allowed-to-format-and-eject-removable-media.md)
|
||||
###### [Devices: Prevent users from installing printer drivers](security-policy-settings/devices-prevent-users-from-installing-printer-drivers.md)
|
||||
###### [Devices: Restrict CD-ROM access to locally logged-on user only](security-policy-settings/devices-restrict-cd-rom-access-to-locally-logged-on-user-only.md)
|
||||
###### [Devices: Restrict floppy access to locally logged-on user only](security-policy-settings/devices-restrict-floppy-access-to-locally-logged-on-user-only.md)
|
||||
###### [Domain controller: Allow server operators to schedule tasks](security-policy-settings/domain-controller-allow-server-operators-to-schedule-tasks.md)
|
||||
###### [Domain controller: LDAP server signing requirements](security-policy-settings/domain-controller-ldap-server-signing-requirements.md)
|
||||
###### [Domain controller: Refuse machine account password changes](security-policy-settings/domain-controller-refuse-machine-account-password-changes.md)
|
||||
###### [Domain member: Digitally encrypt or sign secure channel data (always)](security-policy-settings/domain-member-digitally-encrypt-or-sign-secure-channel-data-always.md)
|
||||
###### [Domain member: Digitally encrypt secure channel data (when possible)](security-policy-settings/domain-member-digitally-encrypt-secure-channel-data-when-possible.md)
|
||||
###### [Domain member: Digitally sign secure channel data (when possible)](security-policy-settings/domain-member-digitally-sign-secure-channel-data-when-possible.md)
|
||||
###### [Domain member: Disable machine account password changes](security-policy-settings/domain-member-disable-machine-account-password-changes.md)
|
||||
###### [Domain member: Maximum machine account password age](security-policy-settings/domain-member-maximum-machine-account-password-age.md)
|
||||
###### [Domain member: Require strong (Windows 2000 or later) session key](security-policy-settings/domain-member-require-strong-windows-2000-or-later-session-key.md)
|
||||
###### [Interactive logon: Display user information when the session is locked](security-policy-settings/interactive-logon-display-user-information-when-the-session-is-locked.md)
|
||||
###### [Interactive logon: Don't display last signed-in](security-policy-settings/interactive-logon-do-not-display-last-user-name.md)
|
||||
###### [Interactive logon: Don't display username at sign-in](security-policy-settings/interactive-logon-dont-display-username-at-sign-in.md)
|
||||
###### [Interactive logon: Do not require CTRL+ALT+DEL](security-policy-settings/interactive-logon-do-not-require-ctrl-alt-del.md)
|
||||
###### [Interactive logon: Machine account lockout threshold](security-policy-settings/interactive-logon-machine-account-lockout-threshold.md)
|
||||
###### [Interactive logon: Machine inactivity limit](security-policy-settings/interactive-logon-machine-inactivity-limit.md)
|
||||
###### [Interactive logon: Message text for users attempting to log on](security-policy-settings/interactive-logon-message-text-for-users-attempting-to-log-on.md)
|
||||
###### [Interactive logon: Message title for users attempting to log on](security-policy-settings/interactive-logon-message-title-for-users-attempting-to-log-on.md)
|
||||
###### [Interactive logon: Number of previous logons to cache (in case domain controller is not available)](security-policy-settings/interactive-logon-number-of-previous-logons-to-cache-in-case-domain-controller-is-not-available.md)
|
||||
###### [Interactive logon: Prompt user to change password before expiration](security-policy-settings/interactive-logon-prompt-user-to-change-password-before-expiration.md)
|
||||
###### [Interactive logon: Require Domain Controller authentication to unlock workstation](security-policy-settings/interactive-logon-require-domain-controller-authentication-to-unlock-workstation.md)
|
||||
###### [Interactive logon: Require smart card](security-policy-settings/interactive-logon-require-smart-card.md)
|
||||
###### [Interactive logon: Smart card removal behavior](security-policy-settings/interactive-logon-smart-card-removal-behavior.md)
|
||||
###### [Microsoft network client: Digitally sign communications (always)](security-policy-settings/microsoft-network-client-digitally-sign-communications-always.md)
|
||||
###### [SMBv1 Microsoft network client: Digitally sign communications (always)](security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-always.md)
|
||||
###### [SMBv1 Microsoft network client: Digitally sign communications (if server agrees)](security-policy-settings/smbv1-microsoft-network-client-digitally-sign-communications-if-server-agrees.md)
|
||||
###### [Microsoft network client: Send unencrypted password to third-party SMB servers](security-policy-settings/microsoft-network-client-send-unencrypted-password-to-third-party-smb-servers.md)
|
||||
###### [Microsoft network server: Amount of idle time required before suspending session](security-policy-settings/microsoft-network-server-amount-of-idle-time-required-before-suspending-session.md)
|
||||
###### [Microsoft network server: Attempt S4U2Self to obtain claim information](security-policy-settings/microsoft-network-server-attempt-s4u2self-to-obtain-claim-information.md)
|
||||
###### [Microsoft network server: Digitally sign communications (always)](security-policy-settings/microsoft-network-server-digitally-sign-communications-always.md)
|
||||
###### [SMBv1 Microsoft network server: Digitally sign communications (always)](security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-always.md)
|
||||
###### [SMBv1 Microsoft network server: Digitally sign communications (if client agrees)](security-policy-settings/smbv1-microsoft-network-server-digitally-sign-communications-if-client-agrees.md)
|
||||
###### [Microsoft network server: Disconnect clients when logon hours expire](security-policy-settings/microsoft-network-server-disconnect-clients-when-logon-hours-expire.md)
|
||||
###### [Microsoft network server: Server SPN target name validation level](security-policy-settings/microsoft-network-server-server-spn-target-name-validation-level.md)
|
||||
###### [Network access: Allow anonymous SID/Name translation](security-policy-settings/network-access-allow-anonymous-sidname-translation.md)
|
||||
###### [Network access: Do not allow anonymous enumeration of SAM accounts](security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts.md)
|
||||
###### [Network access: Do not allow anonymous enumeration of SAM accounts and shares](security-policy-settings/network-access-do-not-allow-anonymous-enumeration-of-sam-accounts-and-shares.md)
|
||||
###### [Network access: Do not allow storage of passwords and credentials for network authentication](security-policy-settings/network-access-do-not-allow-storage-of-passwords-and-credentials-for-network-authentication.md)
|
||||
###### [Network access: Let Everyone permissions apply to anonymous users](security-policy-settings/network-access-let-everyone-permissions-apply-to-anonymous-users.md)
|
||||
###### [Network access: Named Pipes that can be accessed anonymously](security-policy-settings/network-access-named-pipes-that-can-be-accessed-anonymously.md)
|
||||
###### [Network access: Remotely accessible registry paths](security-policy-settings/network-access-remotely-accessible-registry-paths.md)
|
||||
###### [Network access: Remotely accessible registry paths and subpaths](security-policy-settings/network-access-remotely-accessible-registry-paths-and-subpaths.md)
|
||||
###### [Network access: Restrict anonymous access to Named Pipes and Shares](security-policy-settings/network-access-restrict-anonymous-access-to-named-pipes-and-shares.md)
|
||||
###### [Network access: Restrict clients allowed to make remote calls to SAM](security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md)
|
||||
###### [Network access: Shares that can be accessed anonymously](security-policy-settings/network-access-shares-that-can-be-accessed-anonymously.md)
|
||||
###### [Network access: Sharing and security model for local accounts](security-policy-settings/network-access-sharing-and-security-model-for-local-accounts.md)
|
||||
###### [Network security: Allow Local System to use computer identity for NTLM](security-policy-settings/network-security-allow-local-system-to-use-computer-identity-for-ntlm.md)
|
||||
###### [Network security: Allow LocalSystem NULL session fallback](security-policy-settings/network-security-allow-localsystem-null-session-fallback.md)
|
||||
###### [Network security: Allow PKU2U authentication requests to this computer to use online identities](security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities.md)
|
||||
###### [Network security: Configure encryption types allowed for Kerberos](security-policy-settings/network-security-configure-encryption-types-allowed-for-kerberos.md)
|
||||
###### [Network security: Do not store LAN Manager hash value on next password change](security-policy-settings/network-security-do-not-store-lan-manager-hash-value-on-next-password-change.md)
|
||||
###### [Network security: Force logoff when logon hours expire](security-policy-settings/network-security-force-logoff-when-logon-hours-expire.md)
|
||||
###### [Network security: LAN Manager authentication level](security-policy-settings/network-security-lan-manager-authentication-level.md)
|
||||
###### [Network security: LDAP client signing requirements](security-policy-settings/network-security-ldap-client-signing-requirements.md)
|
||||
###### [Network security: Minimum session security for NTLM SSP based (including secure RPC) clients](security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-clients.md)
|
||||
###### [Network security: Minimum session security for NTLM SSP based (including secure RPC) servers](security-policy-settings/network-security-minimum-session-security-for-ntlm-ssp-based-including-secure-rpc-servers.md)
|
||||
###### [Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication](security-policy-settings/network-security-restrict-ntlm-add-remote-server-exceptions-for-ntlm-authentication.md)
|
||||
###### [Network security: Restrict NTLM: Add server exceptions in this domain](security-policy-settings/network-security-restrict-ntlm-add-server-exceptions-in-this-domain.md)
|
||||
###### [Network security: Restrict NTLM: Audit incoming NTLM traffic](security-policy-settings/network-security-restrict-ntlm-audit-incoming-ntlm-traffic.md)
|
||||
###### [Network security: Restrict NTLM: Audit NTLM authentication in this domain](security-policy-settings/network-security-restrict-ntlm-audit-ntlm-authentication-in-this-domain.md)
|
||||
###### [Network security: Restrict NTLM: Incoming NTLM traffic](security-policy-settings/network-security-restrict-ntlm-incoming-ntlm-traffic.md)
|
||||
###### [Network security: Restrict NTLM: NTLM authentication in this domain](security-policy-settings/network-security-restrict-ntlm-ntlm-authentication-in-this-domain.md)
|
||||
###### [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers.md)
|
||||
###### [Recovery console: Allow automatic administrative logon](security-policy-settings/recovery-console-allow-automatic-administrative-logon.md)
|
||||
###### [Recovery console: Allow floppy copy and access to all drives and folders](security-policy-settings/recovery-console-allow-floppy-copy-and-access-to-all-drives-and-folders.md)
|
||||
###### [Shutdown: Allow system to be shut down without having to log on](security-policy-settings/shutdown-allow-system-to-be-shut-down-without-having-to-log-on.md)
|
||||
###### [Shutdown: Clear virtual memory pagefile](security-policy-settings/shutdown-clear-virtual-memory-pagefile.md)
|
||||
###### [System cryptography: Force strong key protection for user keys stored on the computer](security-policy-settings/system-cryptography-force-strong-key-protection-for-user-keys-stored-on-the-computer.md)
|
||||
###### [System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing](security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing.md)
|
||||
###### [System objects: Require case insensitivity for non-Windows subsystems](security-policy-settings/system-objects-require-case-insensitivity-for-non-windows-subsystems.md)
|
||||
###### [System objects: Strengthen default permissions of internal system objects (Symbolic Links)](security-policy-settings/system-objects-strengthen-default-permissions-of-internal-system-objects.md)
|
||||
###### [System settings: Optional subsystems](security-policy-settings/system-settings-optional-subsystems.md)
|
||||
###### [System settings: Use certificate rules on Windows executables for Software Restriction Policies](security-policy-settings/system-settings-use-certificate-rules-on-windows-executables-for-software-restriction-policies.md)
|
||||
###### [User Account Control: Admin Approval Mode for the Built-in Administrator account](security-policy-settings/user-account-control-admin-approval-mode-for-the-built-in-administrator-account.md)
|
||||
###### [User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop](security-policy-settings/user-account-control-allow-uiaccess-applications-to-prompt-for-elevation-without-using-the-secure-desktop.md)
|
||||
###### [User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode](security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-administrators-in-admin-approval-mode.md)
|
||||
###### [User Account Control: Behavior of the elevation prompt for standard users](security-policy-settings/user-account-control-behavior-of-the-elevation-prompt-for-standard-users.md)
|
||||
###### [User Account Control: Detect application installations and prompt for elevation](security-policy-settings/user-account-control-detect-application-installations-and-prompt-for-elevation.md)
|
||||
###### [User Account Control: Only elevate executables that are signed and validated](security-policy-settings/user-account-control-only-elevate-executables-that-are-signed-and-validated.md)
|
||||
###### [User Account Control: Only elevate UIAccess applications that are installed in secure locations](security-policy-settings/user-account-control-only-elevate-uiaccess-applications-that-are-installed-in-secure-locations.md)
|
||||
###### [User Account Control: Run all administrators in Admin Approval Mode](security-policy-settings/user-account-control-run-all-administrators-in-admin-approval-mode.md)
|
||||
###### [User Account Control: Switch to the secure desktop when prompting for elevation](security-policy-settings/user-account-control-switch-to-the-secure-desktop-when-prompting-for-elevation.md)
|
||||
###### [User Account Control: Virtualize file and registry write failures to per-user locations](security-policy-settings/user-account-control-virtualize-file-and-registry-write-failures-to-per-user-locations.md)
|
||||
##### [Advanced security audit policy settings](security-policy-settings/secpol-advanced-security-audit-policy-settings.md)
|
||||
##### [User Rights Assignment](security-policy-settings/user-rights-assignment.md)
|
||||
###### [Access Credential Manager as a trusted caller](security-policy-settings/access-credential-manager-as-a-trusted-caller.md)
|
||||
###### [Access this computer from the network](security-policy-settings/access-this-computer-from-the-network.md)
|
||||
###### [Act as part of the operating system](security-policy-settings/act-as-part-of-the-operating-system.md)
|
||||
###### [Add workstations to domain](security-policy-settings/add-workstations-to-domain.md)
|
||||
###### [Adjust memory quotas for a process](security-policy-settings/adjust-memory-quotas-for-a-process.md)
|
||||
###### [Allow log on locally](security-policy-settings/allow-log-on-locally.md)
|
||||
###### [Allow log on through Remote Desktop Services](security-policy-settings/allow-log-on-through-remote-desktop-services.md)
|
||||
###### [Back up files and directories](security-policy-settings/back-up-files-and-directories.md)
|
||||
###### [Bypass traverse checking](security-policy-settings/bypass-traverse-checking.md)
|
||||
###### [Change the system time](security-policy-settings/change-the-system-time.md)
|
||||
###### [Change the time zone](security-policy-settings/change-the-time-zone.md)
|
||||
###### [Create a pagefile](security-policy-settings/create-a-pagefile.md)
|
||||
###### [Create a token object](security-policy-settings/create-a-token-object.md)
|
||||
###### [Create global objects](security-policy-settings/create-global-objects.md)
|
||||
###### [Create permanent shared objects](security-policy-settings/create-permanent-shared-objects.md)
|
||||
###### [Create symbolic links](security-policy-settings/create-symbolic-links.md)
|
||||
###### [Debug programs](security-policy-settings/debug-programs.md)
|
||||
###### [Deny access to this computer from the network](security-policy-settings/deny-access-to-this-computer-from-the-network.md)
|
||||
###### [Deny log on as a batch job](security-policy-settings/deny-log-on-as-a-batch-job.md)
|
||||
###### [Deny log on as a service](security-policy-settings/deny-log-on-as-a-service.md)
|
||||
###### [Deny log on locally](security-policy-settings/deny-log-on-locally.md)
|
||||
###### [Deny log on through Remote Desktop Services](security-policy-settings/deny-log-on-through-remote-desktop-services.md)
|
||||
###### [Enable computer and user accounts to be trusted for delegation](security-policy-settings/enable-computer-and-user-accounts-to-be-trusted-for-delegation.md)
|
||||
###### [Force shutdown from a remote system](security-policy-settings/force-shutdown-from-a-remote-system.md)
|
||||
###### [Generate security audits](security-policy-settings/generate-security-audits.md)
|
||||
###### [Impersonate a client after authentication](security-policy-settings/impersonate-a-client-after-authentication.md)
|
||||
###### [Increase a process working set](security-policy-settings/increase-a-process-working-set.md)
|
||||
###### [Increase scheduling priority](security-policy-settings/increase-scheduling-priority.md)
|
||||
###### [Load and unload device drivers](security-policy-settings/load-and-unload-device-drivers.md)
|
||||
###### [Lock pages in memory](security-policy-settings/lock-pages-in-memory.md)
|
||||
###### [Log on as a batch job](security-policy-settings/log-on-as-a-batch-job.md)
|
||||
###### [Log on as a service](security-policy-settings/log-on-as-a-service.md)
|
||||
###### [Manage auditing and security log](security-policy-settings/manage-auditing-and-security-log.md)
|
||||
###### [Modify an object label](security-policy-settings/modify-an-object-label.md)
|
||||
###### [Modify firmware environment values](security-policy-settings/modify-firmware-environment-values.md)
|
||||
###### [Perform volume maintenance tasks](security-policy-settings/perform-volume-maintenance-tasks.md)
|
||||
###### [Profile single process](security-policy-settings/profile-single-process.md)
|
||||
###### [Profile system performance](security-policy-settings/profile-system-performance.md)
|
||||
###### [Remove computer from docking station](security-policy-settings/remove-computer-from-docking-station.md)
|
||||
###### [Replace a process level token](security-policy-settings/replace-a-process-level-token.md)
|
||||
###### [Restore files and directories](security-policy-settings/restore-files-and-directories.md)
|
||||
###### [Shut down the system](security-policy-settings/shut-down-the-system.md)
|
||||
###### [Synchronize directory service data](security-policy-settings/synchronize-directory-service-data.md)
|
||||
###### [Take ownership of files or other objects](security-policy-settings/take-ownership-of-files-or-other-objects.md)
|
||||
|
||||
### Windows security guidance for enterprises
|
||||
|
||||
#### [Windows security baselines](windows-security-configuration-framework/windows-security-baselines.md)
|
||||
##### [Security Compliance Toolkit](windows-security-configuration-framework/security-compliance-toolkit-10.md)
|
||||
##### [Get support](windows-security-configuration-framework/get-support-for-security-baselines.md)
|
||||
|
||||
### [Windows 10 Mobile security guide](windows-10-mobile-security-guide.md)
|
1412
windows/security/threat-protection/TOC.yml
Normal file
1412
windows/security/threat-protection/TOC.yml
Normal file
File diff suppressed because it is too large
Load Diff
@ -1,55 +0,0 @@
|
||||
# [Security intelligence](index.md)
|
||||
|
||||
## [Understand malware & other threats](understanding-malware.md)
|
||||
|
||||
### [Coin miners](coinminer-malware.md)
|
||||
|
||||
### [Exploits and exploit kits](exploits-malware.md)
|
||||
|
||||
### [Fileless threats](fileless-threats.md)
|
||||
|
||||
### [Macro malware](macro-malware.md)
|
||||
|
||||
### [Phishing attacks](phishing.md)
|
||||
|
||||
#### [Phishing trends and techniques](phishing-trends.md)
|
||||
|
||||
### [Ransomware](ransomware-malware.md)
|
||||
|
||||
### [Rootkits](rootkits-malware.md)
|
||||
|
||||
### [Supply chain attacks](supply-chain-malware.md)
|
||||
|
||||
### [Tech support scams](support-scams.md)
|
||||
|
||||
### [Trojans](trojans-malware.md)
|
||||
|
||||
### [Unwanted software](unwanted-software.md)
|
||||
|
||||
### [Worms](worms-malware.md)
|
||||
|
||||
## [Prevent malware infection](prevent-malware-infection.md)
|
||||
|
||||
## [Malware naming convention](malware-naming.md)
|
||||
|
||||
## [How Microsoft identifies malware and PUA](criteria.md)
|
||||
|
||||
## [Submit files for analysis](submission-guide.md)
|
||||
|
||||
## [Troubleshoot malware submission](portal-submission-troubleshooting.md)
|
||||
|
||||
## [Safety Scanner download](safety-scanner-download.md)
|
||||
|
||||
## [Industry collaboration programs](cybersecurity-industry-partners.md)
|
||||
|
||||
### [Virus information alliance](virus-information-alliance-criteria.md)
|
||||
|
||||
### [Microsoft virus initiative](virus-initiative-criteria.md)
|
||||
|
||||
### [Coordinated malware eradication](coordinated-malware-eradication.md)
|
||||
|
||||
## [Information for developers]()
|
||||
|
||||
### [Software developer FAQ](developer-faq.md)
|
||||
|
||||
### [Software developer resources](developer-resources.md)
|
60
windows/security/threat-protection/intelligence/TOC.yml
Normal file
60
windows/security/threat-protection/intelligence/TOC.yml
Normal file
@ -0,0 +1,60 @@
|
||||
- name: Security intelligence
|
||||
href: index.md
|
||||
items:
|
||||
- name: Understand malware & other threats
|
||||
href: understanding-malware.md
|
||||
items:
|
||||
- name: Coin miners
|
||||
href: coinminer-malware.md
|
||||
- name: Exploits and exploit kits
|
||||
href: exploits-malware.md
|
||||
- name: Fileless threats
|
||||
href: fileless-threats.md
|
||||
- name: Macro malware
|
||||
href: macro-malware.md
|
||||
- name: Phishing attacks
|
||||
href: phishing.md
|
||||
items:
|
||||
- name: Phishing trends and techniques
|
||||
href: phishing-trends.md
|
||||
- name: Ransomware
|
||||
href: ransomware-malware.md
|
||||
- name: Rootkits
|
||||
href: rootkits-malware.md
|
||||
- name: Supply chain attacks
|
||||
href: supply-chain-malware.md
|
||||
- name: Tech support scams
|
||||
href: support-scams.md
|
||||
- name: Trojans
|
||||
href: trojans-malware.md
|
||||
- name: Unwanted software
|
||||
href: unwanted-software.md
|
||||
- name: Worms
|
||||
href: worms-malware.md
|
||||
- name: Prevent malware infection
|
||||
href: prevent-malware-infection.md
|
||||
- name: Malware naming convention
|
||||
href: malware-naming.md
|
||||
- name: How Microsoft identifies malware and PUA
|
||||
href: criteria.md
|
||||
- name: Submit files for analysis
|
||||
href: submission-guide.md
|
||||
- name: Troubleshoot malware submission
|
||||
href: portal-submission-troubleshooting.md
|
||||
- name: Safety Scanner download
|
||||
href: safety-scanner-download.md
|
||||
- name: Industry collaboration programs
|
||||
href: cybersecurity-industry-partners.md
|
||||
items:
|
||||
- name: Virus information alliance
|
||||
href: virus-information-alliance-criteria.md
|
||||
- name: Microsoft virus initiative
|
||||
href: virus-initiative-criteria.md
|
||||
- name: Coordinated malware eradication
|
||||
href: coordinated-malware-eradication.md
|
||||
- name: Information for developers
|
||||
items:
|
||||
- name: Software developer FAQ
|
||||
href: developer-faq.md
|
||||
- name: Software developer resources
|
||||
href: developer-resources.md
|
@ -1,8 +0,0 @@
|
||||
# [Microsoft Defender Application Guard](md-app-guard-overview.md)
|
||||
|
||||
## [System requirements](reqs-md-app-guard.md)
|
||||
## [Install WDAG](install-md-app-guard.md)
|
||||
## [Configure WDAG policies](configure-md-app-guard.md)
|
||||
## [Test scenarios](test-scenarios-md-app-guard.md)
|
||||
## [Microsoft Defender Application Guard Extension](md-app-guard-browser-extension.md)
|
||||
## [FAQ](faq-md-app-guard.md)
|
@ -0,0 +1,15 @@
|
||||
- name: Microsoft Defender Application Guard
|
||||
href: md-app-guard-overview.md
|
||||
items:
|
||||
- name: System requirements
|
||||
href: reqs-md-app-guard.md
|
||||
- name: Install WDAG
|
||||
href: install-md-app-guard.md
|
||||
- name: Configure WDAG policies
|
||||
href: configure-md-app-guard.md
|
||||
- name: Test scenarios
|
||||
href: test-scenarios-md-app-guard.md
|
||||
- name: Microsoft Defender Application Guard Extension
|
||||
href: md-app-guard-browser-extension.md
|
||||
- name: FAQ
|
||||
href: faq-md-app-guard.md
|
@ -1,140 +0,0 @@
|
||||
# [Application Control for Windows](windows-defender-application-control.md)
|
||||
## [WDAC and AppLocker Overview](wdac-and-applocker-overview.md)
|
||||
### [WDAC and AppLocker Feature Availability](feature-availability.md)
|
||||
### [Virtualization-based protection of code integrity](../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||
|
||||
|
||||
## [WDAC design guide](windows-defender-application-control-design-guide.md)
|
||||
### [Plan for WDAC policy lifecycle management](plan-windows-defender-application-control-management.md)
|
||||
### Design your WDAC policy
|
||||
#### [Understand WDAC policy design decisions](understand-windows-defender-application-control-policy-design-decisions.md)
|
||||
#### [Understand WDAC policy rules and file rules](select-types-of-rules-to-create.md)
|
||||
##### [Allow apps installed by a managed installer](use-windows-defender-application-control-with-managed-installer.md)
|
||||
##### [Configure managed installer rules](configure-wdac-managed-installer.md)
|
||||
##### [Allow reputable apps with Intelligent Security Graph (ISG)](use-windows-defender-application-control-with-intelligent-security-graph.md)
|
||||
##### [Allow COM object registration](allow-com-object-registration-in-windows-defender-application-control-policy.md)
|
||||
##### [Use WDAC with .NET hardening](use-windows-defender-application-control-with-dynamic-code-security.md)
|
||||
##### [Manage packaged apps with WDAC](manage-packaged-apps-with-windows-defender-application-control.md)
|
||||
##### [Use WDAC to control specific plug-ins, add-ins, and modules](use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md)
|
||||
#### [Use multiple WDAC policies](deploy-multiple-windows-defender-application-control-policies.md)
|
||||
### Create your WDAC policy
|
||||
#### [Example WDAC base policies](example-wdac-base-policies.md)
|
||||
#### [Policy creation for common WDAC usage scenarios](types-of-devices.md)
|
||||
##### [Create a WDAC policy for lightly-managed devices](create-wdac-policy-for-lightly-managed-devices.md)
|
||||
##### [Create a WDAC policy for fully-managed devices](create-wdac-policy-for-fully-managed-devices.md)
|
||||
##### [Create a WDAC policy for fixed-workload devices](create-initial-default-policy.md)
|
||||
##### [Microsoft recommended block rules](microsoft-recommended-block-rules.md)
|
||||
##### [Microsoft recommended driver block rules](microsoft-recommended-driver-block-rules.md)
|
||||
#### [Use the WDAC Wizard tool](wdac-wizard.md)
|
||||
##### [Create a base WDAC policy with the Wizard](wdac-wizard-create-base-policy.md)
|
||||
##### [Create a supplemental WDAC policy with the Wizard](wdac-wizard-create-supplemental-policy.md)
|
||||
##### [Editing a WDAC policy with the Wizard](wdac-wizard-editing-policy.md)
|
||||
##### [Merging multiple WDAC policies with the Wizard](wdac-wizard-merging-policies.md)
|
||||
|
||||
## [WDAC deployment guide](windows-defender-application-control-deployment-guide.md)
|
||||
### [Deploy WDAC policies with MDM](deploy-windows-defender-application-control-policies-using-intune.md)
|
||||
### [Deploy WDAC policies with MEMCM](deployment/deploy-wdac-policies-with-memcm.md)
|
||||
### [Deploy WDAC policies with script](deployment/deploy-wdac-policies-with-script.md)
|
||||
### [Deploy WDAC policies with Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md)
|
||||
### [Audit WDAC policies](audit-windows-defender-application-control-policies.md)
|
||||
### [Merge WDAC policies](merge-windows-defender-application-control-policies.md)
|
||||
### [Enforce WDAC policies](enforce-windows-defender-application-control-policies.md)
|
||||
### [Use code signing to simplify application control for classic Windows applications](use-code-signing-to-simplify-application-control-for-classic-windows-applications.md)
|
||||
#### [Optional: Use the WDAC Signing Portal in the Microsoft Store for Business](use-device-guard-signing-portal-in-microsoft-store-for-business.md)
|
||||
#### [Optional: Create a code signing cert for WDAC](create-code-signing-cert-for-windows-defender-application-control.md)
|
||||
#### [Deploy catalog files to support WDAC](deploy-catalog-files-to-support-windows-defender-application-control.md)
|
||||
### [Use signed policies to protect Windows Defender Application Control against tampering](use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md)
|
||||
### [Disable WDAC policies](disable-windows-defender-application-control-policies.md)
|
||||
### [LOB Win32 Apps on S Mode](LOB-win32-apps-on-s.md)
|
||||
|
||||
## [Windows Defender Application Control operational guide](windows-defender-application-control-operational-guide.md)
|
||||
### [Understanding Application Control event IDs](event-id-explanations.md)
|
||||
### [Understanding Application Control event tags](event-tag-explanations.md)
|
||||
### [Query WDAC events with Advanced hunting](querying-application-control-events-centrally-using-advanced-hunting.md)
|
||||
### [Known Issues](operations/known-issues.md)
|
||||
|
||||
## [AppLocker](applocker\applocker-overview.md)
|
||||
### [Administer AppLocker](applocker\administer-applocker.md)
|
||||
#### [Maintain AppLocker policies](applocker\maintain-applocker-policies.md)
|
||||
#### [Edit an AppLocker policy](applocker\edit-an-applocker-policy.md)
|
||||
#### [Test and update an AppLocker policy](applocker\test-and-update-an-applocker-policy.md)
|
||||
#### [Deploy AppLocker policies by using the enforce rules setting](applocker\deploy-applocker-policies-by-using-the-enforce-rules-setting.md)
|
||||
#### [Use the AppLocker Windows PowerShell cmdlets](applocker\use-the-applocker-windows-powershell-cmdlets.md)
|
||||
#### [Use AppLocker and Software Restriction Policies in the same domain](applocker\use-applocker-and-software-restriction-policies-in-the-same-domain.md)
|
||||
#### [Optimize AppLocker performance](applocker\optimize-applocker-performance.md)
|
||||
#### [Monitor app usage with AppLocker](applocker\monitor-application-usage-with-applocker.md)
|
||||
#### [Manage packaged apps with AppLocker](applocker\manage-packaged-apps-with-applocker.md)
|
||||
#### [Working with AppLocker rules](applocker\working-with-applocker-rules.md)
|
||||
##### [Create a rule that uses a file hash condition](applocker\create-a-rule-that-uses-a-file-hash-condition.md)
|
||||
##### [Create a rule that uses a path condition](applocker\create-a-rule-that-uses-a-path-condition.md)
|
||||
##### [Create a rule that uses a publisher condition](applocker\create-a-rule-that-uses-a-publisher-condition.md)
|
||||
##### [Create AppLocker default rules](applocker\create-applocker-default-rules.md)
|
||||
##### [Add exceptions for an AppLocker rule](applocker\configure-exceptions-for-an-applocker-rule.md)
|
||||
##### [Create a rule for packaged apps](applocker\create-a-rule-for-packaged-apps.md)
|
||||
##### [Delete an AppLocker rule](applocker\delete-an-applocker-rule.md)
|
||||
##### [Edit AppLocker rules](applocker\edit-applocker-rules.md)
|
||||
##### [Enable the DLL rule collection](applocker\enable-the-dll-rule-collection.md)
|
||||
##### [Enforce AppLocker rules](applocker\enforce-applocker-rules.md)
|
||||
##### [Run the Automatically Generate Rules wizard](applocker\run-the-automatically-generate-rules-wizard.md)
|
||||
#### [Working with AppLocker policies](applocker\working-with-applocker-policies.md)
|
||||
##### [Configure the Application Identity service](applocker\configure-the-application-identity-service.md)
|
||||
##### [Configure an AppLocker policy for audit only](applocker\configure-an-applocker-policy-for-audit-only.md)
|
||||
##### [Configure an AppLocker policy for enforce rules](applocker\configure-an-applocker-policy-for-enforce-rules.md)
|
||||
##### [Display a custom URL message when users try to run a blocked app](applocker\display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md)
|
||||
##### [Export an AppLocker policy from a GPO](applocker\export-an-applocker-policy-from-a-gpo.md)
|
||||
##### [Export an AppLocker policy to an XML file](applocker\export-an-applocker-policy-to-an-xml-file.md)
|
||||
##### [Import an AppLocker policy from another computer](applocker\import-an-applocker-policy-from-another-computer.md)
|
||||
##### [Import an AppLocker policy into a GPO](applocker\import-an-applocker-policy-into-a-gpo.md)
|
||||
##### [Add rules for packaged apps to existing AppLocker rule-set](applocker\add-rules-for-packaged-apps-to-existing-applocker-rule-set.md)
|
||||
##### [Merge AppLocker policies by using Set-ApplockerPolicy](applocker\merge-applocker-policies-by-using-set-applockerpolicy.md)
|
||||
##### [Merge AppLocker policies manually](applocker\merge-applocker-policies-manually.md)
|
||||
##### [Refresh an AppLocker policy](applocker\refresh-an-applocker-policy.md)
|
||||
##### [Test an AppLocker policy by using Test-AppLockerPolicy](applocker\test-an-applocker-policy-by-using-test-applockerpolicy.md)
|
||||
### [AppLocker design guide](applocker\applocker-policies-design-guide.md)
|
||||
#### [Understand AppLocker policy design decisions](applocker\understand-applocker-policy-design-decisions.md)
|
||||
#### [Determine your application control objectives](applocker\determine-your-application-control-objectives.md)
|
||||
#### [Create a list of apps deployed to each business group](applocker\create-list-of-applications-deployed-to-each-business-group.md)
|
||||
##### [Document your app list](applocker\document-your-application-list.md)
|
||||
#### [Select the types of rules to create](applocker\select-types-of-rules-to-create.md)
|
||||
##### [Document your AppLocker rules](applocker\document-your-applocker-rules.md)
|
||||
#### [Determine the Group Policy structure and rule enforcement](applocker\determine-group-policy-structure-and-rule-enforcement.md)
|
||||
##### [Understand AppLocker enforcement settings](applocker\understand-applocker-enforcement-settings.md)
|
||||
##### [Understand AppLocker rules and enforcement setting inheritance in Group Policy](applocker\understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md)
|
||||
##### [Document the Group Policy structure and AppLocker rule enforcement](applocker\document-group-policy-structure-and-applocker-rule-enforcement.md)
|
||||
#### [Plan for AppLocker policy management](applocker\plan-for-applocker-policy-management.md)
|
||||
### [AppLocker deployment guide](applocker\applocker-policies-deployment-guide.md)
|
||||
#### [Understand the AppLocker policy deployment process](applocker\understand-the-applocker-policy-deployment-process.md)
|
||||
#### [Requirements for Deploying AppLocker Policies](applocker\requirements-for-deploying-applocker-policies.md)
|
||||
#### [Use Software Restriction Policies and AppLocker policies](applocker\using-software-restriction-policies-and-applocker-policies.md)
|
||||
#### [Create Your AppLocker policies](applocker\create-your-applocker-policies.md)
|
||||
##### [Create Your AppLocker rules](applocker\create-your-applocker-rules.md)
|
||||
#### [Deploy the AppLocker policy into production](applocker\deploy-the-applocker-policy-into-production.md)
|
||||
##### [Use a reference device to create and maintain AppLocker policies](applocker\use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
|
||||
###### [Determine which apps are digitally signed on a reference device](applocker\determine-which-applications-are-digitally-signed-on-a-reference-computer.md)
|
||||
###### [Configure the AppLocker reference device](applocker\configure-the-appLocker-reference-device.md)
|
||||
### [AppLocker technical reference](applocker\applocker-technical-reference.md)
|
||||
#### [What Is AppLocker?](applocker\what-is-applocker.md)
|
||||
#### [Requirements to use AppLocker](applocker\requirements-to-use-applocker.md)
|
||||
#### [AppLocker policy use scenarios](applocker\applocker-policy-use-scenarios.md)
|
||||
#### [How AppLocker works](applocker\how-applocker-works-techref.md)
|
||||
##### [Understanding AppLocker rule behavior](applocker\understanding-applocker-rule-behavior.md)
|
||||
##### [Understanding AppLocker rule exceptions](applocker\understanding-applocker-rule-exceptions.md)
|
||||
##### [Understanding AppLocker rule collections](applocker\understanding-applocker-rule-collections.md)
|
||||
##### [Understanding AppLocker allow and deny actions on rules](applocker\understanding-applocker-allow-and-deny-actions-on-rules.md)
|
||||
##### [Understanding AppLocker rule condition types](applocker\understanding-applocker-rule-condition-types.md)
|
||||
###### [Understanding the publisher rule condition in AppLocker](applocker\understanding-the-publisher-rule-condition-in-applocker.md)
|
||||
###### [Understanding the path rule condition in AppLocker](applocker\understanding-the-path-rule-condition-in-applocker.md)
|
||||
###### [Understanding the file hash rule condition in AppLocker](applocker\understanding-the-file-hash-rule-condition-in-applocker.md)
|
||||
##### [Understanding AppLocker default rules](applocker\understanding-applocker-default-rules.md)
|
||||
###### [Executable rules in AppLocker](applocker\executable-rules-in-applocker.md)
|
||||
###### [Windows Installer rules in AppLocker](applocker\windows-installer-rules-in-applocker.md)
|
||||
###### [Script rules in AppLocker](applocker\script-rules-in-applocker.md)
|
||||
###### [DLL rules in AppLocker](applocker\dll-rules-in-applocker.md)
|
||||
###### [Packaged apps and packaged app installer rules in AppLocker](applocker\packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
|
||||
#### [AppLocker architecture and components](applocker\applocker-architecture-and-components.md)
|
||||
#### [AppLocker processes and interactions](applocker\applocker-processes-and-interactions.md)
|
||||
#### [AppLocker functions](applocker\applocker-functions.md)
|
||||
#### [Security considerations for AppLocker](applocker\security-considerations-for-applocker.md)
|
||||
#### [Tools to Use with AppLocker](applocker\tools-to-use-with-applocker.md)
|
||||
##### [Using Event Viewer with AppLocker](applocker\using-event-viewer-with-applocker.md)
|
||||
#### [AppLocker Settings](applocker\applocker-settings.md)
|
@ -0,0 +1,296 @@
|
||||
- name: Application Control for Windows
|
||||
href: windows-defender-application-control.md
|
||||
items:
|
||||
- name: WDAC and AppLocker Overview
|
||||
href: wdac-and-applocker-overview.md
|
||||
items:
|
||||
- name: WDAC and AppLocker Feature Availability
|
||||
href: feature-availability.md
|
||||
- name: Virtualization-based protection of code integrity
|
||||
href: ../device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md
|
||||
- name: WDAC design guide
|
||||
href: windows-defender-application-control-design-guide.md
|
||||
items:
|
||||
- name: Plan for WDAC policy lifecycle management
|
||||
href: plan-windows-defender-application-control-management.md
|
||||
- name: Design your WDAC policy
|
||||
items:
|
||||
- name: Understand WDAC policy design decisions
|
||||
href: understand-windows-defender-application-control-policy-design-decisions.md
|
||||
- name: Understand WDAC policy rules and file rules
|
||||
href: select-types-of-rules-to-create.md
|
||||
items:
|
||||
- name: Allow apps installed by a managed installer
|
||||
href: use-windows-defender-application-control-with-managed-installer.md
|
||||
- name: Configure managed installer rules
|
||||
href: configure-wdac-managed-installer.md
|
||||
- name: Allow reputable apps with Intelligent Security Graph (ISG)
|
||||
href: use-windows-defender-application-control-with-intelligent-security-graph.md
|
||||
- name: Allow COM object registration
|
||||
href: allow-com-object-registration-in-windows-defender-application-control-policy.md
|
||||
- name: Use WDAC with .NET hardening
|
||||
href: use-windows-defender-application-control-with-dynamic-code-security.md
|
||||
- name: Manage packaged apps with WDAC
|
||||
href: manage-packaged-apps-with-windows-defender-application-control.md
|
||||
- name: Use WDAC to control specific plug-ins, add-ins, and modules
|
||||
href: use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md
|
||||
- name: Use multiple WDAC policies
|
||||
href: deploy-multiple-windows-defender-application-control-policies.md
|
||||
- name: Create your WDAC policy
|
||||
items:
|
||||
- name: Example WDAC base policies
|
||||
href: example-wdac-base-policies.md
|
||||
- name: Policy creation for common WDAC usage scenarios
|
||||
href: types-of-devices.md
|
||||
items:
|
||||
- name: Create a WDAC policy for lightly-managed devices
|
||||
href: create-wdac-policy-for-lightly-managed-devices.md
|
||||
- name: Create a WDAC policy for fully-managed devices
|
||||
href: create-wdac-policy-for-fully-managed-devices.md
|
||||
- name: Create a WDAC policy for fixed-workload devices
|
||||
href: create-initial-default-policy.md
|
||||
- name: Microsoft recommended block rules
|
||||
href: microsoft-recommended-block-rules.md
|
||||
- name: Microsoft recommended driver block rules
|
||||
href: microsoft-recommended-driver-block-rules.md
|
||||
- name: Use the WDAC Wizard tool
|
||||
href: wdac-wizard.md
|
||||
items:
|
||||
- name: Create a base WDAC policy with the Wizard
|
||||
href: wdac-wizard-create-base-policy.md
|
||||
- name: Create a supplemental WDAC policy with the Wizard
|
||||
href: wdac-wizard-create-supplemental-policy.md
|
||||
- name: Editing a WDAC policy with the Wizard
|
||||
href: wdac-wizard-editing-policy.md
|
||||
- name: Merging multiple WDAC policies with the Wizard
|
||||
href: wdac-wizard-merging-policies.md
|
||||
- name: WDAC deployment guide
|
||||
href: windows-defender-application-control-deployment-guide.md
|
||||
items:
|
||||
- name: Deploy WDAC policies with MDM
|
||||
href: deploy-windows-defender-application-control-policies-using-intune.md
|
||||
- name: Deploy WDAC policies with MEMCM
|
||||
href: deployment/deploy-wdac-policies-with-memcm.md
|
||||
- name: Deploy WDAC policies with script
|
||||
href: deployment/deploy-wdac-policies-with-script.md
|
||||
- name: Deploy WDAC policies with Group Policy
|
||||
href: deploy-windows-defender-application-control-policies-using-group-policy.md
|
||||
- name: Audit WDAC policies
|
||||
href: audit-windows-defender-application-control-policies.md
|
||||
- name: Merge WDAC policies
|
||||
href: merge-windows-defender-application-control-policies.md
|
||||
- name: Enforce WDAC policies
|
||||
href: enforce-windows-defender-application-control-policies.md
|
||||
- name: Use code signing to simplify application control for classic Windows applications
|
||||
href: use-code-signing-to-simplify-application-control-for-classic-windows-applications.md
|
||||
items:
|
||||
- name: "Optional: Use the WDAC Signing Portal in the Microsoft Store for Business"
|
||||
href: use-device-guard-signing-portal-in-microsoft-store-for-business.md
|
||||
- name: "Optional: Create a code signing cert for WDAC"
|
||||
href: create-code-signing-cert-for-windows-defender-application-control.md
|
||||
- name: Deploy catalog files to support WDAC
|
||||
href: deploy-catalog-files-to-support-windows-defender-application-control.md
|
||||
- name: Use signed policies to protect Windows Defender Application Control against tampering
|
||||
href: use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md
|
||||
- name: Disable WDAC policies
|
||||
href: disable-windows-defender-application-control-policies.md
|
||||
- name: LOB Win32 Apps on S Mode
|
||||
href: LOB-win32-apps-on-s.md
|
||||
- name: Windows Defender Application Control operational guide
|
||||
href: windows-defender-application-control-operational-guide.md
|
||||
items:
|
||||
- name: Understanding Application Control event IDs
|
||||
href: event-id-explanations.md
|
||||
- name: Understanding Application Control event tags
|
||||
href: event-tag-explanations.md
|
||||
- name: Query WDAC events with Advanced hunting
|
||||
href: querying-application-control-events-centrally-using-advanced-hunting.md
|
||||
- name: Known Issues
|
||||
href: operations/known-issues.md
|
||||
- name: AppLocker
|
||||
href: applocker\applocker-overview.md
|
||||
items:
|
||||
- name: Administer AppLocker
|
||||
href: applocker\administer-applocker.md
|
||||
items:
|
||||
- name: Maintain AppLocker policies
|
||||
href: applocker\maintain-applocker-policies.md
|
||||
- name: Edit an AppLocker policy
|
||||
href: applocker\edit-an-applocker-policy.md
|
||||
- name: Test and update an AppLocker policy
|
||||
href: applocker\test-and-update-an-applocker-policy.md
|
||||
- name: Deploy AppLocker policies by using the enforce rules setting
|
||||
href: applocker\deploy-applocker-policies-by-using-the-enforce-rules-setting.md
|
||||
- name: Use the AppLocker Windows PowerShell cmdlets
|
||||
href: applocker\use-the-applocker-windows-powershell-cmdlets.md
|
||||
- name: Use AppLocker and Software Restriction Policies in the same domain
|
||||
href: applocker\use-applocker-and-software-restriction-policies-in-the-same-domain.md
|
||||
- name: Optimize AppLocker performance
|
||||
href: applocker\optimize-applocker-performance.md
|
||||
- name: Monitor app usage with AppLocker
|
||||
href: applocker\monitor-application-usage-with-applocker.md
|
||||
- name: Manage packaged apps with AppLocker
|
||||
href: applocker\manage-packaged-apps-with-applocker.md
|
||||
- name: Working with AppLocker rules
|
||||
href: applocker\working-with-applocker-rules.md
|
||||
items:
|
||||
- name: Create a rule that uses a file hash condition
|
||||
href: applocker\create-a-rule-that-uses-a-file-hash-condition.md
|
||||
- name: Create a rule that uses a path condition
|
||||
href: applocker\create-a-rule-that-uses-a-path-condition.md
|
||||
- name: Create a rule that uses a publisher condition
|
||||
href: applocker\create-a-rule-that-uses-a-publisher-condition.md
|
||||
- name: Create AppLocker default rules
|
||||
href: applocker\create-applocker-default-rules.md
|
||||
- name: Add exceptions for an AppLocker rule
|
||||
href: applocker\configure-exceptions-for-an-applocker-rule.md
|
||||
- name: Create a rule for packaged apps
|
||||
href: applocker\create-a-rule-for-packaged-apps.md
|
||||
- name: Delete an AppLocker rule
|
||||
href: applocker\delete-an-applocker-rule.md
|
||||
- name: Edit AppLocker rules
|
||||
href: applocker\edit-applocker-rules.md
|
||||
- name: Enable the DLL rule collection
|
||||
href: applocker\enable-the-dll-rule-collection.md
|
||||
- name: Enforce AppLocker rules
|
||||
href: applocker\enforce-applocker-rules.md
|
||||
- name: Run the Automatically Generate Rules wizard
|
||||
href: applocker\run-the-automatically-generate-rules-wizard.md
|
||||
- name: Working with AppLocker policies
|
||||
href: applocker\working-with-applocker-policies.md
|
||||
items:
|
||||
- name: Configure the Application Identity service
|
||||
href: applocker\configure-the-application-identity-service.md
|
||||
- name: Configure an AppLocker policy for audit only
|
||||
href: applocker\configure-an-applocker-policy-for-audit-only.md
|
||||
- name: Configure an AppLocker policy for enforce rules
|
||||
href: applocker\configure-an-applocker-policy-for-enforce-rules.md
|
||||
- name: Display a custom URL message when users try to run a blocked app
|
||||
href: applocker\display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md
|
||||
- name: Export an AppLocker policy from a GPO
|
||||
href: applocker\export-an-applocker-policy-from-a-gpo.md
|
||||
- name: Export an AppLocker policy to an XML file
|
||||
href: applocker\export-an-applocker-policy-to-an-xml-file.md
|
||||
- name: Import an AppLocker policy from another computer
|
||||
href: applocker\import-an-applocker-policy-from-another-computer.md
|
||||
- name: Import an AppLocker policy into a GPO
|
||||
href: applocker\import-an-applocker-policy-into-a-gpo.md
|
||||
- name: Add rules for packaged apps to existing AppLocker rule-set
|
||||
href: applocker\add-rules-for-packaged-apps-to-existing-applocker-rule-set.md
|
||||
- name: Merge AppLocker policies by using Set-ApplockerPolicy
|
||||
href: applocker\merge-applocker-policies-by-using-set-applockerpolicy.md
|
||||
- name: Merge AppLocker policies manually
|
||||
href: applocker\merge-applocker-policies-manually.md
|
||||
- name: Refresh an AppLocker policy
|
||||
href: applocker\refresh-an-applocker-policy.md
|
||||
- name: Test an AppLocker policy by using Test-AppLockerPolicy
|
||||
href: applocker\test-an-applocker-policy-by-using-test-applockerpolicy.md
|
||||
- name: AppLocker design guide
|
||||
href: applocker\applocker-policies-design-guide.md
|
||||
items:
|
||||
- name: Understand AppLocker policy design decisions
|
||||
href: applocker\understand-applocker-policy-design-decisions.md
|
||||
- name: Determine your application control objectives
|
||||
href: applocker\determine-your-application-control-objectives.md
|
||||
- name: Create a list of apps deployed to each business group
|
||||
href: applocker\create-list-of-applications-deployed-to-each-business-group.md
|
||||
items:
|
||||
- name: Document your app list
|
||||
href: applocker\document-your-application-list.md
|
||||
- name: Select the types of rules to create
|
||||
href: applocker\select-types-of-rules-to-create.md
|
||||
items:
|
||||
- name: Document your AppLocker rules
|
||||
href: applocker\document-your-applocker-rules.md
|
||||
- name: Determine the Group Policy structure and rule enforcement
|
||||
href: applocker\determine-group-policy-structure-and-rule-enforcement.md
|
||||
items:
|
||||
- name: Understand AppLocker enforcement settings
|
||||
href: applocker\understand-applocker-enforcement-settings.md
|
||||
- name: Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
||||
href: applocker\understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md
|
||||
- name: Document the Group Policy structure and AppLocker rule enforcement
|
||||
href: applocker\document-group-policy-structure-and-applocker-rule-enforcement.md
|
||||
- name: Plan for AppLocker policy management
|
||||
href: applocker\plan-for-applocker-policy-management.md
|
||||
- name: AppLocker deployment guide
|
||||
href: applocker\applocker-policies-deployment-guide.md
|
||||
items:
|
||||
- name: Understand the AppLocker policy deployment process
|
||||
href: applocker\understand-the-applocker-policy-deployment-process.md
|
||||
- name: Requirements for Deploying AppLocker Policies
|
||||
href: applocker\requirements-for-deploying-applocker-policies.md
|
||||
- name: Use Software Restriction Policies and AppLocker policies
|
||||
href: applocker\using-software-restriction-policies-and-applocker-policies.md
|
||||
- name: Create Your AppLocker policies
|
||||
href: applocker\create-your-applocker-policies.md
|
||||
items:
|
||||
- name: Create Your AppLocker rules
|
||||
href: applocker\create-your-applocker-rules.md
|
||||
- name: Deploy the AppLocker policy into production
|
||||
href: applocker\deploy-the-applocker-policy-into-production.md
|
||||
items:
|
||||
- name: Use a reference device to create and maintain AppLocker policies
|
||||
href: applocker\use-a-reference-computer-to-create-and-maintain-applocker-policies.md
|
||||
items:
|
||||
- name: Determine which apps are digitally signed on a reference device
|
||||
href: applocker\determine-which-applications-are-digitally-signed-on-a-reference-computer.md
|
||||
- name: Configure the AppLocker reference device
|
||||
href: applocker\configure-the-appLocker-reference-device.md
|
||||
- name: AppLocker technical reference
|
||||
href: applocker\applocker-technical-reference.md
|
||||
items:
|
||||
- name: What Is AppLocker?
|
||||
href: applocker\what-is-applocker.md
|
||||
- name: Requirements to use AppLocker
|
||||
href: applocker\requirements-to-use-applocker.md
|
||||
- name: AppLocker policy use scenarios
|
||||
href: applocker\applocker-policy-use-scenarios.md
|
||||
- name: How AppLocker works
|
||||
href: applocker\how-applocker-works-techref.md
|
||||
items:
|
||||
- name: Understanding AppLocker rule behavior
|
||||
href: applocker\understanding-applocker-rule-behavior.md
|
||||
- name: Understanding AppLocker rule exceptions
|
||||
href: applocker\understanding-applocker-rule-exceptions.md
|
||||
- name: Understanding AppLocker rule collections
|
||||
href: applocker\understanding-applocker-rule-collections.md
|
||||
- name: Understanding AppLocker allow and deny actions on rules
|
||||
href: applocker\understanding-applocker-allow-and-deny-actions-on-rules.md
|
||||
- name: Understanding AppLocker rule condition types
|
||||
href: applocker\understanding-applocker-rule-condition-types.md
|
||||
items:
|
||||
- name: Understanding the publisher rule condition in AppLocker
|
||||
href: applocker\understanding-the-publisher-rule-condition-in-applocker.md
|
||||
- name: Understanding the path rule condition in AppLocker
|
||||
href: applocker\understanding-the-path-rule-condition-in-applocker.md
|
||||
- name: Understanding the file hash rule condition in AppLocker
|
||||
href: applocker\understanding-the-file-hash-rule-condition-in-applocker.md
|
||||
- name: Understanding AppLocker default rules
|
||||
href: applocker\understanding-applocker-default-rules.md
|
||||
items:
|
||||
- name: Executable rules in AppLocker
|
||||
href: applocker\executable-rules-in-applocker.md
|
||||
- name: Windows Installer rules in AppLocker
|
||||
href: applocker\windows-installer-rules-in-applocker.md
|
||||
- name: Script rules in AppLocker
|
||||
href: applocker\script-rules-in-applocker.md
|
||||
- name: DLL rules in AppLocker
|
||||
href: applocker\dll-rules-in-applocker.md
|
||||
- name: Packaged apps and packaged app installer rules in AppLocker
|
||||
href: applocker\packaged-apps-and-packaged-app-installer-rules-in-applocker.md
|
||||
- name: AppLocker architecture and components
|
||||
href: applocker\applocker-architecture-and-components.md
|
||||
- name: AppLocker processes and interactions
|
||||
href: applocker\applocker-processes-and-interactions.md
|
||||
- name: AppLocker functions
|
||||
href: applocker\applocker-functions.md
|
||||
- name: Security considerations for AppLocker
|
||||
href: applocker\security-considerations-for-applocker.md
|
||||
- name: Tools to Use with AppLocker
|
||||
href: applocker\tools-to-use-with-applocker.md
|
||||
items:
|
||||
- name: Using Event Viewer with AppLocker
|
||||
href: applocker\using-event-viewer-with-applocker.md
|
||||
- name: AppLocker Settings
|
||||
href: applocker\applocker-settings.md
|
@ -1,89 +0,0 @@
|
||||
|
||||
# [AppLocker](applocker-overview.md)
|
||||
|
||||
## [Administer AppLocker](administer-applocker.md)
|
||||
### [Maintain AppLocker policies](maintain-applocker-policies.md)
|
||||
### [Edit an AppLocker policy](edit-an-applocker-policy.md)
|
||||
### [Test and update an AppLocker policy](test-and-update-an-applocker-policy.md)
|
||||
### [Deploy AppLocker policies by using the enforce rules setting](deploy-applocker-policies-by-using-the-enforce-rules-setting.md)
|
||||
### [Use the AppLocker Windows PowerShell cmdlets](use-the-applocker-windows-powershell-cmdlets.md)
|
||||
### [Use AppLocker and Software Restriction Policies in the same domain](use-applocker-and-software-restriction-policies-in-the-same-domain.md)
|
||||
### [Optimize AppLocker performance](optimize-applocker-performance.md)
|
||||
### [Monitor app usage with AppLocker](monitor-application-usage-with-applocker.md)
|
||||
### [Manage packaged apps with AppLocker](manage-packaged-apps-with-applocker.md)
|
||||
### [Working with AppLocker rules](working-with-applocker-rules.md)
|
||||
#### [Create a rule that uses a file hash condition](create-a-rule-that-uses-a-file-hash-condition.md)
|
||||
#### [Create a rule that uses a path condition](create-a-rule-that-uses-a-path-condition.md)
|
||||
#### [Create a rule that uses a publisher condition](create-a-rule-that-uses-a-publisher-condition.md)
|
||||
#### [Create AppLocker default rules](create-applocker-default-rules.md)
|
||||
#### [Add exceptions for an AppLocker rule](configure-exceptions-for-an-applocker-rule.md)
|
||||
#### [Create a rule for packaged apps](create-a-rule-for-packaged-apps.md)
|
||||
#### [Delete an AppLocker rule](delete-an-applocker-rule.md)
|
||||
#### [Edit AppLocker rules](edit-applocker-rules.md)
|
||||
#### [Enable the DLL rule collection](enable-the-dll-rule-collection.md)
|
||||
#### [Enforce AppLocker rules](enforce-applocker-rules.md)
|
||||
#### [Run the Automatically Generate Rules wizard](run-the-automatically-generate-rules-wizard.md)
|
||||
### [Working with AppLocker policies](working-with-applocker-policies.md)
|
||||
#### [Configure the Application Identity service](configure-the-application-identity-service.md)
|
||||
#### [Configure an AppLocker policy for audit only](configure-an-applocker-policy-for-audit-only.md)
|
||||
#### [Configure an AppLocker policy for enforce rules](configure-an-applocker-policy-for-enforce-rules.md)
|
||||
#### [Display a custom URL message when users try to run a blocked app](display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md)
|
||||
#### [Export an AppLocker policy from a GPO](export-an-applocker-policy-from-a-gpo.md)
|
||||
#### [Export an AppLocker policy to an XML file](export-an-applocker-policy-to-an-xml-file.md)
|
||||
#### [Import an AppLocker policy from another computer](import-an-applocker-policy-from-another-computer.md)
|
||||
#### [Import an AppLocker policy into a GPO](import-an-applocker-policy-into-a-gpo.md)
|
||||
#### [Add rules for packaged apps to existing AppLocker rule-set](add-rules-for-packaged-apps-to-existing-applocker-rule-set.md)
|
||||
#### [Merge AppLocker policies by using Set-ApplockerPolicy](merge-applocker-policies-by-using-set-applockerpolicy.md)
|
||||
#### [Merge AppLocker policies manually](merge-applocker-policies-manually.md)
|
||||
#### [Refresh an AppLocker policy](refresh-an-applocker-policy.md)
|
||||
#### [Test an AppLocker policy by using Test-AppLockerPolicy](test-an-applocker-policy-by-using-test-applockerpolicy.md)
|
||||
## [AppLocker design guide](applocker-policies-design-guide.md)
|
||||
### [Understand AppLocker policy design decisions](understand-applocker-policy-design-decisions.md)
|
||||
### [Determine your application control objectives](determine-your-application-control-objectives.md)
|
||||
### [Create a list of apps deployed to each business group](create-list-of-applications-deployed-to-each-business-group.md)
|
||||
#### [Document your app list](document-your-application-list.md)
|
||||
### [Select the types of rules to create](select-types-of-rules-to-create.md)
|
||||
#### [Document your AppLocker rules](document-your-applocker-rules.md)
|
||||
### [Determine the Group Policy structure and rule enforcement](determine-group-policy-structure-and-rule-enforcement.md)
|
||||
#### [Understand AppLocker enforcement settings](understand-applocker-enforcement-settings.md)
|
||||
#### [Understand AppLocker rules and enforcement setting inheritance in Group Policy](understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md)
|
||||
#### [Document the Group Policy structure and AppLocker rule enforcement](document-group-policy-structure-and-applocker-rule-enforcement.md)
|
||||
### [Plan for AppLocker policy management](plan-for-applocker-policy-management.md)
|
||||
## [AppLocker deployment guide](applocker-policies-deployment-guide.md)
|
||||
### [Understand the AppLocker policy deployment process](understand-the-applocker-policy-deployment-process.md)
|
||||
### [Requirements for Deploying AppLocker Policies](requirements-for-deploying-applocker-policies.md)
|
||||
### [Use Software Restriction Policies and AppLocker policies](using-software-restriction-policies-and-applocker-policies.md)
|
||||
### [Create Your AppLocker policies](create-your-applocker-policies.md)
|
||||
#### [Create Your AppLocker rules](create-your-applocker-rules.md)
|
||||
### [Deploy the AppLocker policy into production](deploy-the-applocker-policy-into-production.md)
|
||||
#### [Use a reference device to create and maintain AppLocker policies](use-a-reference-computer-to-create-and-maintain-applocker-policies.md)
|
||||
#### [Determine which apps are digitally signed on a reference device](determine-which-applications-are-digitally-signed-on-a-reference-computer.md)
|
||||
### [Configure the AppLocker reference device](configure-the-appLocker-reference-device.md)
|
||||
## [AppLocker technical reference](applocker-technical-reference.md)
|
||||
### [What Is AppLocker?](what-is-applocker.md)
|
||||
### [Requirements to use AppLocker](requirements-to-use-applocker.md)
|
||||
### [AppLocker policy use scenarios](applocker-policy-use-scenarios.md)
|
||||
### [How AppLocker works](how-applocker-works-techref.md)
|
||||
#### [Understanding AppLocker rule behavior](understanding-applocker-rule-behavior.md)
|
||||
#### [Understanding AppLocker rule exceptions](understanding-applocker-rule-exceptions.md)
|
||||
#### [Understanding AppLocker rule collections](understanding-applocker-rule-collections.md)
|
||||
#### [Understanding AppLocker allow and deny actions on rules](understanding-applocker-allow-and-deny-actions-on-rules.md)
|
||||
#### [Understanding AppLocker rule condition types](understanding-applocker-rule-condition-types.md)
|
||||
##### [Understanding the publisher rule condition in AppLocker](understanding-the-publisher-rule-condition-in-applocker.md)
|
||||
##### [Understanding the path rule condition in AppLocker](understanding-the-path-rule-condition-in-applocker.md)
|
||||
##### [Understanding the file hash rule condition in AppLocker](understanding-the-file-hash-rule-condition-in-applocker.md)
|
||||
#### [Understanding AppLocker default rules](understanding-applocker-default-rules.md)
|
||||
##### [Executable rules in AppLocker](executable-rules-in-applocker.md)
|
||||
##### [Windows Installer rules in AppLocker](windows-installer-rules-in-applocker.md)
|
||||
##### [Script rules in AppLocker](script-rules-in-applocker.md)
|
||||
##### [DLL rules in AppLocker](dll-rules-in-applocker.md)
|
||||
##### [Packaged apps and packaged app installer rules in AppLocker](packaged-apps-and-packaged-app-installer-rules-in-applocker.md)
|
||||
### [AppLocker architecture and components](applocker-architecture-and-components.md)
|
||||
### [AppLocker processes and interactions](applocker-processes-and-interactions.md)
|
||||
### [AppLocker functions](applocker-functions.md)
|
||||
### [Security considerations for AppLocker](security-considerations-for-applocker.md)
|
||||
### [Tools to Use with AppLocker](tools-to-use-with-applocker.md)
|
||||
#### [Using Event Viewer with AppLocker](using-event-viewer-with-applocker.md)
|
||||
### [AppLocker Settings](applocker-settings.md)
|
||||
|
||||
|
@ -0,0 +1,186 @@
|
||||
- name: AppLocker
|
||||
href: applocker-overview.md
|
||||
items:
|
||||
- name: Administer AppLocker
|
||||
href: administer-applocker.md
|
||||
items:
|
||||
- name: Maintain AppLocker policies
|
||||
href: maintain-applocker-policies.md
|
||||
- name: Edit an AppLocker policy
|
||||
href: edit-an-applocker-policy.md
|
||||
- name: Test and update an AppLocker policy
|
||||
href: test-and-update-an-applocker-policy.md
|
||||
- name: Deploy AppLocker policies by using the enforce rules setting
|
||||
href: deploy-applocker-policies-by-using-the-enforce-rules-setting.md
|
||||
- name: Use the AppLocker Windows PowerShell cmdlets
|
||||
href: use-the-applocker-windows-powershell-cmdlets.md
|
||||
- name: Use AppLocker and Software Restriction Policies in the same domain
|
||||
href: use-applocker-and-software-restriction-policies-in-the-same-domain.md
|
||||
- name: Optimize AppLocker performance
|
||||
href: optimize-applocker-performance.md
|
||||
- name: Monitor app usage with AppLocker
|
||||
href: monitor-application-usage-with-applocker.md
|
||||
- name: Manage packaged apps with AppLocker
|
||||
href: manage-packaged-apps-with-applocker.md
|
||||
- name: Working with AppLocker rules
|
||||
href: working-with-applocker-rules.md
|
||||
items:
|
||||
- name: Create a rule that uses a file hash condition
|
||||
href: create-a-rule-that-uses-a-file-hash-condition.md
|
||||
- name: Create a rule that uses a path condition
|
||||
href: create-a-rule-that-uses-a-path-condition.md
|
||||
- name: Create a rule that uses a publisher condition
|
||||
href: create-a-rule-that-uses-a-publisher-condition.md
|
||||
- name: Create AppLocker default rules
|
||||
href: create-applocker-default-rules.md
|
||||
- name: Add exceptions for an AppLocker rule
|
||||
href: configure-exceptions-for-an-applocker-rule.md
|
||||
- name: Create a rule for packaged apps
|
||||
href: create-a-rule-for-packaged-apps.md
|
||||
- name: Delete an AppLocker rule
|
||||
href: delete-an-applocker-rule.md
|
||||
- name: Edit AppLocker rules
|
||||
href: edit-applocker-rules.md
|
||||
- name: Enable the DLL rule collection
|
||||
href: enable-the-dll-rule-collection.md
|
||||
- name: Enforce AppLocker rules
|
||||
href: enforce-applocker-rules.md
|
||||
- name: Run the Automatically Generate Rules wizard
|
||||
href: run-the-automatically-generate-rules-wizard.md
|
||||
- name: Working with AppLocker policies
|
||||
href: working-with-applocker-policies.md
|
||||
items:
|
||||
- name: Configure the Application Identity service
|
||||
href: configure-the-application-identity-service.md
|
||||
- name: Configure an AppLocker policy for audit only
|
||||
href: configure-an-applocker-policy-for-audit-only.md
|
||||
- name: Configure an AppLocker policy for enforce rules
|
||||
href: configure-an-applocker-policy-for-enforce-rules.md
|
||||
- name: Display a custom URL message when users try to run a blocked app
|
||||
href: display-a-custom-url-message-when-users-try-to-run-a-blocked-application.md
|
||||
- name: Export an AppLocker policy from a GPO
|
||||
href: export-an-applocker-policy-from-a-gpo.md
|
||||
- name: Export an AppLocker policy to an XML file
|
||||
href: export-an-applocker-policy-to-an-xml-file.md
|
||||
- name: Import an AppLocker policy from another computer
|
||||
href: import-an-applocker-policy-from-another-computer.md
|
||||
- name: Import an AppLocker policy into a GPO
|
||||
href: import-an-applocker-policy-into-a-gpo.md
|
||||
- name: Add rules for packaged apps to existing AppLocker rule-set
|
||||
href: add-rules-for-packaged-apps-to-existing-applocker-rule-set.md
|
||||
- name: Merge AppLocker policies by using Set-ApplockerPolicy
|
||||
href: merge-applocker-policies-by-using-set-applockerpolicy.md
|
||||
- name: Merge AppLocker policies manually
|
||||
href: merge-applocker-policies-manually.md
|
||||
- name: Refresh an AppLocker policy
|
||||
href: refresh-an-applocker-policy.md
|
||||
- name: Test an AppLocker policy by using Test-AppLockerPolicy
|
||||
href: test-an-applocker-policy-by-using-test-applockerpolicy.md
|
||||
- name: AppLocker design guide
|
||||
href: applocker-policies-design-guide.md
|
||||
items:
|
||||
- name: Understand AppLocker policy design decisions
|
||||
href: understand-applocker-policy-design-decisions.md
|
||||
- name: Determine your application control objectives
|
||||
href: determine-your-application-control-objectives.md
|
||||
- name: Create a list of apps deployed to each business group
|
||||
href: create-list-of-applications-deployed-to-each-business-group.md
|
||||
items:
|
||||
- name: Document your app list
|
||||
href: document-your-application-list.md
|
||||
- name: Select the types of rules to create
|
||||
href: select-types-of-rules-to-create.md
|
||||
items:
|
||||
- name: Document your AppLocker rules
|
||||
href: document-your-applocker-rules.md
|
||||
- name: Determine the Group Policy structure and rule enforcement
|
||||
href: determine-group-policy-structure-and-rule-enforcement.md
|
||||
items:
|
||||
- name: Understand AppLocker enforcement settings
|
||||
href: understand-applocker-enforcement-settings.md
|
||||
- name: Understand AppLocker rules and enforcement setting inheritance in Group Policy
|
||||
href: understand-applocker-rules-and-enforcement-setting-inheritance-in-group-policy.md
|
||||
- name: Document the Group Policy structure and AppLocker rule enforcement
|
||||
href: document-group-policy-structure-and-applocker-rule-enforcement.md
|
||||
- name: Plan for AppLocker policy management
|
||||
href: plan-for-applocker-policy-management.md
|
||||
- name: AppLocker deployment guide
|
||||
href: applocker-policies-deployment-guide.md
|
||||
items:
|
||||
- name: Understand the AppLocker policy deployment process
|
||||
href: understand-the-applocker-policy-deployment-process.md
|
||||
- name: Requirements for Deploying AppLocker Policies
|
||||
href: requirements-for-deploying-applocker-policies.md
|
||||
- name: Use Software Restriction Policies and AppLocker policies
|
||||
href: using-software-restriction-policies-and-applocker-policies.md
|
||||
- name: Create Your AppLocker policies
|
||||
href: create-your-applocker-policies.md
|
||||
items:
|
||||
- name: Create Your AppLocker rules
|
||||
href: create-your-applocker-rules.md
|
||||
- name: Deploy the AppLocker policy into production
|
||||
href: deploy-the-applocker-policy-into-production.md
|
||||
items:
|
||||
- name: Use a reference device to create and maintain AppLocker policies
|
||||
href: use-a-reference-computer-to-create-and-maintain-applocker-policies.md
|
||||
- name: Determine which apps are digitally signed on a reference device
|
||||
href: determine-which-applications-are-digitally-signed-on-a-reference-computer.md
|
||||
- name: Configure the AppLocker reference device
|
||||
href: configure-the-appLocker-reference-device.md
|
||||
- name: AppLocker technical reference
|
||||
href: applocker-technical-reference.md
|
||||
items:
|
||||
- name: What Is AppLocker?
|
||||
href: what-is-applocker.md
|
||||
- name: Requirements to use AppLocker
|
||||
href: requirements-to-use-applocker.md
|
||||
- name: AppLocker policy use scenarios
|
||||
href: applocker-policy-use-scenarios.md
|
||||
- name: How AppLocker works
|
||||
href: how-applocker-works-techref.md
|
||||
items:
|
||||
- name: Understanding AppLocker rule behavior
|
||||
href: understanding-applocker-rule-behavior.md
|
||||
- name: Understanding AppLocker rule exceptions
|
||||
href: understanding-applocker-rule-exceptions.md
|
||||
- name: Understanding AppLocker rule collections
|
||||
href: understanding-applocker-rule-collections.md
|
||||
- name: Understanding AppLocker allow and deny actions on rules
|
||||
href: understanding-applocker-allow-and-deny-actions-on-rules.md
|
||||
- name: Understanding AppLocker rule condition types
|
||||
href: understanding-applocker-rule-condition-types.md
|
||||
items:
|
||||
- name: Understanding the publisher rule condition in AppLocker
|
||||
href: understanding-the-publisher-rule-condition-in-applocker.md
|
||||
- name: Understanding the path rule condition in AppLocker
|
||||
href: understanding-the-path-rule-condition-in-applocker.md
|
||||
- name: Understanding the file hash rule condition in AppLocker
|
||||
href: understanding-the-file-hash-rule-condition-in-applocker.md
|
||||
- name: Understanding AppLocker default rules
|
||||
href: understanding-applocker-default-rules.md
|
||||
items:
|
||||
- name: Executable rules in AppLocker
|
||||
href: executable-rules-in-applocker.md
|
||||
- name: Windows Installer rules in AppLocker
|
||||
href: windows-installer-rules-in-applocker.md
|
||||
- name: Script rules in AppLocker
|
||||
href: script-rules-in-applocker.md
|
||||
- name: DLL rules in AppLocker
|
||||
href: dll-rules-in-applocker.md
|
||||
- name: Packaged apps and packaged app installer rules in AppLocker
|
||||
href: packaged-apps-and-packaged-app-installer-rules-in-applocker.md
|
||||
- name: AppLocker architecture and components
|
||||
href: applocker-architecture-and-components.md
|
||||
- name: AppLocker processes and interactions
|
||||
href: applocker-processes-and-interactions.md
|
||||
- name: AppLocker functions
|
||||
href: applocker-functions.md
|
||||
- name: Security considerations for AppLocker
|
||||
href: security-considerations-for-applocker.md
|
||||
- name: Tools to Use with AppLocker
|
||||
href: tools-to-use-with-applocker.md
|
||||
items:
|
||||
- name: Using Event Viewer with AppLocker
|
||||
href: using-event-viewer-with-applocker.md
|
||||
- name: AppLocker Settings
|
||||
href: applocker-settings.md
|
@ -1,69 +1,113 @@
|
||||
---
|
||||
title: Enforce Windows Defender Application Control (WDAC) policies (Windows 10)
|
||||
description: Learn how to test a Windows Defender Application Control (WDAC) policy in enforced mode by following these steps in an elevated Windows PowerShell session.
|
||||
description: Learn how to switch a WDAC policy from audit to enforced mode.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
ms.author: dansimp
|
||||
ms.reviewer: jogeurte
|
||||
ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: dansimp
|
||||
ms.date: 05/03/2018
|
||||
ms.date: 04/22/2021
|
||||
ms.technology: mde
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Enforce Windows Defender Application Control policies
|
||||
# Enforce Windows Defender Application Control (WDAC) policies
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
- Windows 10
|
||||
- Windows Server 2016 and above
|
||||
|
||||
Every WDAC policy is created with audit mode enabled. After you have successfully deployed and tested a WDAC policy in audit mode and are ready to test the policy in enforced mode, complete the following steps in an elevated Windows PowerShell session:
|
||||
You should now have one or more WDAC policies broadly deployed in audit mode. You have analyzed events collected from the devices with those policies and you're ready to enforce. Use this procedure to prepare and deploy your WDAC policies in enforcement mode.
|
||||
|
||||
> [!NOTE]
|
||||
> Every WDAC policy should be tested in audit mode first. For information about how to audit WDAC policies, see [Audit Windows Defender Application Control policies](audit-windows-defender-application-control-policies.md), earlier in this topic.
|
||||
> Some of the steps described in this article only apply to Windows 10 version 1903 and above. When using this topic to plan your own organization's WDAC policies, consider whether your managed clients can use all or some of these features. Evaluate the impact for any features that may be unavailable on your clients running earlier versions of Windows 10 and Windows Server. You may need to adapt this guidance to meet your specific organization's needs.
|
||||
|
||||
1. Initialize the variables that will be used:
|
||||
## Convert WDAC **base** policy from audit to enforced
|
||||
|
||||
`$CIPolicyPath=$env:userprofile+"\Desktop\"`
|
||||
As described in [common WDAC deployment scenarios](types-of-devices.md), we'll use the example of **Lamna Healthcare Company (Lamna)** to illustrate this scenario. Lamna is attempting to adopt stronger application policies, including the use of application control to prevent unwanted or unauthorized applications from running on their managed devices.
|
||||
|
||||
`$InitialCIPolicy=$CIPolicyPath+"InitialScan.xml"`
|
||||
**Alice Pena** is the IT team lead responsible for Lamna's WDAC rollout.
|
||||
|
||||
`$EnforcedCIPolicy=$CIPolicyPath+"EnforcedPolicy.xml"`
|
||||
Alice previously created and deployed a policy for the organization's [fully managed devices](create-wdac-policy-for-fully-managed-devices.md). They updated the policy based on audit event data as described in [Use audit events to create WDAC policy rules](audit-windows-defender-application-control-policies.md) and redeployed it. All remaining audit events are as expected and Alice is ready to switch to enforcement mode.
|
||||
|
||||
`$CIPolicyBin=$CIPolicyPath+"EnforcedDeviceGuardPolicy.bin"`
|
||||
1. Initialize the variables that will be used and create the enforced policy by copying the audit version.
|
||||
|
||||
```powershell
|
||||
$EnforcedPolicyName = "Lamna_FullyManagedClients_Enforced"
|
||||
$AuditPolicyXML = $env:USERPROFILE+"\Desktop\Lamna_FullyManagedClients_Audit.xml"
|
||||
$EnforcedPolicyXML = $env:USERPROFILE+"\Desktop\"+$EnforcedPolicyName+".xml"
|
||||
cp $AuditPolicyXML $EnforcedPolicyXML
|
||||
```
|
||||
|
||||
2. Use [Set-CIPolicyIdInfo](/powershell/module/configci/set-cipolicyidinfo) to give the new policy a unique ID, and descriptive name. Changing the ID and name lets you deploy the enforced policy side by side with the audit policy. Do this step if you plan to harden your WDAC policy over time. If you prefer to replace the audit policy in-place, you can skip this step.
|
||||
|
||||
```powershell
|
||||
$EnforcedPolicyID = Set-CIPolicyIdInfo -FilePath $EnforcedPolicyXML -PolicyName $EnforcedPolicyName -ResetPolicyID
|
||||
$EnforcedPolicyID = $EnforcedPolicyID.Substring(11)
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> The initial WDAC policy that this section refers to was created in the [Create a Windows Defender Application Control policy from a reference computer](create-initial-default-policy.md) section. If you are using a different WDAC policy, update the **CIPolicyPath** and **InitialCIPolicy** variables.
|
||||
> If Set-CIPolicyIdInfo does not output the new PolicyID value on your Windows 10 version, you will need to obtain the *PolicyId* value from the XML directly.
|
||||
|
||||
2. Ensure that rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) are set the way that you intend for this policy. We strongly recommend that you enable these rule options before you run any enforced policy for the first time. Enabling these options provides administrators with a pre-boot command prompt, and allows Windows to start even if the WDAC policy blocks a kernel-mode driver from running. When ready for enterprise deployment, you can remove these options.
|
||||
3. *[Optionally]* Use [Set-RuleOption](/powershell/module/configci/set-ruleoption) to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”). Option 9 allows users to disable WDAC enforcement for a single boot session from a pre-boot menu. Option 10 instructs Windows to switch the policy from enforcement to audit only if a boot critical kernel-mode driver is blocked. We strongly recommend these options when deploying a new enforced policy to your first deployment ring. Then, if no issues are found, you can remove the options and restart your deployment.
|
||||
|
||||
To ensure that these options are enabled in a policy, use [Set-RuleOption](/powershell/module/configci/set-ruleoption) as shown in the following commands. You can run these commands even if you're not sure whether options 9 and 10 are already enabled—if so, the commands have no effect.
|
||||
|
||||
`Set-RuleOption -FilePath $InitialCIPolicy -Option 9`
|
||||
|
||||
`Set-RuleOption -FilePath $InitialCIPolicy -Option 10`
|
||||
```powershell
|
||||
Set-RuleOption -FilePath $EnforcedPolicyXML -Option 9
|
||||
Set-RuleOption -FilePath $EnforcedPolicyXML -Option 10
|
||||
```
|
||||
|
||||
3. Copy the initial file to maintain an original copy:
|
||||
4. Use Set-RuleOption to delete the audit mode rule option, which changes the policy to enforcement:
|
||||
|
||||
`copy $InitialCIPolicy $EnforcedCIPolicy`
|
||||
```powershell
|
||||
Set-RuleOption -FilePath $EnforcedPolicyXML -Option 3 -Delete
|
||||
```
|
||||
|
||||
4. Use Set-RuleOption to delete the audit mode rule option:
|
||||
|
||||
`Set-RuleOption -FilePath $EnforcedCIPolicy -Option 3 -Delete`
|
||||
5. Use [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy) to convert the new WDAC policy to binary:
|
||||
|
||||
> [!NOTE]
|
||||
> To enforce a WDAC policy, you delete option 3, the **Audit Mode Enabled** option. There is no “enforced” option that can be placed in a WDAC policy.
|
||||
> If you did not use -ResetPolicyID in Step 2 above, then you must replace $EnforcedPolicyID in the following command with the *PolicyID* attribute found in your base policy XML.
|
||||
|
||||
5. Use [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy) to convert the new WDAC policy to binary format:
|
||||
```powershell
|
||||
$EnforcedPolicyBinary = $env:USERPROFILE+"\Desktop\"+$EnforcedPolicyName+"_"+$EnforcedPolicyID+".xml"
|
||||
ConvertFrom-CIPolicy $EnforcedPolicyXML $EnforcedPolicyBinary
|
||||
```
|
||||
|
||||
`ConvertFrom-CIPolicy $EnforcedCIPolicy $CIPolicyBin`
|
||||
## Make copies of any needed **supplemental** policies to use with the enforced base policy
|
||||
|
||||
Now that this policy is in enforced mode, you can deploy it to your test computers. Rename the policy to SIPolicy.p7b and copy it to C:\\Windows\\System32\\CodeIntegrity for testing, or deploy the policy through Group Policy by following the instructions in [Deploy and manage Windows Defender Application Control with Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md). You can also use other client management software to deploy and manage the policy.
|
||||
Since the enforced policy was given a unique PolicyID in the previous procedure, you need to duplicate any needed supplemental policies to use with the enforced policy. Supplemental policies always inherit the Audit or Enforcement mode from the base policy they modify. If you didn't reset the enforcement base policy's PolicyID, you can skip this procedure.
|
||||
|
||||
1. Initialize the variables that will be used and create a copy of the current supplemental policy. Some variables and files from the previous procedure will also be used.
|
||||
|
||||
```powershell
|
||||
$SupplementalPolicyName = "Lamna_Supplemental1"
|
||||
$CurrentSupplementalPolicy = $env:USERPROFILE+"\Desktop\"+$SupplementalPolicyName+"_Audit.xml"
|
||||
$EnforcedSupplementalPolicy = $env:USERPROFILE+"\Desktop\"+$SupplementalPolicyName+"_Enforced.xml"
|
||||
```
|
||||
|
||||
2. Use [Set-CIPolicyIdInfo](/powershell/module/configci/set-cipolicyidinfo) to give the new supplemental policy a unique ID and descriptive name, and change which base policy to supplement.
|
||||
|
||||
```powershell
|
||||
$SupplementalPolicyID = Set-CIPolicyIdInfo -FilePath $EnforcedSupplementalPolicy -PolicyName $SupplementalPolicyName -SupplementsBasePolicyID $EnforcedPolicyID -BasePolicyToSupplementPath $EnforcedPolicyXML -ResetPolicyID
|
||||
$SupplementalPolicyID = $SupplementalPolicyID.Substring(11)
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> If Set-CIPolicyIdInfo does not output the new PolicyID value on your Windows 10 version, you will need to obtain the *PolicyId* value from the XML directly.
|
||||
|
||||
3. Use [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy) to convert the new WDAC supplemental policy to binary:
|
||||
|
||||
```powershell
|
||||
$EnforcedSuppPolicyBinary = $env:USERPROFILE+"\Desktop\"+$SupplementalPolicyName+"_"+$SupplementalPolicyID+".xml"
|
||||
ConvertFrom-CIPolicy $EnforcedSupplementalPolicy $EnforcedSuppPolicyBinary
|
||||
```
|
||||
4. Repeat the steps above if you have other supplemental policies to update.
|
||||
|
||||
## Deploy your enforced policy and supplemental policies
|
||||
|
||||
Now that your base policy is in enforced mode, you can begin to deploy it to your managed endpoints. For information about deploying policies, see [Deploying Windows Defender Application Control (WDAC) policies](windows-defender-application-control-deployment-guide.md).
|
||||
|
@ -1,58 +1,94 @@
|
||||
---
|
||||
title: Merge Windows Defender Application Control policies (Windows 10)
|
||||
description: Because each computer running Windows 10 can have only one WDAC policy, you will occasionally need to merge two or more policies. Learn how with this guide.
|
||||
title: Merge Windows Defender Application Control policies (WDAC) (Windows 10)
|
||||
description: Learn how to merge WDAC policies as part of your policy lifecycle management.
|
||||
keywords: security, malware
|
||||
ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb
|
||||
ms.prod: m365-security
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
author: jsuther1974
|
||||
ms.reviewer: isbrahm
|
||||
ms.author: dansimp
|
||||
ms.reviewer: jogeurte
|
||||
ms.author: jogeurte
|
||||
ms.manager: jsuther
|
||||
manager: dansimp
|
||||
ms.date: 05/03/2018
|
||||
ms.date: 04/22/2021
|
||||
ms.technology: mde
|
||||
ms.topic: article
|
||||
ms.localizationpriority: medium
|
||||
---
|
||||
|
||||
# Merge Windows Defender Application Control policies
|
||||
# Merge Windows Defender Application Control (WDAC) policies
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
- Windows 10
|
||||
- Windows Server 2016 and above
|
||||
|
||||
Because each computer running Windows 10 can have only one WDAC policy, you will occasionally need to merge two or more policies. For example, after a WDAC policy is created and audited, you might want to merge audit events from another WDAC policy.
|
||||
This article shows how to merge multiple policy XML files together and how to merge rules directly into a policy. WDAC deployments often include a few base policies and optional supplemental policies for specific use cases.
|
||||
|
||||
> [!NOTE]
|
||||
> Because only one SiPolicy.p7b file can be active on a system, the last management authority to write the policy wins. If there was already a policy deployed by using Group Policy and then a managed installer using Microsoft Endpoint Configuration Manager targeted the same device, the Configuration Manager policy would overwrite the SiPolicy.p7b file.
|
||||
> Prior to Windows version 1903, including Windows Server 2019 and earlier, only one WDAC policy can be active on a system at a time. If you need to use WDAC on systems running these earlier versions of Windows, you must merge all policies before deploying.
|
||||
|
||||
To merge two WDAC policies, complete the following steps in an elevated Windows PowerShell session:
|
||||
## Merge multiple WDAC policy XML files together
|
||||
|
||||
There are many scenarios where you may want to merge two or more policy files together. For example, if you [use audit events to create WDAC policy rules](audit-windows-defender-application-control-policies.md), you can merge those rules with your existing WDAC base policy. To merge the two WDAC policies referenced in that article, complete the following steps in an elevated Windows PowerShell session.
|
||||
|
||||
1. Initialize the variables that will be used:
|
||||
|
||||
`$CIPolicyPath=$env:userprofile+"\Desktop\"`
|
||||
|
||||
`$InitialCIPolicy=$CIPolicyPath+"InitialScan.xml"`
|
||||
|
||||
`$AuditCIPolicy=$CIPolicyPath+"DeviceGuardAuditPolicy.xml"`
|
||||
|
||||
`$MergedCIPolicy=$CIPolicyPath+"MergedPolicy.xml"`
|
||||
|
||||
`$CIPolicyBin=$CIPolicyPath+"NewDeviceGuardPolicy.bin"`
|
||||
|
||||
> [!NOTE]
|
||||
> The variables in this section specifically expect to find an initial policy on your desktop called **InitialScan.xml** and an audit WDAC policy called **DeviceGuardAuditPolicy.xml**. If you want to merge other WDAC policies, update the variables accordingly.
|
||||
```powershell
|
||||
$PolicyName= "Lamna_FullyManagedClients_Audit"
|
||||
$LamnaPolicy=$env:userprofile+"\Desktop\"+$PolicyName+".xml"
|
||||
$EventsPolicy=$env:userprofile+"\Desktop\EventsPolicy.xml"
|
||||
$MergedPolicy=$env:userprofile+"\Desktop\"+$PolicyName+"_Merged.xml"
|
||||
```
|
||||
|
||||
2. Use [Merge-CIPolicy](/powershell/module/configci/merge-cipolicy) to merge two policies and create a new WDAC policy:
|
||||
|
||||
`Merge-CIPolicy -PolicyPaths $InitialCIPolicy,$AuditCIPolicy -OutputFilePath $MergedCIPolicy`
|
||||
```powershell
|
||||
Merge-CIPolicy -PolicyPaths $LamnaPolicy,$EventsPolicy -OutputFilePath $MergedPolicy
|
||||
```
|
||||
|
||||
3. Use [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy) to convert the merged WDAC policy to binary format:
|
||||
> [!NOTE]
|
||||
> You can merge additional policies with the Merge-CIPolicy step above by adding them to the -PolicyPaths parameter separated by commas. The new policy file specified by -OutputFilePath will have the Policy information from the first policy in the list. For example, in the above example, the $MergedPolicy will inherit the policy type, ID, name, and version information from $LamnaPolicy. To change any of those values, use [Set-CIPolicyIdInfo](/powershell/module/configci/set-cipolicyidinfo) and [Set-CIPolicyVersion](/powershell/module/configci/set-cipolicyversion).
|
||||
|
||||
`ConvertFrom-CIPolicy $MergedCIPolicy $CIPolicyBin`
|
||||
## Merge WDAC rules directly into a policy XML
|
||||
|
||||
Now that you have created a new WDAC policy, you can deploy the policy binary to systems manually or by using Group Policy or Microsoft client management solutions. For information about how to deploy this new policy with Group Policy, see [Deploy and manage Windows Defender Application Control with Group Policy](deploy-windows-defender-application-control-policies-using-group-policy.md).
|
||||
Besides merging multiple policy XML files, you can also merge rules created with the New-CIPolicyRule cmdlet directly into an existing WDAC policy XML file. Directly merging rules is a convenient way to update your policy without creating extra policy XML files. For example, to add rules that allow the WDAC Wizard and the WDAC RefreshPolicy.exe tool, follow these steps:
|
||||
|
||||
1. Install the [WDAC Wizard](wdac-wizard.md) packaged MSIX app.
|
||||
2. Download the [Refresh Policy tool](https://aka.ms/refreshpolicy) for your processor architecture and save it to your desktop as RefreshPolicy.exe.
|
||||
3. From a PowerShell session, run the following commands to create packaged app allow rules for the WDAC Wizard:
|
||||
|
||||
```powershell
|
||||
$PackageInfo = Get-AppxPackage -Name Microsoft.WDAC.WDACWizard
|
||||
$Rules = New-CIPolicyRule -Package $PackageInfo
|
||||
```
|
||||
|
||||
4. Add FilePublisher rules for the RefreshPolicy.exe:
|
||||
|
||||
```powershell
|
||||
$Rules += New-CIPolicyRule -DriverFilePath $env:USERPROFILE\Desktop\RefreshPolicy.exe -Level FilePublisher
|
||||
```
|
||||
|
||||
5. Use [Merge-CIPolicy](/powershell/module/configci/merge-cipolicy) to merge the new rules directly into the MergedPolicy file created in the previous procedure's final step:
|
||||
|
||||
```powershell
|
||||
Merge-CIPolicy -PolicyPaths $MergedPolicy -OutputFilePath $MergedPolicy -Rules $Rules
|
||||
```
|
||||
|
||||
## Convert and deploy merged policy to managed endpoints
|
||||
|
||||
Now that you have your new, merged policy, you can convert and deploy the policy binary to your managed endpoints.
|
||||
|
||||
1. Use [ConvertFrom-CIPolicy](/powershell/module/configci/convertfrom-cipolicy) to convert the WDAC policy to a binary format:
|
||||
|
||||
```powershell
|
||||
$WDACPolicyBin=$env:userprofile+"\Desktop\"+$PolicyName+"_{InsertPolicyID}.bin"
|
||||
ConvertFrom-CIPolicy -XMLFilePath $MergedPolicy -BinaryFilePath $WDACPolicyBin
|
||||
```
|
||||
|
||||
> [!NOTE]
|
||||
> In the sample commands above, for policies targeting Windows 10 version 1903+, replace the string "{InsertPolicyID}" with the actual PolicyID GUID (including braces **{ }**) found in your policy XML file. For Windows 10 versions prior to 1903, use the name SiPolicy.p7b for the binary file name.
|
||||
|
||||
2. Upload your merged policy XML and the associated binary to the source control solution you are using for your WDAC policies. such as [GitHub](https://github.com/) or a document management solution such as [Office 365 SharePoint](https://products.office.com/sharepoint/collaboration).
|
||||
|
||||
3. Deploy the merged policy using your preferred deployment solution. See [Deploying Windows Defender Application Control (WDAC) policies](windows-defender-application-control-deployment-guide.md)
|
||||
|
@ -1,184 +0,0 @@
|
||||
# [Windows Firewall with Advanced Security](windows-firewall-with-advanced-security.md)
|
||||
|
||||
## [Plan deployment]()
|
||||
|
||||
### [Design guide](windows-firewall-with-advanced-security-design-guide.md)
|
||||
|
||||
### [Design process](understanding-the-windows-firewall-with-advanced-security-design-process.md)
|
||||
|
||||
### [Implementation goals]()
|
||||
#### [Identify implementation goals](identifying-your-windows-firewall-with-advanced-security-deployment-goals.md)
|
||||
#### [Protect devices from unwanted network traffic](protect-devices-from-unwanted-network-traffic.md)
|
||||
#### [Restrict access to only trusted devices](restrict-access-to-only-trusted-devices.md)
|
||||
#### [Require encryption](require-encryption-when-accessing-sensitive-network-resources.md)
|
||||
#### [Restrict access](restrict-access-to-only-specified-users-or-devices.md)
|
||||
|
||||
### [Implementation designs]()
|
||||
#### [Mapping goals to a design](mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md)
|
||||
|
||||
#### [Basic firewall design](basic-firewall-policy-design.md)
|
||||
##### [Basic firewall design example](firewall-policy-design-example.md)
|
||||
|
||||
|
||||
#### [Domain isolation design](domain-isolation-policy-design.md)
|
||||
##### [Domain isolation design example](domain-isolation-policy-design-example.md)
|
||||
|
||||
|
||||
#### [Server isolation design](server-isolation-policy-design.md)
|
||||
##### [Server Isolation design example](server-isolation-policy-design-example.md)
|
||||
|
||||
|
||||
#### [Certificate-based isolation design](certificate-based-isolation-policy-design.md)
|
||||
##### [Certificate-based Isolation design example](certificate-based-isolation-policy-design-example.md)
|
||||
|
||||
### [Design planning]()
|
||||
#### [Planning your design](planning-your-windows-firewall-with-advanced-security-design.md)
|
||||
|
||||
#### [Planning settings for a basic firewall policy](planning-settings-for-a-basic-firewall-policy.md)
|
||||
|
||||
#### [Planning domain isolation zones]()
|
||||
##### [Domain isolation zones](planning-domain-isolation-zones.md)
|
||||
##### [Exemption list](exemption-list.md)
|
||||
##### [Isolated domain](isolated-domain.md)
|
||||
##### [Boundary zone](boundary-zone.md)
|
||||
##### [Encryption zone](encryption-zone.md)
|
||||
|
||||
#### [Planning server isolation zones](planning-server-isolation-zones.md)
|
||||
|
||||
#### [Planning certificate-based authentication](planning-certificate-based-authentication.md)
|
||||
##### [Documenting the Zones](documenting-the-zones.md)
|
||||
|
||||
##### [Planning group policy deployment for your isolation zones](planning-group-policy-deployment-for-your-isolation-zones.md)
|
||||
###### [Planning isolation groups for the zones](planning-isolation-groups-for-the-zones.md)
|
||||
###### [Planning network access groups](planning-network-access-groups.md)
|
||||
|
||||
###### [Planning the GPOs](planning-the-gpos.md)
|
||||
####### [Firewall GPOs](firewall-gpos.md)
|
||||
######## [GPO_DOMISO_Firewall](gpo-domiso-firewall.md)
|
||||
####### [Isolated domain GPOs](isolated-domain-gpos.md)
|
||||
######## [GPO_DOMISO_IsolatedDomain_Clients](gpo-domiso-isolateddomain-clients.md)
|
||||
######## [GPO_DOMISO_IsolatedDomain_Servers](gpo-domiso-isolateddomain-servers.md)
|
||||
####### [Boundary zone GPOs](boundary-zone-gpos.md)
|
||||
######## [GPO_DOMISO_Boundary](gpo-domiso-boundary.md)
|
||||
####### [Encryption zone GPOs](encryption-zone-gpos.md)
|
||||
######## [GPO_DOMISO_Encryption](gpo-domiso-encryption.md)
|
||||
####### [Server isolation GPOs](server-isolation-gpos.md)
|
||||
|
||||
###### [Planning GPO deployment](planning-gpo-deployment.md)
|
||||
|
||||
|
||||
### [Planning to deploy](planning-to-deploy-windows-firewall-with-advanced-security.md)
|
||||
|
||||
|
||||
## [Deployment guide]()
|
||||
### [Deployment overview](windows-firewall-with-advanced-security-deployment-guide.md)
|
||||
|
||||
### [Implementing your plan](implementing-your-windows-firewall-with-advanced-security-design-plan.md)
|
||||
|
||||
### [Basic firewall deployment]()
|
||||
#### [Checklist: Implementing a basic firewall policy design](checklist-implementing-a-basic-firewall-policy-design.md)
|
||||
|
||||
|
||||
|
||||
### [Domain isolation deployment]()
|
||||
#### [Checklist: Implementing a Domain Isolation Policy Design](checklist-implementing-a-domain-isolation-policy-design.md)
|
||||
|
||||
|
||||
|
||||
### [Server isolation deployment]()
|
||||
#### [Checklist: Implementing a Standalone Server Isolation Policy Design](checklist-implementing-a-standalone-server-isolation-policy-design.md)
|
||||
|
||||
|
||||
|
||||
### [Certificate-based authentication]()
|
||||
#### [Checklist: Implementing a Certificate-based Isolation Policy Design](checklist-implementing-a-certificate-based-isolation-policy-design.md)
|
||||
|
||||
|
||||
|
||||
## [Best practices]()
|
||||
### [Configuring the firewall](best-practices-configuring.md)
|
||||
### [Securing IPsec](securing-end-to-end-ipsec-connections-by-using-ikev2.md)
|
||||
### [PowerShell](windows-firewall-with-advanced-security-administration-with-windows-powershell.md)
|
||||
### [Isolating Microsoft Store Apps on Your Network](isolating-apps-on-your-network.md)
|
||||
|
||||
|
||||
## [How-to]()
|
||||
### [Add Production devices to the membership group for a zone](add-production-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Add test devices to the membership group for a zone](add-test-devices-to-the-membership-group-for-a-zone.md)
|
||||
### [Assign security group filters to the GPO](assign-security-group-filters-to-the-gpo.md)
|
||||
### [Change rules from request to require mode](Change-Rules-From-Request-To-Require-Mode.Md)
|
||||
### [Configure authentication methods](Configure-authentication-methods.md)
|
||||
### [Configure data protection (Quick Mode) settings](configure-data-protection-quick-mode-settings.md)
|
||||
### [Configure Group Policy to autoenroll and deploy certificates](configure-group-policy-to-autoenroll-and-deploy-certificates.md)
|
||||
### [Configure key exchange (main mode) settings](configure-key-exchange-main-mode-settings.md)
|
||||
### [Configure the rules to require encryption](configure-the-rules-to-require-encryption.md)
|
||||
### [Configure the Windows Firewall log](configure-the-windows-firewall-log.md)
|
||||
### [Configure the workstation authentication certificate template](configure-the-workstation-authentication-certificate-template.md)
|
||||
### [Configure Windows Firewall to suppress notifications when a program is blocked](configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md)
|
||||
### [Confirm that certificates are deployed correctly](confirm-that-certificates-are-deployed-correctly.md)
|
||||
### [Copy a GPO to create a new GPO](copy-a-gpo-to-create-a-new-gpo.md)
|
||||
### [Create a Group Account in Active Directory](create-a-group-account-in-active-directory.md)
|
||||
### [Create a Group Policy Object](create-a-group-policy-object.md)
|
||||
### [Create an authentication exemption list rule](create-an-authentication-exemption-list-rule.md)
|
||||
### [Create an authentication request rule](create-an-authentication-request-rule.md)
|
||||
### [Create an inbound ICMP rule](create-an-inbound-icmp-rule.md)
|
||||
### [Create an inbound port rule](create-an-inbound-port-rule.md)
|
||||
### [Create an inbound program or service rule](create-an-inbound-program-or-service-rule.md)
|
||||
### [Create an outbound port rule](create-an-outbound-port-rule.md)
|
||||
### [Create an outbound program or service rule](create-an-outbound-program-or-service-rule.md)
|
||||
### [Create inbound rules to support RPC](create-inbound-rules-to-support-rpc.md)
|
||||
### [Create WMI filters for the GPO](create-wmi-filters-for-the-gpo.md)
|
||||
### [Create Windows Firewall rules in Intune](create-windows-firewall-rules-in-intune.md)
|
||||
### [Enable predefined inbound rules](enable-predefined-inbound-rules.md)
|
||||
### [Enable predefined outbound rules](enable-predefined-outbound-rules.md)
|
||||
### [Exempt ICMP from authentication](exempt-icmp-from-authentication.md)
|
||||
### [Link the GPO to the domain](link-the-gpo-to-the-domain.md)
|
||||
### [Modify GPO filters](modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md)
|
||||
### [Open IP security policies](open-the-group-policy-management-console-to-ip-security-policies.md)
|
||||
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall.md)
|
||||
### [Open Group Policy](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md)
|
||||
### [Open Windows Firewall](open-windows-firewall-with-advanced-security.md)
|
||||
### [Restrict server access](restrict-server-access-to-members-of-a-group-only.md)
|
||||
### [Enable Windows Firewall](turn-on-windows-firewall-and-configure-default-behavior.md)
|
||||
### [Verify Network Traffic](verify-that-network-traffic-is-authenticated.md)
|
||||
|
||||
|
||||
## [References]()
|
||||
### [Checklist: Creating Group Policy objects](checklist-creating-group-policy-objects.md)
|
||||
### [Checklist: Creating inbound firewall rules](checklist-creating-inbound-firewall-rules.md)
|
||||
### [Checklist: Creating outbound firewall rules](checklist-creating-outbound-firewall-rules.md)
|
||||
### [Checklist: Configuring basic firewall settings](checklist-configuring-basic-firewall-settings.md)
|
||||
|
||||
|
||||
### [Checklist: Configuring rules for the isolated domain](checklist-configuring-rules-for-the-isolated-domain.md)
|
||||
### [Checklist: Configuring rules for the boundary zone](checklist-configuring-rules-for-the-boundary-zone.md)
|
||||
### [Checklist: Configuring rules for the encryption zone](checklist-configuring-rules-for-the-encryption-zone.md)
|
||||
### [Checklist: Configuring rules for an isolated server zone](checklist-configuring-rules-for-an-isolated-server-zone.md)
|
||||
|
||||
### [Checklist: Configuring rules for servers in a standalone isolated server zone](checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md)
|
||||
### [Checklist: Creating rules for clients of a standalone isolated server zone](checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md)
|
||||
|
||||
|
||||
### [Appendix A: Sample GPO template files for settings used in this guide](appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md)
|
||||
|
||||
|
||||
|
||||
## [Troubleshooting]()
|
||||
### [Troubleshooting UWP app connectivity issues in Windows Firewall](troubleshooting-uwp-firewall.md)
|
||||
### [Filter origin audit log improvements](filter-origin-documentation.md)
|
||||
### [Quarantine behavior](quarantine.md)
|
||||
### [Firewall settings lost on upgrade](firewall-settings-lost-on-upgrade.md)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
252
windows/security/threat-protection/windows-firewall/TOC.yml
Normal file
252
windows/security/threat-protection/windows-firewall/TOC.yml
Normal file
@ -0,0 +1,252 @@
|
||||
- name: Windows Firewall with Advanced Security
|
||||
href: windows-firewall-with-advanced-security.md
|
||||
items:
|
||||
- name: Plan deployment
|
||||
items:
|
||||
- name: Design guide
|
||||
href: windows-firewall-with-advanced-security-design-guide.md
|
||||
- name: Design process
|
||||
href: understanding-the-windows-firewall-with-advanced-security-design-process.md
|
||||
- name: Implementation goals
|
||||
items:
|
||||
- name: Identify implementation goals
|
||||
href: identifying-your-windows-firewall-with-advanced-security-deployment-goals.md
|
||||
- name: Protect devices from unwanted network traffic
|
||||
href: protect-devices-from-unwanted-network-traffic.md
|
||||
- name: Restrict access to only trusted devices
|
||||
href: restrict-access-to-only-trusted-devices.md
|
||||
- name: Require encryption
|
||||
href: require-encryption-when-accessing-sensitive-network-resources.md
|
||||
- name: Restrict access
|
||||
href: restrict-access-to-only-specified-users-or-devices.md
|
||||
- name: Implementation designs
|
||||
items:
|
||||
- name: Mapping goals to a design
|
||||
href: mapping-your-deployment-goals-to-a-windows-firewall-with-advanced-security-design.md
|
||||
- name: Basic firewall design
|
||||
href: basic-firewall-policy-design.md
|
||||
items:
|
||||
- name: Basic firewall design example
|
||||
href: firewall-policy-design-example.md
|
||||
- name: Domain isolation design
|
||||
href: domain-isolation-policy-design.md
|
||||
items:
|
||||
- name: Domain isolation design example
|
||||
href: domain-isolation-policy-design-example.md
|
||||
- name: Server isolation design
|
||||
href: server-isolation-policy-design.md
|
||||
items:
|
||||
- name: Server Isolation design example
|
||||
href: server-isolation-policy-design-example.md
|
||||
- name: Certificate-based isolation design
|
||||
href: certificate-based-isolation-policy-design.md
|
||||
items:
|
||||
- name: Certificate-based Isolation design example
|
||||
href: certificate-based-isolation-policy-design-example.md
|
||||
- name: Design planning
|
||||
items:
|
||||
- name: Planning your design
|
||||
href: planning-your-windows-firewall-with-advanced-security-design.md
|
||||
- name: Planning settings for a basic firewall policy
|
||||
href: planning-settings-for-a-basic-firewall-policy.md
|
||||
- name: Planning domain isolation zones
|
||||
items:
|
||||
- name: Domain isolation zones
|
||||
href: planning-domain-isolation-zones.md
|
||||
- name: Exemption list
|
||||
href: exemption-list.md
|
||||
- name: Isolated domain
|
||||
href: isolated-domain.md
|
||||
- name: Boundary zone
|
||||
href: boundary-zone.md
|
||||
- name: Encryption zone
|
||||
href: encryption-zone.md
|
||||
- name: Planning server isolation zones
|
||||
href: planning-server-isolation-zones.md
|
||||
- name: Planning certificate-based authentication
|
||||
href: planning-certificate-based-authentication.md
|
||||
items:
|
||||
- name: Documenting the Zones
|
||||
href: documenting-the-zones.md
|
||||
- name: Planning group policy deployment for your isolation zones
|
||||
href: planning-group-policy-deployment-for-your-isolation-zones.md
|
||||
items:
|
||||
- name: Planning isolation groups for the zones
|
||||
href: planning-isolation-groups-for-the-zones.md
|
||||
- name: Planning network access groups
|
||||
href: planning-network-access-groups.md
|
||||
- name: Planning the GPOs
|
||||
href: planning-the-gpos.md
|
||||
items:
|
||||
- name: Firewall GPOs
|
||||
href: firewall-gpos.md
|
||||
items:
|
||||
- name: GPO_DOMISO_Firewall
|
||||
href: gpo-domiso-firewall.md
|
||||
- name: Isolated domain GPOs
|
||||
href: isolated-domain-gpos.md
|
||||
items:
|
||||
- name: GPO_DOMISO_IsolatedDomain_Clients
|
||||
href: gpo-domiso-isolateddomain-clients.md
|
||||
- name: GPO_DOMISO_IsolatedDomain_Servers
|
||||
href: gpo-domiso-isolateddomain-servers.md
|
||||
- name: Boundary zone GPOs
|
||||
href: boundary-zone-gpos.md
|
||||
items:
|
||||
- name: GPO_DOMISO_Boundary
|
||||
href: gpo-domiso-boundary.md
|
||||
- name: Encryption zone GPOs
|
||||
href: encryption-zone-gpos.md
|
||||
items:
|
||||
- name: GPO_DOMISO_Encryption
|
||||
href: gpo-domiso-encryption.md
|
||||
- name: Server isolation GPOs
|
||||
href: server-isolation-gpos.md
|
||||
- name: Planning GPO deployment
|
||||
href: planning-gpo-deployment.md
|
||||
- name: Planning to deploy
|
||||
href: planning-to-deploy-windows-firewall-with-advanced-security.md
|
||||
- name: Deployment guide
|
||||
items:
|
||||
- name: Deployment overview
|
||||
href: windows-firewall-with-advanced-security-deployment-guide.md
|
||||
- name: Implementing your plan
|
||||
href: implementing-your-windows-firewall-with-advanced-security-design-plan.md
|
||||
- name: Basic firewall deployment
|
||||
items:
|
||||
- name: "Checklist: Implementing a basic firewall policy design"
|
||||
href: checklist-implementing-a-basic-firewall-policy-design.md
|
||||
- name: Domain isolation deployment
|
||||
items:
|
||||
- name: "Checklist: Implementing a Domain Isolation Policy Design"
|
||||
href: checklist-implementing-a-domain-isolation-policy-design.md
|
||||
- name: Server isolation deployment
|
||||
items:
|
||||
- name: "Checklist: Implementing a Standalone Server Isolation Policy Design"
|
||||
href: checklist-implementing-a-standalone-server-isolation-policy-design.md
|
||||
- name: Certificate-based authentication
|
||||
items:
|
||||
- name: "Checklist: Implementing a Certificate-based Isolation Policy Design"
|
||||
href: checklist-implementing-a-certificate-based-isolation-policy-design.md
|
||||
- name: Best practices
|
||||
items:
|
||||
- name: Configuring the firewall
|
||||
href: best-practices-configuring.md
|
||||
- name: Securing IPsec
|
||||
href: securing-end-to-end-ipsec-connections-by-using-ikev2.md
|
||||
- name: PowerShell
|
||||
href: windows-firewall-with-advanced-security-administration-with-windows-powershell.md
|
||||
- name: Isolating Microsoft Store Apps on Your Network
|
||||
href: isolating-apps-on-your-network.md
|
||||
- name: How-to
|
||||
items:
|
||||
- name: Add Production devices to the membership group for a zone
|
||||
href: add-production-devices-to-the-membership-group-for-a-zone.md
|
||||
- name: Add test devices to the membership group for a zone
|
||||
href: add-test-devices-to-the-membership-group-for-a-zone.md
|
||||
- name: Assign security group filters to the GPO
|
||||
href: assign-security-group-filters-to-the-gpo.md
|
||||
- name: Change rules from request to require mode
|
||||
href: Change-Rules-From-Request-To-Require-Mode.Md
|
||||
- name: Configure authentication methods
|
||||
href: Configure-authentication-methods.md
|
||||
- name: Configure data protection (Quick Mode) settings
|
||||
href: configure-data-protection-quick-mode-settings.md
|
||||
- name: Configure Group Policy to autoenroll and deploy certificates
|
||||
href: configure-group-policy-to-autoenroll-and-deploy-certificates.md
|
||||
- name: Configure key exchange (main mode) settings
|
||||
href: configure-key-exchange-main-mode-settings.md
|
||||
- name: Configure the rules to require encryption
|
||||
href: configure-the-rules-to-require-encryption.md
|
||||
- name: Configure the Windows Firewall log
|
||||
href: configure-the-windows-firewall-log.md
|
||||
- name: Configure the workstation authentication certificate template
|
||||
href: configure-the-workstation-authentication-certificate-template.md
|
||||
- name: Configure Windows Firewall to suppress notifications when a program is blocked
|
||||
href: configure-windows-firewall-to-suppress-notifications-when-a-program-is-blocked.md
|
||||
- name: Confirm that certificates are deployed correctly
|
||||
href: confirm-that-certificates-are-deployed-correctly.md
|
||||
- name: Copy a GPO to create a new GPO
|
||||
href: copy-a-gpo-to-create-a-new-gpo.md
|
||||
- name: Create a Group Account in Active Directory
|
||||
href: create-a-group-account-in-active-directory.md
|
||||
- name: Create a Group Policy Object
|
||||
href: create-a-group-policy-object.md
|
||||
- name: Create an authentication exemption list rule
|
||||
href: create-an-authentication-exemption-list-rule.md
|
||||
- name: Create an authentication request rule
|
||||
href: create-an-authentication-request-rule.md
|
||||
- name: Create an inbound ICMP rule
|
||||
href: create-an-inbound-icmp-rule.md
|
||||
- name: Create an inbound port rule
|
||||
href: create-an-inbound-port-rule.md
|
||||
- name: Create an inbound program or service rule
|
||||
href: create-an-inbound-program-or-service-rule.md
|
||||
- name: Create an outbound port rule
|
||||
href: create-an-outbound-port-rule.md
|
||||
- name: Create an outbound program or service rule
|
||||
href: create-an-outbound-program-or-service-rule.md
|
||||
- name: Create inbound rules to support RPC
|
||||
href: create-inbound-rules-to-support-rpc.md
|
||||
- name: Create WMI filters for the GPO
|
||||
href: create-wmi-filters-for-the-gpo.md
|
||||
- name: Create Windows Firewall rules in Intune
|
||||
href: create-windows-firewall-rules-in-intune.md
|
||||
- name: Enable predefined inbound rules
|
||||
href: enable-predefined-inbound-rules.md
|
||||
- name: Enable predefined outbound rules
|
||||
href: enable-predefined-outbound-rules.md
|
||||
- name: Exempt ICMP from authentication
|
||||
href: exempt-icmp-from-authentication.md
|
||||
- name: Link the GPO to the domain
|
||||
href: link-the-gpo-to-the-domain.md
|
||||
- name: Modify GPO filters
|
||||
href: modify-gpo-filters-to-apply-to-a-different-zone-or-version-of-windows.md
|
||||
- name: Open IP security policies
|
||||
href: open-the-group-policy-management-console-to-ip-security-policies.md
|
||||
- name: Open Group Policy
|
||||
href: open-the-group-policy-management-console-to-windows-firewall.md
|
||||
- name: Open Group Policy
|
||||
href: open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md
|
||||
- name: Open Windows Firewall
|
||||
href: open-windows-firewall-with-advanced-security.md
|
||||
- name: Restrict server access
|
||||
href: restrict-server-access-to-members-of-a-group-only.md
|
||||
- name: Enable Windows Firewall
|
||||
href: turn-on-windows-firewall-and-configure-default-behavior.md
|
||||
- name: Verify Network Traffic
|
||||
href: verify-that-network-traffic-is-authenticated.md
|
||||
- name: References
|
||||
items:
|
||||
- name: "Checklist: Creating Group Policy objects"
|
||||
href: checklist-creating-group-policy-objects.md
|
||||
- name: "Checklist: Creating inbound firewall rules"
|
||||
href: checklist-creating-inbound-firewall-rules.md
|
||||
- name: "Checklist: Creating outbound firewall rules"
|
||||
href: checklist-creating-outbound-firewall-rules.md
|
||||
- name: "Checklist: Configuring basic firewall settings"
|
||||
href: checklist-configuring-basic-firewall-settings.md
|
||||
- name: "Checklist: Configuring rules for the isolated domain"
|
||||
href: checklist-configuring-rules-for-the-isolated-domain.md
|
||||
- name: "Checklist: Configuring rules for the boundary zone"
|
||||
href: checklist-configuring-rules-for-the-boundary-zone.md
|
||||
- name: "Checklist: Configuring rules for the encryption zone"
|
||||
href: checklist-configuring-rules-for-the-encryption-zone.md
|
||||
- name: "Checklist: Configuring rules for an isolated server zone"
|
||||
href: checklist-configuring-rules-for-an-isolated-server-zone.md
|
||||
- name: "Checklist: Configuring rules for servers in a standalone isolated server zone"
|
||||
href: checklist-configuring-rules-for-servers-in-a-standalone-isolated-server-zone.md
|
||||
- name: "Checklist: Creating rules for clients of a standalone isolated server zone"
|
||||
href: checklist-creating-rules-for-clients-of-a-standalone-isolated-server-zone.md
|
||||
- name: "Appendix A: Sample GPO template files for settings used in this guide"
|
||||
href: appendix-a-sample-gpo-template-files-for-settings-used-in-this-guide.md
|
||||
- name: Troubleshooting
|
||||
items:
|
||||
- name: Troubleshooting UWP app connectivity issues in Windows Firewall
|
||||
href: troubleshooting-uwp-firewall.md
|
||||
- name: Filter origin audit log improvements
|
||||
href: filter-origin-documentation.md
|
||||
- name: Quarantine behavior
|
||||
href: quarantine.md
|
||||
- name: Firewall settings lost on upgrade
|
||||
href: firewall-settings-lost-on-upgrade.md
|
@ -1,5 +0,0 @@
|
||||
# Windows security guidance for enterprises
|
||||
|
||||
## [Windows security baselines](windows-security-baselines.md)
|
||||
### [Security Compliance Toolkit](security-compliance-toolkit-10.md)
|
||||
### [Get support](get-support-for-security-baselines.md)
|
@ -0,0 +1,9 @@
|
||||
- name: Windows security guidance for enterprises
|
||||
items:
|
||||
- name: Windows security baselines
|
||||
href: windows-security-baselines.md
|
||||
items:
|
||||
- name: Security Compliance Toolkit
|
||||
href: security-compliance-toolkit-10.md
|
||||
- name: Get support
|
||||
href: get-support-for-security-baselines.md
|
@ -1,4 +0,0 @@
|
||||
# [Windows 10 Enterprise LTSC](index.md)
|
||||
## [What's new in Windows 10 Enterprise LTSC 2019](whats-new-windows-10-2019.md)
|
||||
## [What's new in Windows 10 Enterprise LTSC 2016](whats-new-windows-10-2016.md)
|
||||
## [What's new in Windows 10 Enterprise LTSC 2015](whats-new-windows-10-2015.md)
|
9
windows/whats-new/ltsc/TOC.yml
Normal file
9
windows/whats-new/ltsc/TOC.yml
Normal file
@ -0,0 +1,9 @@
|
||||
- name: Windows 10 Enterprise LTSC
|
||||
href: index.md
|
||||
items:
|
||||
- name: What's new in Windows 10 Enterprise LTSC 2019
|
||||
href: whats-new-windows-10-2019.md
|
||||
- name: What's new in Windows 10 Enterprise LTSC 2016
|
||||
href: whats-new-windows-10-2016.md
|
||||
- name: What's new in Windows 10 Enterprise LTSC 2015
|
||||
href: whats-new-windows-10-2015.md
|
Loading…
x
Reference in New Issue
Block a user