Merge branch 'master' of https://cpubwin.visualstudio.com/_git/it-client into educonvert
@ -8,12 +8,12 @@ author: jdeckerms
|
|||||||
ms.author: jdecker
|
ms.author: jdecker
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 12/20/2017
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Enable encryption for HoloLens
|
# Enable encryption for HoloLens
|
||||||
|
|
||||||
You can enable [Bitlocker device encryption](https://docs.microsoft.com/windows/device-security/bitlocker/bitlocker-overview) to protect files and information stored on the HoloLens. Device encryption helps protect your data by encrypting it using AES-CBC 128 encryption method, which is equivalent to [EncryptionMethodByDriveType method 3](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp#encryptionmethodbydrivetype) in the BitLocker configuration service provider (CSP). Only someone with the right encryption key (such as a password) can decrypt it or perform a data recovery.
|
You can enable [BitLocker device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) to protect files and information stored on the HoloLens. Device encryption helps protect your data by encrypting it using AES-CBC 128 encryption method, which is equivalent to [EncryptionMethodByDriveType method 3](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp#encryptionmethodbydrivetype) in the BitLocker configuration service provider (CSP). Only someone with the right encryption key (such as a password) can decrypt it or perform a data recovery.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -100,6 +100,6 @@ Provisioning packages are files created by the Windows Configuration Designer to
|
|||||||
|
|
||||||
Encryption is silent on HoloLens. To verify the device encryption status:
|
Encryption is silent on HoloLens. To verify the device encryption status:
|
||||||
|
|
||||||
- On HoloLens, go to **Settings** > **System** > **About**. **Bitlocker** is **enabled** if the device is encrypted.
|
- On HoloLens, go to **Settings** > **System** > **About**. **BitLocker** is **enabled** if the device is encrypted.
|
||||||
|
|
||||||

|

|
||||||
|
@ -72,8 +72,8 @@ Use the Windows Configuration Designer tool to create a provisioning package.
|
|||||||
|
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<tr><td style="width:45%" valign="top"><a id="one"></a></br></br>Browse to and select the enterprise license file to upgrade the HoloLens edition.</br></br>You can also toggle **Yes** or **No** to hide parts of the first experience.</br></br>Select a region and timezone in which the device will be used. </td><td></td></tr>
|
<tr><td style="width:45%" valign="top"><a id="one"></a></br></br>Browse to and select the enterprise license file to upgrade the HoloLens edition.</br></br>You can also toggle **Yes** or **No** to hide parts of the first experience.</br></br>To set up the device without the need to connect to a Wi-Fi network, toggle **Skip Wi-Fi setup** to **On**.</br></br>Select a region and timezone in which the device will be used. </td><td></td></tr>
|
||||||
<tr><td style="width:45%" valign="top"><a id="two"></a> </br></br>Toggle **On** or **Off** for wireless network connectivity. If you select **On**, enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.</td><td></td></tr>
|
<tr><td style="width:45%" valign="top"><a id="two"></a> </br></br>In this section, you can enter the details of the Wi-Fi wireless network that the device should connect to automatically. To do this, select **On**, enter the SSID, the network type (**Open** or **WPA2-Personal**), and (if **WPA2-Personal**) the password for the wireless network.</td><td></td></tr>
|
||||||
<tr><td style="width:45%" valign="top"><a id="three"></a> </br></br>You can enroll the device in Azure Active Directory, or create a local account on the device</br></br>Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions. </br></br>To create a local account, select that option and enter a user name and password. </br></br>**Important:** (For Windows 10, version 1607 only) If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in. </td><td></td></tr>
|
<tr><td style="width:45%" valign="top"><a id="three"></a> </br></br>You can enroll the device in Azure Active Directory, or create a local account on the device</br></br>Before you use a Windows Configuration Designer wizard to configure bulk Azure AD enrollment, [set up Azure AD join in your organization](https://docs.microsoft.com/azure/active-directory/active-directory-azureadjoin-setup). The **maximum number of devices per user** setting in your Azure AD tenant determines how many times the bulk token that you get in the wizard can be used. To enroll the device in Azure AD, select that option and enter a friendly name for the bulk token you will get using the wizard. Set an expiration date for the token (maximum is 30 days from the date you get the token). Click **Get bulk token**. In the **Let's get you signed in** window, enter an account that has permissions to join a device to Azure AD, and then the password. Click **Accept** to give Windows Configuration Designer the necessary permissions. </br></br>To create a local account, select that option and enter a user name and password. </br></br>**Important:** (For Windows 10, version 1607 only) If you create a local account in the provisioning package, you must change the password using the **Settings** app every 42 days. If the password is not changed during that period, the account might be locked out and unable to sign in. </td><td></td></tr>
|
||||||
<tr><td style="width:45%" valign="top"><a id="four"></a> </br></br>To provision the device with a certificate, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.</td><td></td></tr>
|
<tr><td style="width:45%" valign="top"><a id="four"></a> </br></br>To provision the device with a certificate, click **Add a certificate**. Enter a name for the certificate, and then browse to and select the certificate to be used.</td><td></td></tr>
|
||||||
<tr><td style="width:45%" valign="top"><a id="five"></a> </br></br>Toggle **Yes** or **No** to enable Developer Mode on the HoloLens. [Learn more about Developer Mode.](https://docs.microsoft.com/windows/uwp/get-started/enable-your-device-for-development#developer-mode)</td><td></td></tr>
|
<tr><td style="width:45%" valign="top"><a id="five"></a> </br></br>Toggle **Yes** or **No** to enable Developer Mode on the HoloLens. [Learn more about Developer Mode.](https://docs.microsoft.com/windows/uwp/get-started/enable-your-device-for-development#developer-mode)</td><td></td></tr>
|
||||||
|
@ -132,7 +132,7 @@ The following tables include info on Windows 10 settings that have been validate
|
|||||||
| Setting | Details | CSP reference | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML\*? |
|
| Setting | Details | CSP reference | Supported with<br>Intune? | Supported with<br>Configuration Manager? | Supported with<br>SyncML\*? |
|
||||||
| --- | --- | --- |---- | --- | --- |
|
| --- | --- | --- |---- | --- | --- |
|
||||||
| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*`<name of policy>`* <br> See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
| Defender policies | Use to configure various Defender settings, including a scheduled scan time. | Defender/*`<name of policy>`* <br> See [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) | Yes <br> [Use a custom policy.](#example-intune) | Yes.<br> [Use a custom setting.](#example-sccm) | Yes |
|
||||||
| Defender status | Use to initiate a Defender scan, force a signature update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes |
|
| Defender status | Use to initiate a Defender scan, force a Security intelligence update, query any threats detected. | [Defender CSP](https://msdn.microsoft.com/library/windows/hardware/mt187856.aspx) | No. | No. | Yes |
|
||||||
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
\*Settings supported with SyncML can also be configured in a Windows Configuration Designer provisioning package.
|
||||||
|
|
||||||
#### Remote reboot
|
#### Remote reboot
|
||||||
|
@ -49,12 +49,12 @@ documentation](https://docs.microsoft.com/windows/desktop/sysinfo/registry).
|
|||||||
|
|
||||||
| Registry Setting | Data| Description
|
| Registry Setting | Data| Description
|
||||||
|-----------|------------|---------------
|
|-----------|------------|---------------
|
||||||
| Brightness Control Enabled | Default: 01 <br> Option: 01, 00 | This setting allows you to turn Surface Brightness Control on or off. To disable Surface Brightness Control, set the value to 00. If you do not configure this setting, Surface Brightness Control is on. |
|
| Brightness Control Enabled | Default: 01 <br> Option: 01, 00 <br> Type: REG_BINARY | This setting allows you to turn Surface Brightness Control on or off. To disable Surface Brightness Control, set the value to 00. If you do not configure this setting, Surface Brightness Control is on. |
|
||||||
| Brightness Control On Power Enabled| Default: 01 <br> Options: 01, 00 | This setting allows you to turn off Surface Brightness Control when the device is directly connected to power. To disable Surface Brightness Control when power is plugged in, set the value to 00. If you do not configure this setting, Surface Brightness Control is on. |
|
| Brightness Control On Power Enabled| Default: 01 <br> Options: 01, 00 <br> Type: REG_BINARY | This setting allows you to turn off Surface Brightness Control when the device is directly connected to power. To disable Surface Brightness Control when power is plugged in, set the value to 00. If you do not configure this setting, Surface Brightness Control is on. |
|
||||||
| Dimmed Brightness | Default: 20 <br>Option: Range of 0-100 percent of screen brightness <br> Data Type: Positive integer | This setting allows you to manage brightness range during periods of inactivity. If you do not configure this setting, the brightness level will drop to 20 percent of full brightness after 30 seconds of inactivity. |
|
| Dimmed Brightness | Default: 20 <br>Option: Range of 0-100 percent of screen brightness <br> Data Type: Positive integer <br> Type: REG_DWORD | This setting allows you to manage brightness range during periods of inactivity. If you do not configure this setting, the brightness level will drop to 20 percent of full brightness after 30 seconds of inactivity. |
|
||||||
Full Brightness | Default: 100 <br>Option: Range of 0-100 percent of screen brightness <br> Data Type: Positive integer | This setting allows you to manage the maximum brightness range for the device. If you do not configure this setting, the maximum brightness range is 100 percent.|
|
Full Brightness | Default: 100 <br>Option: Range of 0-100 percent of screen brightness <br> Data Type: Positive integer <br> Type: REG_DWORD | This setting allows you to manage the maximum brightness range for the device. If you do not configure this setting, the maximum brightness range is 100 percent.|
|
||||||
| Inactivity Timeout| Default: 30 seconds <br>Option: Any numeric value <br>Data Type: Integer | This setting allows you to manage the period of inactivity before dimming the device. If you do not configure this setting, the inactivity timeout is 30 seconds.|
|
| Inactivity Timeout| Default: 30 seconds <br>Option: Any numeric value <br>Data Type: Integer <br> Type: REG_DWORD | This setting allows you to manage the period of inactivity before dimming the device. If you do not configure this setting, the inactivity timeout is 30 seconds.|
|
||||||
| Telemetry Enabled | Default: 01 <br>Option: 01, 00 | This setting allows you to manage the sharing of app usage information to improve software and provide better user experience. To disable telemetry, set the value to 00. If you do not configure this setting, telemetry information is shared with Microsoft in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement). |
|
| Telemetry Enabled | Default: 01 <br>Option: 01, 00 <br> Type: REG_BINARY | This setting allows you to manage the sharing of app usage information to improve software and provide better user experience. To disable telemetry, set the value to 00. If you do not configure this setting, telemetry information is shared with Microsoft in accordance with the [Microsoft Privacy Statement](https://privacy.microsoft.com/privacystatement). |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -27,7 +27,7 @@ When you run the Microsoft Surface Dock Updater installer you will be prompted t
|
|||||||
>Updating Surface Dock firmware requires connectivity to the Surface Dock via the Surface Connect™ port. Installation of the Microsoft Surface Dock Updater is only supported on devices that feature the Surface Connect™ port.
|
>Updating Surface Dock firmware requires connectivity to the Surface Dock via the Surface Connect™ port. Installation of the Microsoft Surface Dock Updater is only supported on devices that feature the Surface Connect™ port.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Surface Dock Updater tool is unable to run on Windows 10 S. Surface Dock devices used with Surface Laptop with Windows 10 S will receive updates natively through Windows Update. To manually update a Surface Dock for use with Surface Laptop and Windows 10 S, connect the Surface Dock to another Surface device with a Windows 10 Pro or Windows 10 Enterprise environment.
|
>The Surface Dock Updater tool is unable to run on Windows 10 S. To manually update a Surface Dock for use with Surface Laptop and Windows 10 S, connect the Surface Dock to another Surface device with a Windows 10 Pro or Windows 10 Enterprise environment.
|
||||||
|
|
||||||
## Update a Surface Dock with Microsoft Surface Dock Updater
|
## Update a Surface Dock with Microsoft Surface Dock Updater
|
||||||
|
|
||||||
|
@ -52,6 +52,6 @@ Enrolling Surface devices in Windows Autopilot at the time of purchase is a capa
|
|||||||
|
|
||||||
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
When you purchase Surface devices from a Surface partner enabled for Windows Autopilot, your new devices can be enrolled in your Windows Autopilot deployment for you by the partner. Surface partners enabled for Windows Autopilot include:
|
||||||
|
|
||||||
- [SHI](https://www.shi.com/?reseller=shi)
|
- [SHI](https://www.shi.com/Surface)
|
||||||
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface.html)
|
- [Insight](https://www.insight.com/en_US/buy/partner/microsoft/surface/windows-autopilot.html)
|
||||||
- [Atea](https://www.atea.com/)
|
- [Atea](https://www.atea.com/)
|
||||||
|
@ -1615,7 +1615,7 @@ As a final quality control step, verify the device configuration to ensure that
|
|||||||
|
|
||||||
* The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
* The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
||||||
* Windows Update is active and current with software updates.
|
* Windows Update is active and current with software updates.
|
||||||
* Windows Defender is active and current with malware signatures.
|
* Windows Defender is active and current with malware Security intelligence.
|
||||||
* The SmartScreen Filter is active.
|
* The SmartScreen Filter is active.
|
||||||
* All Microsoft Store apps are properly installed and updated.
|
* All Microsoft Store apps are properly installed and updated.
|
||||||
* All Windows desktop apps are properly installed and updated.
|
* All Windows desktop apps are properly installed and updated.
|
||||||
@ -1669,7 +1669,7 @@ For more information about completing this task when you have:
|
|||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Verify that Windows Defender is active and current with malware signatures.<br/><br/>
|
<td>Verify that Windows Defender is active and current with malware Security intelligence.<br/><br/>
|
||||||
For more information about completing this task, see [Turn Windows Defender on or off](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab02) and [Updating Windows Defender](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab03).
|
For more information about completing this task, see [Turn Windows Defender on or off](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab02) and [Updating Windows Defender](https://support.microsoft.com/instantanswers/742778f2-6aad-4a8d-8f5d-db59cebc4f24/how-to-protect-your-windows-10-pc#v1h=tab03).
|
||||||
</td>
|
</td>
|
||||||
<td>x</td>
|
<td>x</td>
|
||||||
|
@ -1077,7 +1077,7 @@ As a final quality control step, verify the device configuration to ensure that
|
|||||||
|
|
||||||
- The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
- The device can connect to the Internet and view the appropriate web content in Microsoft Edge.
|
||||||
- Windows Update is active and current with software updates.
|
- Windows Update is active and current with software updates.
|
||||||
- Windows Defender is active and current with malware signatures.
|
- Windows Defender is active and current with malware Security intelligence.
|
||||||
- The SmartScreen Filter is active.
|
- The SmartScreen Filter is active.
|
||||||
- All Microsoft Store apps are properly installed and updated.
|
- All Microsoft Store apps are properly installed and updated.
|
||||||
- All Windows desktop apps are properly installed and updated.
|
- All Windows desktop apps are properly installed and updated.
|
||||||
@ -1135,7 +1135,7 @@ For more information about completing this task when you have:
|
|||||||
</tr>
|
</tr>
|
||||||
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>Verify that Windows Defender is active and current with malware signatures.<br/><br/>
|
<td>Verify that Windows Defender is active and current with malware Security intelligence.<br/><br/>
|
||||||
For more information about completing this task, see [Turn Windows Defender on or off](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab01) and [Updating Windows Defender](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab03). </td>
|
For more information about completing this task, see [Turn Windows Defender on or off](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab01) and [Updating Windows Defender](https://windows.microsoft.com/en-us/windows-10/how-to-protect-your-windows-10-pc#v1h=tab03). </td>
|
||||||
<td>X</td>
|
<td>X</td>
|
||||||
<td>X</td>
|
<td>X</td>
|
||||||
|
@ -10,7 +10,7 @@ author: trudyha
|
|||||||
searchScope:
|
searchScope:
|
||||||
- Store
|
- Store
|
||||||
ms.author: trudyha
|
ms.author: trudyha
|
||||||
ms.date: 07/27/2017
|
ms.date: 01/29/2019
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -10,7 +10,7 @@ author: trudyha
|
|||||||
searchScope:
|
searchScope:
|
||||||
- Store
|
- Store
|
||||||
ms.author: trudyha
|
ms.author: trudyha
|
||||||
ms.date: 01/05/2018
|
ms.date: 01/30/2019
|
||||||
ms.topic: conceptual
|
ms.topic: conceptual
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -25,6 +25,19 @@ When you sign up for a [Minecraft: Education Edition](https://education.minecraf
|
|||||||
>[!Note]
|
>[!Note]
|
||||||
>If you don't have an Azure AD or Office 365 tenant, you can set up a free Office 365 Education subscription when you request Minecraft: Education Edition. For more information see [Office 365 Education plans and pricing](https://products.office.com/academic/compare-office-365-education-plans).
|
>If you don't have an Azure AD or Office 365 tenant, you can set up a free Office 365 Education subscription when you request Minecraft: Education Edition. For more information see [Office 365 Education plans and pricing](https://products.office.com/academic/compare-office-365-education-plans).
|
||||||
|
|
||||||
|
## Settings for Office 365 A3 or Office 365 A5 customers
|
||||||
|
|
||||||
|
Schools that purchased these products have an extra option for making Minecraft: Education Edition available to their students:
|
||||||
|
- Office 365 A3 or Office 365 A5
|
||||||
|
- Enterprise Mobility + Security E3 or Enterprise Mobility + Security E5
|
||||||
|
- Minecraft: Education Edition
|
||||||
|
|
||||||
|
If your school has these products in your tenant, admins can choose to enable Minecraft: Education Edition for students using Office 365 A3 or Office 365 A5. On your Office 365 A3 or Office 365 A5 details page in **Microsoft Store for Education**, under **Settings & actions**, you can select **Allow access to Minecraft: Education Edition for users of Office 365 A3 or Office 365 A5**.
|
||||||
|
|
||||||
|
When this setting is selected, students in your tenant can use Minecraft: Education Edition even if they do not have a trial or a direct license assigned to them.
|
||||||
|
|
||||||
|
If you turn off this setting after students have been using Minecraft: Education Edition, they will have 25 more days to use Minecraft: Education Edition before they do not have access.
|
||||||
|
|
||||||
## Add Minecraft to your Microsoft Store for Education
|
## Add Minecraft to your Microsoft Store for Education
|
||||||
|
|
||||||
You can start with the Minecraft: Education Edition trial to get individual copies of the app. For more information, see [Minecraft: Education Edition - direct purchase](#individual-copies).
|
You can start with the Minecraft: Education Edition trial to get individual copies of the app. For more information, see [Minecraft: Education Edition - direct purchase](#individual-copies).
|
||||||
|
@ -14,7 +14,7 @@ ms.date: 07/25/2017
|
|||||||
# Deploying Microsoft Office 2016 by Using App-V
|
# Deploying Microsoft Office 2016 by Using App-V
|
||||||
|
|
||||||
|
|
||||||
Use the information in this article to use Microsoft Application Virtualization 5.0, or later versions, to deliver Microsoft Office 2016 as a virtualized application to computers in your organization. For information about using App-V to deliver Office 2010, see [Deploying Microsoft Office 2013 by Using App-V](deploying-microsoft-office-2013-by-using-app-v.md). For information about using App-V to deliver Office 2010, see [Deploying Microsoft Office 2010 by Using App-V](deploying-microsoft-office-2010-by-using-app-v.md).
|
Use the information in this article to use Microsoft Application Virtualization 5.0, or later versions, to deliver Microsoft Office 2016 as a virtualized application to computers in your organization. For information about using App-V to deliver Office 2013, see [Deploying Microsoft Office 2013 by Using App-V](deploying-microsoft-office-2013-by-using-app-v.md). For information about using App-V to deliver Office 2010, see [Deploying Microsoft Office 2010 by Using App-V](deploying-microsoft-office-2010-by-using-app-v.md).
|
||||||
|
|
||||||
This topic contains the following sections:
|
This topic contains the following sections:
|
||||||
|
|
||||||
|
@ -309,7 +309,7 @@ The following table shows local and roaming locations when folder redirection ha
|
|||||||
The current App-V Client VFS driver can't write to network locations, so the App-V Client detects the presence of folder redirection and copies the data on the local drive during publishing and when the virtual environment starts. After the user closes the App-V application and the App-V Client closes the virtual environment, the local storage of the VFS AppData is copied back to the network, enabling roaming to additional machines, where the process will be repeated. Here's what happens during the process:
|
The current App-V Client VFS driver can't write to network locations, so the App-V Client detects the presence of folder redirection and copies the data on the local drive during publishing and when the virtual environment starts. After the user closes the App-V application and the App-V Client closes the virtual environment, the local storage of the VFS AppData is copied back to the network, enabling roaming to additional machines, where the process will be repeated. Here's what happens during the process:
|
||||||
|
|
||||||
1. During publishing or virtual environment startup, the App-V Client detects the location of the AppData directory.
|
1. During publishing or virtual environment startup, the App-V Client detects the location of the AppData directory.
|
||||||
2. If the roaming AppData path is local or ino AppData\\Roaming location is mapped, nothing happens.
|
2. If the roaming AppData path is local or no AppData\\Roaming location is mapped, nothing happens.
|
||||||
3. If the roaming AppData path is not local, the VFS AppData directory is mapped to the local AppData directory.
|
3. If the roaming AppData path is not local, the VFS AppData directory is mapped to the local AppData directory.
|
||||||
|
|
||||||
This process solves the problem of a non-local %AppData% that is not supported by the App-V Client VFS driver. However, the data stored in this new location is not roamed with folder redirection. All changes during the running of the application happen to the local AppData location and must be copied to the redirected location. The process does the following things:
|
This process solves the problem of a non-local %AppData% that is not supported by the App-V Client VFS driver. However, the data stored in this new location is not roamed with folder redirection. All changes during the running of the application happen to the local AppData location and must be copied to the redirected location. The process does the following things:
|
||||||
@ -399,7 +399,7 @@ The process then configures the client for package or connection group additions
|
|||||||
|
|
||||||
7. Create the **Registry.dat** file from the package store to **%ProgramData%\\Microsoft\\AppV\\Client\\VReg\\{VersionGUID}.dat**.
|
7. Create the **Registry.dat** file from the package store to **%ProgramData%\\Microsoft\\AppV\\Client\\VReg\\{VersionGUID}.dat**.
|
||||||
|
|
||||||
8. Register the package with the App-V Kernal Mode Driver at **HKLM\\Microsoft\\Software\\AppV\\MAV**.
|
8. Register the package with the App-V Kernel Mode Driver at **HKLM\\Microsoft\\Software\\AppV\\MAV**.
|
||||||
|
|
||||||
9. Invoke scripting from the **AppxManifest.xml** or **DeploymentConfig.xml** file for Package Add timing.
|
9. Invoke scripting from the **AppxManifest.xml** or **DeploymentConfig.xml** file for Package Add timing.
|
||||||
|
|
||||||
|
@ -80,7 +80,7 @@ Updating multiple apps at the same time requires that you create a **ConfigFile*
|
|||||||
|
|
||||||
## Update multiple apps with the App-V Sequencer interface
|
## Update multiple apps with the App-V Sequencer interface
|
||||||
|
|
||||||
Updating multipe apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of updating. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM.
|
Updating multiple apps at the same time requires that you create a **ConfigFile** to collect all of the info related to each round of updating. This file is then used by the App-V Sequencer interface after creating a "clean" checkpoint on your VM.
|
||||||
|
|
||||||
### Create your ConfigFile for use by the App-V Sequencer interface
|
### Create your ConfigFile for use by the App-V Sequencer interface
|
||||||
|
|
||||||
@ -93,7 +93,7 @@ Updating multipe apps at the same time requires that you create a **ConfigFile**
|
|||||||
- ```<Installer>```. The file name for the app executable. This will typically be an .exe or .msi file.
|
- ```<Installer>```. The file name for the app executable. This will typically be an .exe or .msi file.
|
||||||
- ```<Package>```. The file path to the location of your App-V packages. These packages were created when you sequenced your apps.
|
- ```<Package>```. The file path to the location of your App-V packages. These packages were created when you sequenced your apps.
|
||||||
- ```<TimeoutInMinutes>```. The maximum amount of time, in minutes, the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself.
|
- ```<TimeoutInMinutes>```. The maximum amount of time, in minutes, the cmdlet should wait for updating to complete. You can enter a different value for each app, based on the size and complexity of the app itself.
|
||||||
- ```<Cmdlet>```. Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to usea cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps.
|
- ```<Cmdlet>```. Determines whether the sequencer uses the cmdlet or the App-V Sequencer interface. **True** tells the sequencer to use cmdlet-based updating, while **False** tells the sequencer to use the App-V Sequencer interface. You can use both the cmdlet and the interface together in the same ConfigFile, for different apps.
|
||||||
- ```<Enabled>```. Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them.
|
- ```<Enabled>```. Indicates whether the app should be sequenced. **True** includes the app, while **False** ignores it. You can include as many apps as you want in the batch file, but optionally enable only a few of them.
|
||||||
|
|
||||||
**Example:**
|
**Example:**
|
||||||
|
@ -182,7 +182,7 @@ Discounting scaling and fault-tolerance requirements, the minimum number of serv
|
|||||||
|
|
||||||
Ignoring scaling requirements, the minimum number of servers that a fault-tolerant implementation needs to function is four. The management server and Microsoft SQL Server roles support placement in fault-tolerant configurations. The management server service can be combined with any of the roles, but remains a single point of failure.
|
Ignoring scaling requirements, the minimum number of servers that a fault-tolerant implementation needs to function is four. The management server and Microsoft SQL Server roles support placement in fault-tolerant configurations. The management server service can be combined with any of the roles, but remains a single point of failure.
|
||||||
|
|
||||||
Although there are many fault-tolerance strategies and technologies you can use, not all are applicable to a given service. Additionally, if App-V roles are combined, the resulting incompatabilities could cause certain fault-tolerance options to stop working.
|
Although there are many fault-tolerance strategies and technologies you can use, not all are applicable to a given service. Additionally, if App-V roles are combined, the resulting incompatibilities could cause certain fault-tolerance options to stop working.
|
||||||
|
|
||||||
## Have a suggestion for App-V?
|
## Have a suggestion for App-V?
|
||||||
|
|
||||||
|
@ -14,7 +14,7 @@ ms.date: 04/18/2018
|
|||||||
|
|
||||||
The Microsoft Application Virtualization (App-V) client stores its configuration in the registry. Understanding how the register's format for data works can help you better understand the client, as you can configure many client actions by changing registry entries. This topic lists the App-V client configuration settings and explains their uses. You can use Windows PowerShell to modify the client configuration settings. For more information about using Windows PowerShell and App-V see [Administering App-V by using Windows PowerShell](appv-administering-appv-with-powershell.md).
|
The Microsoft Application Virtualization (App-V) client stores its configuration in the registry. Understanding how the register's format for data works can help you better understand the client, as you can configure many client actions by changing registry entries. This topic lists the App-V client configuration settings and explains their uses. You can use Windows PowerShell to modify the client configuration settings. For more information about using Windows PowerShell and App-V see [Administering App-V by using Windows PowerShell](appv-administering-appv-with-powershell.md).
|
||||||
|
|
||||||
You can use Group Policy to configure App-V client settings by navigating to the **Group Policy managment console** at **Computer Configuration** > **Administrative Templates** > **System** > **App-V**.
|
You can use Group Policy to configure App-V client settings by navigating to the **Group Policy management console** at **Computer Configuration** > **Administrative Templates** > **System** > **App-V**.
|
||||||
|
|
||||||
## App-V Client Configuration Settings: Windows PowerShell
|
## App-V Client Configuration Settings: Windows PowerShell
|
||||||
|
|
||||||
|
@ -95,7 +95,7 @@ You can use the connection group file to configure each connection group by usin
|
|||||||
|
|
||||||
The priority field is required when a running virtual application initiates from a native application request, such as Microsoft Windows Explorer. The App-V client uses the priority to determine which connection group virtual environment the application should run in. This situation occurs if a virtual application is part of multiple connection groups.
|
The priority field is required when a running virtual application initiates from a native application request, such as Microsoft Windows Explorer. The App-V client uses the priority to determine which connection group virtual environment the application should run in. This situation occurs if a virtual application is part of multiple connection groups.
|
||||||
|
|
||||||
If a virtual application is opened using another virtual application, the client will use the orignal virtual application's virtual environment. The priority field is not used in this case.
|
If a virtual application is opened using another virtual application, the client will use the original virtual application's virtual environment. The priority field is not used in this case.
|
||||||
|
|
||||||
The following is an example of priority configuration:
|
The following is an example of priority configuration:
|
||||||
|
|
||||||
|
@ -24,7 +24,7 @@ Here are some important things to know before you get started:
|
|||||||
- If you add user-published packages in globally entitled connection groups, the connection group will fail.
|
- If you add user-published packages in globally entitled connection groups, the connection group will fail.
|
||||||
- Track the connection groups where you've used a non-optional package before removing it with the **Unpublish-AppvClientPackage <</span>package> -global** cmdlet.
|
- Track the connection groups where you've used a non-optional package before removing it with the **Unpublish-AppvClientPackage <</span>package> -global** cmdlet.
|
||||||
|
|
||||||
In situations where you have a gobally published package that's listed as non-optional in a user-published connection group that also appears in other packages, running **Unpublish-AppvClientPackage <</span>package> -global** cmdlet can unpublish the package from every connection group containing that package. Tracking connection groups can help you avoid unintentionally unpublishing non-optional packages.
|
In situations where you have a globally published package that's listed as non-optional in a user-published connection group that also appears in other packages, running **Unpublish-AppvClientPackage <</span>package> -global** cmdlet can unpublish the package from every connection group containing that package. Tracking connection groups can help you avoid unintentionally unpublishing non-optional packages.
|
||||||
|
|
||||||
## How to use Windows PowerShell cmdlets to create user-entitled connection groups
|
## How to use Windows PowerShell cmdlets to create user-entitled connection groups
|
||||||
|
|
||||||
|
@ -413,12 +413,11 @@ To use a custom instance of Microsoft SQL Server, use these parameters:
|
|||||||
### Example for using a custom instance of Microsoft SQL Server for installing the Reporting database on a different computer than the Reporting server
|
### Example for using a custom instance of Microsoft SQL Server for installing the Reporting database on a different computer than the Reporting server
|
||||||
|
|
||||||
```SQL
|
```SQL
|
||||||
Using a custom instance of Microsoft SQL Server example:<br>
|
/appv_server_setup.exe /QUIET
|
||||||
/appv_server_setup.exe /QUIET<br>
|
/DB_PREDEPLOY_REPORTING
|
||||||
/DB_PREDEPLOY_REPORTING<br>
|
/REPORTING_DB_CUSTOM_SQLINSTANCE="SqlInstanceName"
|
||||||
/REPORTING_DB_CUSTOM_SQLINSTANCE="SqlInstanceName"<br>
|
/REPORTING_DB_NAME="AppVReporting"
|
||||||
/REPORTING_DB_NAME="AppVReporting"<br>
|
/REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT="Domain\MachineAccount"
|
||||||
/REPORTING_REMOTE_SERVER_MACHINE_ACCOUNT="Domain\MachineAccount"<br>
|
|
||||||
/REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT="Domain\InstallAdminAccount"
|
/REPORTING_SERVER_INSTALL_ADMIN_ACCOUNT="Domain\InstallAdminAccount"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -255,7 +255,7 @@ Deploy the App-V package for Office 2013 by using the same methods you use for a
|
|||||||
|
|
||||||
### How to publish an Office package
|
### How to publish an Office package
|
||||||
|
|
||||||
Run the following command to publish an Office package globally, wtih the bracketed value replaced by the path to the App-V package:
|
Run the following command to publish an Office package globally, with the bracketed value replaced by the path to the App-V package:
|
||||||
|
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Add-AppvClientPackage <Path_to_AppV_Package> | Publish-AppvClientPackage –global
|
Add-AppvClientPackage <Path_to_AppV_Package> | Publish-AppvClientPackage –global
|
||||||
|
@ -12,7 +12,7 @@ ms.date: 04/18/2018
|
|||||||
|
|
||||||
>Applies to: Windows 10, version 1607
|
>Applies to: Windows 10, version 1607
|
||||||
|
|
||||||
This checklist outlines the recommended steps and items to consider when deploying App-V features. Use it to organize your priorites while you deploy App-V. You can copy this checklist into a spreadsheet program and customize it for your use.
|
This checklist outlines the recommended steps and items to consider when deploying App-V features. Use it to organize your priorities while you deploy App-V. You can copy this checklist into a spreadsheet program and customize it for your use.
|
||||||
|
|
||||||
|Status|Task|References|Notes|
|
|Status|Task|References|Notes|
|
||||||
|---|---|---|---|
|
|---|---|---|---|
|
||||||
|
@ -186,7 +186,7 @@ All shortcuts in the manifest will be ignored and no shortcuts will be integrate
|
|||||||
</Shortcuts>
|
</Shortcuts>
|
||||||
```
|
```
|
||||||
|
|
||||||
**File Type Associations**: Associates file types with programs to open by default as well as setup the context menu. (MIME types can also be set up with this susbsystem). The following is an example of a FileType association:
|
**File Type Associations**: Associates file types with programs to open by default as well as setup the context menu. (MIME types can also be set up with this subsystem). The following is an example of a FileType association:
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<FileTypeAssociations Enabled="true">
|
<FileTypeAssociations Enabled="true">
|
||||||
@ -252,7 +252,7 @@ All shortcuts in the manifest will be ignored and no shortcuts will be integrate
|
|||||||
</FileTypeAssociations>
|
</FileTypeAssociations>
|
||||||
```
|
```
|
||||||
|
|
||||||
**URL Protocols**: This controls the URL Protocols integrated into the local registry of the client machine. The following example illustrates the “mailto:” ptrotocol.
|
**URL Protocols**: This controls the URL Protocols integrated into the local registry of the client machine. The following example illustrates the “mailto:” protocol.
|
||||||
|
|
||||||
```xml
|
```xml
|
||||||
<URLProtocols Enabled="true">
|
<URLProtocols Enabled="true">
|
||||||
|
@ -587,7 +587,7 @@ If, during sequencer monitoring, an SxS Assembly (such as a VC++ Runtime) is ins
|
|||||||
|
|
||||||
**Client Side**:
|
**Client Side**:
|
||||||
|
|
||||||
When publishing a virtual application package, the App-V Client will detect if a required SxS dependency is already installed. If the dependency is unavailable on the computer and it is included in the package, a traditional Windows Insataller (.**msi**) installation of the SxS assembly will be initiated. As previously documented, simply install the dependency on the computer running the client to ensure that the Windows Installer (.msi) installation will not occur.
|
When publishing a virtual application package, the App-V Client will detect if a required SxS dependency is already installed. If the dependency is unavailable on the computer and it is included in the package, a traditional Windows Installer (.**msi**) installation of the SxS assembly will be initiated. As previously documented, simply install the dependency on the computer running the client to ensure that the Windows Installer (.msi) installation will not occur.
|
||||||
|
|
||||||
<table>
|
<table>
|
||||||
<colgroup>
|
<colgroup>
|
||||||
@ -618,7 +618,7 @@ When publishing a virtual application package, the App-V Client will detect if a
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Disabling a Dynamic Configuration by using Windows Powershell
|
### Disabling a Dynamic Configuration by using Windows PowerShell
|
||||||
|
|
||||||
- For already published packages, you can use `Set-AppVClientPackage –Name Myapp –Path c:\Packages\Apps\MyApp.appv` without
|
- For already published packages, you can use `Set-AppVClientPackage –Name Myapp –Path c:\Packages\Apps\MyApp.appv` without
|
||||||
|
|
||||||
@ -725,7 +725,7 @@ The following terms are used when describing concepts and actions related to App
|
|||||||
|
|
||||||
- From the point that users initiate a log-in to when they are able to manipulate the desktop.
|
- From the point that users initiate a log-in to when they are able to manipulate the desktop.
|
||||||
|
|
||||||
- From the point where the desktop can be interacted with to the point a publishing refresh begins (in Windows PowerShell terms, sync) when using the App-V full server infrastructure. In standalone instances, it is when the **Add-AppVClientPackage** and **Publish-AppVClientPackage** Windows Powershell commands are initiated.
|
- From the point where the desktop can be interacted with to the point a publishing refresh begins (in Windows PowerShell terms, sync) when using the App-V full server infrastructure. In standalone instances, it is when the **Add-AppVClientPackage** and **Publish-AppVClientPackage** Windows PowerShell commands are initiated.
|
||||||
|
|
||||||
- From start to completion of the publishing refresh. In standalone instances, this is the first to last virtual application published.
|
- From start to completion of the publishing refresh. In standalone instances, this is the first to last virtual application published.
|
||||||
|
|
||||||
|
@ -37,7 +37,7 @@ For more information, see [Application publishing and client interaction](appv-a
|
|||||||
|
|
||||||
## Unsupported scenarios for App-V folder redirection
|
## Unsupported scenarios for App-V folder redirection
|
||||||
|
|
||||||
The following scenatios aren't supported by App-V:
|
The following scenarios aren't supported by App-V:
|
||||||
|
|
||||||
* Configuring %LocalAppData% as a network drive.
|
* Configuring %LocalAppData% as a network drive.
|
||||||
* Redirecting the Start menu to a single folder for multiple users.
|
* Redirecting the Start menu to a single folder for multiple users.
|
||||||
|
@ -77,7 +77,7 @@ The connection string on the management server can be modified to include ```fai
|
|||||||
Use the following steps to modify the connection string to include ```failover partner = <server2>```:
|
Use the following steps to modify the connection string to include ```failover partner = <server2>```:
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>This process involves changing the Windows registry with Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. Always make a backup copy of the registry files (**System.dat** and **User.dat**) before chagning the registry. Microsoft can't guarantee that problems caused by changing the registry can be resolved, so change the registry at your own risk.
|
>This process involves changing the Windows registry with Registry Editor. If you change the Windows registry incorrectly, you can cause serious problems that might require you to reinstall Windows. Always make a backup copy of the registry files (**System.dat** and **User.dat**) before changing the registry. Microsoft can't guarantee that problems caused by changing the registry can be resolved, so change the registry at your own risk.
|
||||||
|
|
||||||
1. Log in to the management server and open **regedit**.
|
1. Log in to the management server and open **regedit**.
|
||||||
2. Navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **AppV** \\ **Server** \\ **ManagementService**.
|
2. Navigate to **HKEY\_LOCAL\_MACHINE** \\ **Software** \\ **Microsoft** \\ **AppV** \\ **Server** \\ **ManagementService**.
|
||||||
|
@ -30,7 +30,7 @@ Ideally, you should install the sequencer on a computer running as a virtual mac
|
|||||||
3. Take a “snapshot” of the environment.
|
3. Take a “snapshot” of the environment.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Your corporate security team should review and approve the sequencing process plan before implementing it. For security reasons, it's a good idea to keep sequencer operations in a lab separate from the production environment. The sequencing computers must be capapble of connecting to the corporate network to copy finished packages to the production servers. However, because the sequencing computers are typically operated without antivirus protection, they shouldn't remail on the corporate network unprotected. You can protect your sequencing computers by operating them on an isolated network, behind a firewall, or by using virtual machines on an isolated virtual network. Make sure your solution follows your company's corporate security policies.
|
>Your corporate security team should review and approve the sequencing process plan before implementing it. For security reasons, it's a good idea to keep sequencer operations in a lab separate from the production environment. The sequencing computers must be capable of connecting to the corporate network to copy finished packages to the production servers. However, because the sequencing computers are typically operated without antivirus protection, they shouldn't remain on the corporate network unprotected. You can protect your sequencing computers by operating them on an isolated network, behind a firewall, or by using virtual machines on an isolated virtual network. Make sure your solution follows your company's corporate security policies.
|
||||||
|
|
||||||
## Planning for App-V client deployment
|
## Planning for App-V client deployment
|
||||||
|
|
||||||
|
@ -26,7 +26,7 @@ You can use the App-V Sequencer to create plug-in packages for language packs, l
|
|||||||
For a list of supported Office products, see [Microsoft Office Product IDs that App-V supports](https://support.microsoft.com/help/2842297/product-ids-that-are-supported-by-the-office-deployment-tool-for-click).
|
For a list of supported Office products, see [Microsoft Office Product IDs that App-V supports](https://support.microsoft.com/help/2842297/product-ids-that-are-supported-by-the-office-deployment-tool-for-click).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>You must use the Office Deployment Tool instead of the App-V Sequencer to create App-V packages for Office 365 ProPlus. App-V does not support package creation for volume-licensed versions of Office Professional Plus or Office Standard. Support for the [Office 2013 version of Office 365 ended in Februrary 2017](https://support.microsoft.com/kb/3199744).
|
>You must use the Office Deployment Tool instead of the App-V Sequencer to create App-V packages for Office 365 ProPlus. App-V does not support package creation for volume-licensed versions of Office Professional Plus or Office Standard. Support for the [Office 2013 version of Office 365 ended in February 2017](https://support.microsoft.com/kb/3199744).
|
||||||
|
|
||||||
## Using App-V with coexisting versions of Office
|
## Using App-V with coexisting versions of Office
|
||||||
|
|
||||||
@ -90,7 +90,7 @@ To bypass the auto-registration operation for native Word 2010, follow these ste
|
|||||||
|
|
||||||
* In Windows 8.1 or Windows 10, enter **regedit**, select **Enter** on the Start page, then select the Enter key.
|
* In Windows 8.1 or Windows 10, enter **regedit**, select **Enter** on the Start page, then select the Enter key.
|
||||||
|
|
||||||
If you're prompted for an administrator password, enter the password. If you're propmted for a confirmation, select **Continue**.
|
If you're prompted for an administrator password, enter the password. If you're prompted for a confirmation, select **Continue**.
|
||||||
3. Locate and then select the following registry subkey:
|
3. Locate and then select the following registry subkey:
|
||||||
|
|
||||||
``` syntax
|
``` syntax
|
||||||
|
@ -60,7 +60,7 @@ Consider the following additional information:
|
|||||||
|
|
||||||
The following will help you plan how to ensure that virtualized packages are secure.
|
The following will help you plan how to ensure that virtualized packages are secure.
|
||||||
|
|
||||||
* If an application installer applies an access control list (ACL) to a file or directory, then that ACL is not persisted in the package. If thje file or directory is modified by a user when the package is deployed, the modified file or directory will either inherit the ACL in the **%userprofile%** or inherit the ACL of the target computer’s directory. The former occurs if the file or directory does not exist in a virtual file system location; the latter occurs if the file or directory exists in a virtual file system location, such as **%windir%**.
|
* If an application installer applies an access control list (ACL) to a file or directory, then that ACL is not persisted in the package. If the file or directory is modified by a user when the package is deployed, the modified file or directory will either inherit the ACL in the **%userprofile%** or inherit the ACL of the target computer’s directory. The former occurs if the file or directory does not exist in a virtual file system location; the latter occurs if the file or directory exists in a virtual file system location, such as **%windir%**.
|
||||||
|
|
||||||
## App-V log files
|
## App-V log files
|
||||||
|
|
||||||
|
@ -84,7 +84,7 @@ In your publishing metadata query, enter the string values that correspond to th
|
|||||||
<tr class="header">
|
<tr class="header">
|
||||||
<th align="left">Operating system</th>
|
<th align="left">Operating system</th>
|
||||||
<th align="left">Architecture</th>
|
<th align="left">Architecture</th>
|
||||||
<th align="left">Operating string string value</th>
|
<th align="left">String value</th>
|
||||||
</tr>
|
</tr>
|
||||||
</thead>
|
</thead>
|
||||||
<tbody>
|
<tbody>
|
||||||
|
@ -20,7 +20,7 @@ There are two steps to deploy an app upgrade:
|
|||||||
1. [Define the supersedence](#define-app-supersedence) - this lets Configuration Manager know that the old version should be replaced by the new version.
|
1. [Define the supersedence](#define-app-supersedence) - this lets Configuration Manager know that the old version should be replaced by the new version.
|
||||||
2. [Deploy the upgrade](#deploy-the-app-upgrade) to your users.
|
2. [Deploy the upgrade](#deploy-the-app-upgrade) to your users.
|
||||||
|
|
||||||
The following steps walk you through the upgrade deployment process - we have an upgraded version of the Walking Scorer app (moving from version 12.23.2.0 to 12.23.3.0). Becasuse we previously used Configuration Manager to deploy the existing version, we'll use it now to upgrade the app.
|
The following steps walk you through the upgrade deployment process - we have an upgraded version of the Walking Scorer app (moving from version 12.23.2.0 to 12.23.3.0). Because we previously used Configuration Manager to deploy the existing version, we'll use it now to upgrade the app.
|
||||||
|
|
||||||
Before you can deploy the upgrade, make sure you import the new version of the app and distribute it to your manage.microsoft.com distribution point.
|
Before you can deploy the upgrade, make sure you import the new version of the app and distribute it to your manage.microsoft.com distribution point.
|
||||||
|
|
||||||
@ -42,7 +42,7 @@ Before you can deploy the upgrade, make sure you import the new version of the a
|
|||||||
> Do **NOT** select **Uninstall**. This tells Configuration Manager to uninstall the old version, but it does **NOT** then install the new version.
|
> Do **NOT** select **Uninstall**. This tells Configuration Manager to uninstall the old version, but it does **NOT** then install the new version.
|
||||||
|
|
||||||
6. Click **OK**.
|
6. Click **OK**.
|
||||||
7. If you have other versions of the same app, repeate steps 4-6 for each version. Click **OK** when you're done.
|
7. If you have other versions of the same app, repeat steps 4-6 for each version. Click **OK** when you're done.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> Need to remove a supersedence? (Maybe the new version turned out to be flaky and you don't want users to get it yet.) On the **Supersedence** tab for the *new* version of the app, double-click the older version in the list of supersedence rules, and then change the **New Deployment Type** to **Do not replace**.
|
> Need to remove a supersedence? (Maybe the new version turned out to be flaky and you don't want users to get it yet.) On the **Supersedence** tab for the *new* version of the app, double-click the older version in the list of supersedence rules, and then change the **New Deployment Type** to **Do not replace**.
|
||||||
|
@ -15,7 +15,7 @@ ms.date: 12/03/2018
|
|||||||
|
|
||||||
MSIX is a packaging format built to be safe, secure and reliable, based on a combination of .msi, .appx, App-V and ClickOnce installation technologies. You can [use the MSIX packaging tool](https://docs.microsoft.com/windows/msix/packaging-tool/create-app-package-msi-vm) to repackage your existing Win32 applications to the MSIX format.
|
MSIX is a packaging format built to be safe, secure and reliable, based on a combination of .msi, .appx, App-V and ClickOnce installation technologies. You can [use the MSIX packaging tool](https://docs.microsoft.com/windows/msix/packaging-tool/create-app-package-msi-vm) to repackage your existing Win32 applications to the MSIX format.
|
||||||
|
|
||||||
You can either run your installer interactivly (through the UI) or create a package from the command line. Either way, you can convert an application without having the source code. Then, you can make your app available through the Microsoft Store.
|
You can either run your installer interactively (through the UI) or create a package from the command line. Either way, you can convert an application without having the source code. Then, you can make your app available through the Microsoft Store.
|
||||||
|
|
||||||
- [Package your favorite application installer](https://docs.microsoft.com/windows/msix/packaging-tool/create-app-package-msi-vm) interactively (msi, exe, App-V 5.x and ClickOnce) in MSIX format.
|
- [Package your favorite application installer](https://docs.microsoft.com/windows/msix/packaging-tool/create-app-package-msi-vm) interactively (msi, exe, App-V 5.x and ClickOnce) in MSIX format.
|
||||||
- Create a [modification package](https://docs.microsoft.com/windows/msix/packaging-tool/package-editor) to update an existing MSIX package.
|
- Create a [modification package](https://docs.microsoft.com/windows/msix/packaging-tool/package-editor) to update an existing MSIX package.
|
||||||
|
@ -68,7 +68,7 @@ For example, this is the registry key configuration for BFE:
|
|||||||
|
|
||||||
## Memory footprint
|
## Memory footprint
|
||||||
|
|
||||||
Be aware that separating services increases the total number of SvcHost instances, which increases memory utlization. (Service grouping provided a modest reduction to the overall resource footprint of the services involved.)
|
Be aware that separating services increases the total number of SvcHost instances, which increases memory utilization. (Service grouping provided a modest reduction to the overall resource footprint of the services involved.)
|
||||||
|
|
||||||
Consider the following:
|
Consider the following:
|
||||||
|
|
||||||
|
@ -39,9 +39,10 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_cli.etl
|
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_cli.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Run the following command to enable CAPI2 logging:
|
3. Run the following command to enable CAPI2 logging and increase the size :
|
||||||
```
|
```
|
||||||
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
||||||
|
wevtutil sl Microsoft-Windows-CAPI2/Operational /ms:104857600
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Create C:\MSLOG on the NPS to store captured logs.
|
4. Create C:\MSLOG on the NPS to store captured logs.
|
||||||
@ -66,9 +67,10 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_nps.etl
|
netsh trace start scenario=lan globallevel=0xff capture=yes maxsize=1024 tracefile=C:\MSLOG\%COMPUTERNAME%_wired_nps.etl
|
||||||
```
|
```
|
||||||
|
|
||||||
6. Run the following command to enable CAPI2 logging:
|
6. Run the following command to enable CAPI2 logging and increase the size :
|
||||||
```
|
```
|
||||||
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
wevtutil.exe sl Microsoft-Windows-CAPI2/Operational /e:true
|
||||||
|
wevtutil sl Microsoft-Windows-CAPI2/Operational /ms:104857600
|
||||||
```
|
```
|
||||||
7. Run the following command from the command prompt on the client machine and start PSR to capture screen images:
|
7. Run the following command from the command prompt on the client machine and start PSR to capture screen images:
|
||||||
|
|
||||||
@ -363,7 +365,7 @@ Use the following steps to collect wireless and wired logs on Windows and Window
|
|||||||
reg save HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG\%COMPUTERNAME%_CertSvc.hiv
|
reg save HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG\%COMPUTERNAME%_CertSvc.hiv
|
||||||
reg export HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG\%COMPUTERNAME%_CertSvc.txt
|
reg export HKLM\System\CurrentControlSet\Services\CertSvc c:\MSLOG\%COMPUTERNAME%_CertSvc.txt
|
||||||
reg save HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG\%COMPUTERNAME%_Cryptography.hiv
|
reg save HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG\%COMPUTERNAME%_Cryptography.hiv
|
||||||
reg export HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG\%COMPUTERNAME%_Cryptography.tx
|
reg export HKLM\SOFTWARE\Microsoft\Cryptography c:\MSLOG\%COMPUTERNAME%_Cryptography.txt
|
||||||
```
|
```
|
||||||
3. Copy the following files, if exist, to C:\MSLOG: %windir%\CAPolicy.inf
|
3. Copy the following files, if exist, to C:\MSLOG: %windir%\CAPolicy.inf
|
||||||
4. Log on to a domain controller and create C:\MSLOG to store captured logs.
|
4. Log on to a domain controller and create C:\MSLOG to store captured logs.
|
||||||
|
@ -11,13 +11,13 @@ ms.date: 10/04/2017
|
|||||||
|
|
||||||
# Enroll a Windows 10 device automatically using Group Policy
|
# Enroll a Windows 10 device automatically using Group Policy
|
||||||
|
|
||||||
Starting in Windows 10, version 1709 you can use a Group Policy to trigger auto-enrollment to MDM for Active Directory (AD) domain joined devices.
|
Starting in Windows 10, version 1709, you can use a Group Policy to trigger auto-enrollment to MDM for Active Directory (AD) domain-joined devices.
|
||||||
|
|
||||||
Requirements:
|
Requirements:
|
||||||
- AD-joined PC running Windows 10, version 1709
|
- AD-joined PC running Windows 10, version 1709 or later
|
||||||
- Enterprise has MDM service already configured
|
- The enterprise has configured a mobile device management (MDM) service
|
||||||
- Enterprise AD must be registered with Azure AD
|
- The enterprise AD must be [registered with Azure Active Directory (Azure AD)](azure-active-directory-integration-with-mdm.md)
|
||||||
- Device should not already be enrolled in Intune using the classic agents (devices manged using agents will fail enrollment with error 0x80180026)
|
- The device should not already be enrolled in Intune using the classic agents (devices managed using agents will fail enrollment with `error 0x80180026`)
|
||||||
|
|
||||||
> [!Tip]
|
> [!Tip]
|
||||||
> [How to configure automatic registration of Windows domain-joined devices with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-automatic-device-registration-setup)
|
> [How to configure automatic registration of Windows domain-joined devices with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-conditional-access-automatic-device-registration-setup)
|
||||||
|
@ -10,7 +10,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: jdeckerms
|
author: jdeckerms
|
||||||
ms.date: 10/09/2018
|
ms.date: 01/25/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Mobile device management
|
# Mobile device management
|
||||||
|
@ -22,32 +22,50 @@ For details about Microsoft mobile device management protocols for Windows 10 s
|
|||||||
|
|
||||||
## In this section
|
## In this section
|
||||||
|
|
||||||
- [What's new in Windows 10, version 1511](#whatsnew)
|
- [What's new in MDM enrollment and management](#whats-new-in-mdm-enrollment-and-management)
|
||||||
- [What's new in Windows 10, version 1607](#whatsnew1607)
|
- [In this section](#in-this-section)
|
||||||
- [What's new in Windows 10, version 1703](#whatsnew10)
|
- [<a href="" id="whatsnew"></a>What's new in Windows 10, version 1511](#a-href%22%22-id%22whatsnew%22awhats-new-in-windows-10-version-1511)
|
||||||
- [What's new in Windows 10, version 1709](#whatsnew1709)
|
- [<a href="" id="whatsnew1607"></a>What's new in Windows 10, version 1607](#a-href%22%22-id%22whatsnew1607%22awhats-new-in-windows-10-version-1607)
|
||||||
- [What's new in Windows 10, version 1803](#whatsnew1803)
|
- [<a href="" id="whatsnew10"></a>What's new in Windows 10, version 1703](#a-href%22%22-id%22whatsnew10%22awhats-new-in-windows-10-version-1703)
|
||||||
- [What's new in Windows 10, version 1809](#whatsnew1809)
|
- [<a href="" id="whatsnew1709"></a>What's new in Windows 10, version 1709](#a-href%22%22-id%22whatsnew1709%22awhats-new-in-windows-10-version-1709)
|
||||||
- [Change history in MDM documentation](#change-history-in-mdm-documentation)
|
- [<a href="" id="whatsnew1803"></a>What's new in Windows 10, version 1803](#a-href%22%22-id%22whatsnew1803%22awhats-new-in-windows-10-version-1803)
|
||||||
- [Breaking changes and known issues](#breaking-changes-and-known-issues)
|
- [<a href="" id="whatsnew1809"></a>What's new in Windows 10, version 1809](#a-href%22%22-id%22whatsnew1809%22awhats-new-in-windows-10-version-1809)
|
||||||
- [Get command inside an atomic command is not supported](#getcommand)
|
- [Breaking changes and known issues](#breaking-changes-and-known-issues)
|
||||||
- [Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#notification)
|
- [<a href="" id="getcommand"></a>Get command inside an atomic command is not supported](#a-href%22%22-id%22getcommand%22aget-command-inside-an-atomic-command-is-not-supported)
|
||||||
- [Apps installed using WMI classes are not removed](#appsnotremoved)
|
- [<a href="" id="notification"></a>Notification channel URI not preserved during upgrade from Windows 8.1 to Windows 10](#a-href%22%22-id%22notification%22anotification-channel-uri-not-preserved-during-upgrade-from-windows-81-to-windows-10)
|
||||||
- [Passing CDATA in SyncML does not work](#cdata)
|
- [<a href="" id="appsnotremoved"></a>Apps installed using WMI classes are not removed](#a-href%22%22-id%22appsnotremoved%22aapps-installed-using-wmi-classes-are-not-removed)
|
||||||
- [SSL settings in IIS server for SCEP must be set to "Ignore"](#sslsettings)
|
- [<a href="" id="cdata"></a>Passing CDATA in SyncML does not work](#a-href%22%22-id%22cdata%22apassing-cdata-in-syncml-does-not-work)
|
||||||
- [MDM enrollment fails on the mobile device when traffic is going through proxy](#enrollmentviaproxy)
|
- [<a href="" id="sslsettings"></a>SSL settings in IIS server for SCEP must be set to "Ignore"](#a-href%22%22-id%22sslsettings%22assl-settings-in-iis-server-for-scep-must-be-set-to-%22ignore%22)
|
||||||
- [Server-initiated unenroll failure](#unenrollment)
|
- [<a href="" id="enrollmentviaproxy"></a>MDM enrollment fails on the mobile device when traffic is going through proxy](#a-href%22%22-id%22enrollmentviaproxy%22amdm-enrollment-fails-on-the-mobile-device-when-traffic-is-going-through-proxy)
|
||||||
- [Certificates causing issues with Wi-Fi and VPN](#certissues)
|
- [<a href="" id="unenrollment"></a>Server-initiated unenrollment failure](#a-href%22%22-id%22unenrollment%22aserver-initiated-unenrollment-failure)
|
||||||
- [Version information for mobile devices](#versioninformation)
|
- [<a href="" id="certissues"></a>Certificates causing issues with Wi-Fi and VPN](#a-href%22%22-id%22certissues%22acertificates-causing-issues-with-wi-fi-and-vpn)
|
||||||
- [Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#whitelist)
|
- [<a href="" id="versioninformation"></a>Version information for mobile devices](#a-href%22%22-id%22versioninformation%22aversion-information-for-mobile-devices)
|
||||||
- [Apps dependent on Microsoft Frameworks may get blocked](#frameworks)
|
- [<a href="" id="whitelist"></a>Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#a-href%22%22-id%22whitelist%22aupgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues)
|
||||||
- [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#wificertissue)
|
- [<a href="" id="frameworks"></a>Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#a-href%22%22-id%22frameworks%22aapps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218)
|
||||||
- [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote)
|
- [<a href="" id="wificertissue"></a>Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#a-href%22%22-id%22wificertissue%22amultiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile)
|
||||||
- [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#renewwns)
|
- [<a href="" id="remote"></a>Remote PIN reset not supported in Azure Active Directory joined mobile devices](#a-href%22%22-id%22remote%22aremote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices)
|
||||||
- [User provisioning failure in Azure Active Directory joined Windows 10 PC](#userprovisioning)
|
- [<a href="" id="renewwns"></a>MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#a-href%22%22-id%22renewwns%22amdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri)
|
||||||
- [Requirements to note for VPN certificates also used for Kerberos Authentication](#kerberos)
|
- [<a href="" id="userprovisioning"></a>User provisioning failure in Azure Active Directory joined Windows 10 PC](#a-href%22%22-id%22userprovisioning%22auser-provisioning-failure-in-azure-active-directory-joined-windows-10-pc)
|
||||||
- [Device management agent for the push-button reset is not working](#pushbuttonreset)
|
- [<a href="" id="kerberos"></a>Requirements to note for VPN certificates also used for Kerberos Authentication](#a-href%22%22-id%22kerberos%22arequirements-to-note-for-vpn-certificates-also-used-for-kerberos-authentication)
|
||||||
- [FAQ](#faq)
|
- [<a href="" id="pushbuttonreset"></a>Device management agent for the push-button reset is not working](#a-href%22%22-id%22pushbuttonreset%22adevice-management-agent-for-the-push-button-reset-is-not-working)
|
||||||
|
- [Change history in MDM documentation](#change-history-in-mdm-documentation)
|
||||||
|
- [January 2019](#january-2019)
|
||||||
|
- [December 2018](#december-2018)
|
||||||
|
- [September 2018](#september-2018)
|
||||||
|
- [August 2018](#august-2018)
|
||||||
|
- [July 2018](#july-2018)
|
||||||
|
- [June 2018](#june-2018)
|
||||||
|
- [May 2018](#may-2018)
|
||||||
|
- [April 2018](#april-2018)
|
||||||
|
- [March 2018](#march-2018)
|
||||||
|
- [February 2018](#february-2018)
|
||||||
|
- [January 2018](#january-2018)
|
||||||
|
- [December 2017](#december-2017)
|
||||||
|
- [November 2017](#november-2017)
|
||||||
|
- [October 2017](#october-2017)
|
||||||
|
- [September 2017](#september-2017)
|
||||||
|
- [August 2017](#august-2017)
|
||||||
|
- [FAQ](#faq)
|
||||||
|
|
||||||
## <a href="" id="whatsnew"></a>What's new in Windows 10, version 1511
|
## <a href="" id="whatsnew"></a>What's new in Windows 10, version 1511
|
||||||
|
|
||||||
@ -1766,6 +1784,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
|
|||||||
|--- | ---|
|
|--- | ---|
|
||||||
|[Policy CSP - Storage](policy-csp-storage.md)|Added the following new policies: AllowStorageSenseGlobal, ConfigStorageSenseGlobalCadence, AllowStorageSenseTemporaryFilesCleanup, ConfigStorageSenseRecycleBinCleanupThreshold, ConfigStorageSenseDownloadsCleanupThreshold, and ConfigStorageSenseCloudContentCleanupThreshold.|
|
|[Policy CSP - Storage](policy-csp-storage.md)|Added the following new policies: AllowStorageSenseGlobal, ConfigStorageSenseGlobalCadence, AllowStorageSenseTemporaryFilesCleanup, ConfigStorageSenseRecycleBinCleanupThreshold, ConfigStorageSenseDownloadsCleanupThreshold, and ConfigStorageSenseCloudContentCleanupThreshold.|
|
||||||
|[SharedPC CSP](sharedpc-csp.md)|Updated values and supported operations.|
|
|[SharedPC CSP](sharedpc-csp.md)|Updated values and supported operations.|
|
||||||
|
|[Mobile device management](index.md)|Updated information about MDM Security Baseline.|
|
||||||
|
|
||||||
### December 2018
|
### December 2018
|
||||||
|
|
||||||
|
@ -181,6 +181,9 @@ The following list shows the supported values:
|
|||||||
<!--Description-->
|
<!--Description-->
|
||||||
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
@ -68,7 +68,7 @@ Added in Windows 10, version 1803. This policy allows the IT admin to control wh
|
|||||||
> MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers.
|
> MDMWinsOverGP only applies to policies in Policy CSP. It does not apply to other MDM settings with equivalent GP settings that are defined on other configuration service providers.
|
||||||
|
|
||||||
This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
|
This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. The default value is 0. The MDM policies in Policy CSP will behave as described if this policy value is set 1.
|
||||||
Note: This policy doesn’t support Delete command. This policy doesn’t support setting the value to be 0 again after it was previously set 1. In Windows 10, version 1809, Delete command and setting the value to be 0 again if it was previously set to 1 will be supported.
|
Note: This policy doesn’t support the Delete command and doesn’t support setting the value to 0 again after it was previously set to 1. Windows 10 version 1809 will support using the Delete command to set the value to 0 again, if it was previously set to 1.
|
||||||
|
|
||||||
The following list shows the supported values:
|
The following list shows the supported values:
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 05/14/2018
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - DataProtection
|
# Policy CSP - DataProtection
|
||||||
@ -66,7 +66,7 @@ ms.date: 05/14/2018
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled.
|
This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when [BitLocker Device Encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) is enabled.
|
||||||
|
|
||||||
Most restricted value is 0.
|
Most restricted value is 0.
|
||||||
|
|
||||||
|
@ -6,7 +6,7 @@ ms.topic: article
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.technology: windows
|
ms.technology: windows
|
||||||
author: MariciaAlforque
|
author: MariciaAlforque
|
||||||
ms.date: 11/14/2018
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Policy CSP - Defender
|
# Policy CSP - Defender
|
||||||
@ -1156,6 +1156,7 @@ Valid values: 0–100
|
|||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
|
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
This policy setting allows you to manage whether a check for new virus and spyware definitions will occur before running a scan.
|
This policy setting allows you to manage whether a check for new virus and spyware definitions will occur before running a scan.
|
||||||
|
|
||||||
@ -1170,6 +1171,8 @@ Supported values:
|
|||||||
- 0 (default) - Disabled
|
- 0 (default) - Disabled
|
||||||
- 1 - Enabled
|
- 1 - Enabled
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/CheckForSignaturesBeforeRunningScan
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -1547,6 +1550,8 @@ Supported values:
|
|||||||
- 0 - Disabled
|
- 0 - Disabled
|
||||||
- 1 - Enabled (default)
|
- 1 - Enabled (default)
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupFullScan
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -1606,9 +1611,9 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
This policy setting allows you to configure catch-up scans for scheduled quick scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time.
|
This policy setting allows you to configure catch-up scans for scheduled quick scans. A catch-up scan is a scan that is initiated because a regularly scheduled scan was missed. Usually these scheduled scans are missed because the computer was turned off at the scheduled time.
|
||||||
|
|
||||||
If you enable this setting, catch-up scans for scheduled quick scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run.
|
If you enable this setting, catch-up scans for scheduled quick scans will be turned on. If a computer is offline for two consecutive scheduled scans, a catch-up scan is started the next time someone logs on to the computer. If there is no scheduled scan configured, there will be no catch-up scan run.
|
||||||
|
|
||||||
If you disable or do not configure this setting, catch-up scans for scheduled quick scans will be turned off.
|
If you disable or do not configure this setting, catch-up scans for scheduled quick scans will be turned off.
|
||||||
|
|
||||||
@ -1617,6 +1622,8 @@ Supported values:
|
|||||||
- 0 - Disabled
|
- 0 - Disabled
|
||||||
- 1 - Enabled (default)
|
- 1 - Enabled (default)
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/DisableCatchupQuickScan
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -2457,12 +2464,14 @@ Possible values are:
|
|||||||
- MMPC
|
- MMPC
|
||||||
- FileShares
|
- FileShares
|
||||||
|
|
||||||
For example: { InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC }
|
For example: InternalDefinitionUpdateServer | MicrosoftUpdateServer | MMPC
|
||||||
|
|
||||||
If you enable this setting, definition update sources will be contacted in the order specified. Once definition updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted.
|
If you enable this setting, definition update sources will be contacted in the order specified. Once definition updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted.
|
||||||
|
|
||||||
If you disable or do not configure this setting, definition update sources will be contacted in a default order.
|
If you disable or do not configure this setting, definition update sources will be contacted in a default order.
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateFallbackOrder
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -2522,12 +2531,18 @@ ADMX Info:
|
|||||||
|
|
||||||
<!--/Scope-->
|
<!--/Scope-->
|
||||||
<!--Description-->
|
<!--Description-->
|
||||||
This policy setting allows you to configure UNC file share sources for downloading definition updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the definition update sources. For example: "{\\unc1 | \\unc2 }". The list is empty by default.
|
This policy setting allows you to configure UNC file share sources for downloading definition updates. Sources will be contacted in the order specified. The value of this setting should be entered as a pipe-separated string enumerating the definition update sources.
|
||||||
|
|
||||||
|
For example: \\unc1\Signatures | \\unc2\Signatures
|
||||||
|
|
||||||
|
The list is empty by default.
|
||||||
|
|
||||||
If you enable this setting, the specified sources will be contacted for definition updates. Once definition updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted.
|
If you enable this setting, the specified sources will be contacted for definition updates. Once definition updates have been successfully downloaded from one specified source, the remaining sources in the list will not be contacted.
|
||||||
|
|
||||||
If you disable or do not configure this setting, the list will remain empty by default and no sources will be contacted.
|
If you disable or do not configure this setting, the list will remain empty by default and no sources will be contacted.
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateFileSharesSources
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
@ -2598,6 +2613,8 @@ A value of 0 means no check for new signatures, a value of 1 means to check ever
|
|||||||
|
|
||||||
The default value is 8.
|
The default value is 8.
|
||||||
|
|
||||||
|
OMA-URI Path: ./Vendor/MSFT/Policy/Config/Defender/SignatureUpdateInterval
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--ADMXMapped-->
|
<!--ADMXMapped-->
|
||||||
ADMX Info:
|
ADMX Info:
|
||||||
|
@ -148,7 +148,7 @@ The following list shows the supported values:
|
|||||||
> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
|
> This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.
|
||||||
|
|
||||||
|
|
||||||
Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined.
|
Specifies whether to allow automatic [device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) during OOBE when the device is Azure AD joined.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
@ -479,7 +479,7 @@ The following list shows the supported values:
|
|||||||
|
|
||||||
Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**.
|
Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**.
|
||||||
|
|
||||||
Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined.
|
Specifies whether to allow automatic [device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) during OOBE when the device is Azure AD joined.
|
||||||
|
|
||||||
<!--/Description-->
|
<!--/Description-->
|
||||||
<!--SupportedValues-->
|
<!--SupportedValues-->
|
||||||
|
@ -239,10 +239,10 @@ The following list shows the supported values:
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/crossmark.png" alt="cross mark" /></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
<td><img src="images/checkmark.png" alt="check mark" /><sup>1</sup></td>
|
||||||
</tr>
|
</tr>
|
||||||
|
@ -188,6 +188,9 @@ ms.date: 08/29/2018
|
|||||||
</dd>
|
</dd>
|
||||||
</dl>
|
</dl>
|
||||||
|
|
||||||
|
<hr/>
|
||||||
|
> [!NOTE]
|
||||||
|
> If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
<hr/>
|
<hr/>
|
||||||
|
|
||||||
|
@ -9,7 +9,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: mobile, devices, security
|
ms.pagetype: mobile, devices, security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: AMeeus
|
author: AMeeus
|
||||||
ms.date: 09/21/2017
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows 10 Mobile deployment and management guide
|
# Windows 10 Mobile deployment and management guide
|
||||||
@ -460,7 +460,7 @@ Some device-wide settings for managing VPN connections can help you manage VPNs
|
|||||||
|
|
||||||
*Applies to: Corporate and personal devices*
|
*Applies to: Corporate and personal devices*
|
||||||
|
|
||||||
Protecting the apps and data stored on a device is critical to device security. One method for helping protect your apps and data is to encrypt internal device storage. The device encryption in Windows 10 Mobile helps protect corporate data against unauthorized access, even when an unauthorized user has physical possession of the device.
|
Protecting the apps and data stored on a device is critical to device security. One method for helping protect your apps and data is to encrypt internal device storage. The [device encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) in Windows 10 Mobile helps protect corporate data against unauthorized access, even when an unauthorized user has physical possession of the device.
|
||||||
|
|
||||||
Windows 10 Mobile also has the ability to install apps on a secure digital (SD) card. The operating system stores apps on a partition specifically designated for that purpose. This feature is always on so you don’t need to set a policy explicitly to enable it.
|
Windows 10 Mobile also has the ability to install apps on a secure digital (SD) card. The operating system stores apps on a partition specifically designated for that purpose. This feature is always on so you don’t need to set a policy explicitly to enable it.
|
||||||
|
|
||||||
|
@ -7,7 +7,6 @@ ms.localizationpriority: medium
|
|||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
ms.date: 12/18/2018
|
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -20,22 +19,28 @@ author: greg-lindsay
|
|||||||
|
|
||||||
This topic provides an overview of new solutions and online content related to deploying Windows 10 in your organization.
|
This topic provides an overview of new solutions and online content related to deploying Windows 10 in your organization.
|
||||||
|
|
||||||
- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://technet.microsoft.com/itpro/windows/whats-new/index).
|
- For an all-up overview of new features in Windows 10, see [What's new in Windows 10](https://docs.microsoft.com/en-us/windows/whats-new/index).
|
||||||
- For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history).
|
- For a detailed list of changes to Windows 10 ITPro TechNet library content, see [Online content change history](#online-content-change-history).
|
||||||
|
|
||||||
## Recent additions to this page
|
## Recent additions to this page
|
||||||
|
|
||||||
[SetupDiag](#setupdiag) 1.4 is released.
|
[SetupDiag](#setupdiag) 1.4 is released.<br>
|
||||||
|
[MDT](#microsoft-deployment-toolkit-mdt) 8456 is released.<br>
|
||||||
|
New [Windows Autopilot](#windows-autopilot) content is available.<br>
|
||||||
|
The [Microsoft 365](#microsoft-365) section was added.
|
||||||
|
|
||||||
## The Modern Desktop Deployment Center
|
## The Modern Desktop Deployment Center
|
||||||
|
|
||||||
The [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus.
|
The [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home) has launched with tons of content to help you with large-scale deployment of Windows 10 and Office 365 ProPlus.
|
||||||
|
|
||||||
## Windows 10 servicing and support
|
## Microsoft 365
|
||||||
|
|
||||||
Microsoft is [extending support](https://www.microsoft.com/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop) for Windows 10 Enterprise and Windows 10 Education editions to 30 months from the version release date. This includes all past versions and future versions that are targeted for release in September (versions ending in 09, ex: 1809). Future releases that are targeted for release in March (versions ending in 03, ex: 1903) will continue to be supported for 18 months from their release date. All releases of Windows 10 Home, Windows 10 Pro, and Office 365 ProPlus will continue to be supported for 18 months (there is no change for these editions). These support policies are summarized in the table below.
|
Microsoft 365 is a new offering from Microsoft that combines
|
||||||
|
- Windows 10
|
||||||
|
- Office 365
|
||||||
|
- Enterprise Mobility and Security (EMS).
|
||||||
|
|
||||||

|
See [Deploy Windows 10 with Microsoft 365](deploy-m365.md) for an overview, which now includes a link to download a nifty [M365 Enterprise poster](deploy-m365.md#m365-enterprise-poster).
|
||||||
|
|
||||||
## Windows 10 servicing and support
|
## Windows 10 servicing and support
|
||||||
|
|
||||||
@ -60,6 +65,8 @@ Windows Autopilot streamlines and automates the process of setting up and config
|
|||||||
|
|
||||||
Windows Autopilot joins devices to Azure Active Directory (Azure AD), optionally enrolls into MDM services, configures security policies, and sets a custom out-of-box-experience (OOBE) for the end user. For more information, see [Overview of Windows Autopilot](windows-autopilot/windows-autopilot.md).
|
Windows Autopilot joins devices to Azure Active Directory (Azure AD), optionally enrolls into MDM services, configures security policies, and sets a custom out-of-box-experience (OOBE) for the end user. For more information, see [Overview of Windows Autopilot](windows-autopilot/windows-autopilot.md).
|
||||||
|
|
||||||
|
Recent Autopilot content includes new instructions for CSPs and OEMs on how to [obtain and use customer authorization](windows-autopilot/registration-auth.md) to register Windows Autopilot devices on the customer’s behalf.
|
||||||
|
|
||||||
### SetupDiag
|
### SetupDiag
|
||||||
|
|
||||||
[SetupDiag](upgrade/setupdiag.md) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful.
|
[SetupDiag](upgrade/setupdiag.md) is a standalone diagnostic tool that can be used to obtain details about why a Windows 10 upgrade was unsuccessful.
|
||||||
@ -76,7 +83,7 @@ The development of Upgrade Readiness has been heavily influenced by input from t
|
|||||||
|
|
||||||
For more information about Upgrade Readiness, see the following topics:
|
For more information about Upgrade Readiness, see the following topics:
|
||||||
|
|
||||||
- [Windows Analytics blog](https://blogs.technet.microsoft.com/upgradeanalytics/)
|
- [Windows Analytics blog](https://aka.ms/blog/WindowsAnalytics/)
|
||||||
- [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md)
|
- [Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md)
|
||||||
|
|
||||||
|
|
||||||
@ -103,19 +110,16 @@ For more information, see [MBR2GPT.EXE](mbr-to-gpt.md).
|
|||||||
|
|
||||||
### Microsoft Deployment Toolkit (MDT)
|
### Microsoft Deployment Toolkit (MDT)
|
||||||
|
|
||||||
MDT build 8443 is available, including support for:
|
MDT build 8456 (12/19/2018) is available, including support for Windows 10, version 1809, and Windows Server 2019.
|
||||||
- Deployment and upgrade of Windows 10, version 1607 (including Enterprise LTSB and Education editions) and Windows Server 2016.
|
|
||||||
- The Windows ADK for Windows 10, version 1607.
|
|
||||||
- Integration with Configuration Manager version 1606.
|
|
||||||
|
|
||||||
For more information about MDT, see the [MDT resource page](https://technet.microsoft.com/windows/dn475741).
|
For more information about MDT, see the [MDT resource page](https://docs.microsoft.com/en-us/sccm/mdt/).
|
||||||
|
|
||||||
|
|
||||||
### Windows Assessment and Deployment Kit (ADK)
|
### Windows Assessment and Deployment Kit (ADK)
|
||||||
|
|
||||||
The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. See the following topics:
|
The Windows Assessment and Deployment Kit (Windows ADK) contains tools that can be used by IT Pros to deploy Windows. See the following topics:
|
||||||
|
|
||||||
- [What's new in ADK kits and tools](https://msdn.microsoft.com/windows/hardware/commercialize/what-s-new-in-kits-and-tools)
|
- [What's new in ADK kits and tools](https://docs.microsoft.com/en-us/windows-hardware/get-started/what-s-new-in-kits-and-tools)
|
||||||
- [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md)
|
- [Windows ADK for Windows 10 scenarios for IT Pros](windows-adk-scenarios-for-it-pros.md)
|
||||||
|
|
||||||
|
|
||||||
@ -151,7 +155,7 @@ The following topics provide a change history for Windows 10 ITPro TechNet libra
|
|||||||
|
|
||||||
[Overview of Windows as a service](update/waas-overview.md)
|
[Overview of Windows as a service](update/waas-overview.md)
|
||||||
<BR>[Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md)
|
<BR>[Windows 10 deployment considerations](planning/windows-10-deployment-considerations.md)
|
||||||
<BR>[Windows 10 release information](https://technet.microsoft.com/windows/release-info.aspx)
|
<BR>[Windows 10 release information](https://docs.microsoft.com/en-us/windows/windows-10/release-information)
|
||||||
<BR>[Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/en-us/windows/windows-10-specifications)
|
<BR>[Windows 10 Specifications & Systems Requirements](https://www.microsoft.com/en-us/windows/windows-10-specifications)
|
||||||
<BR>[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md)
|
<BR>[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md)
|
||||||
<BR>[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md)
|
<BR>[Windows 10 deployment tools](windows-deployment-scenarios-and-tools.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 - How to make FoDs and language packs available when you're using WSUS/SCCM
|
title: Windows 10 - How to make FoD and language packs available when you're using WSUS/SCCM
|
||||||
description: Learn how to make FoDs and language packs available for updates when you're using WSUS/SCCM.
|
description: Learn how to make FoD and language packs available when you're using WSUS/SCCM
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: manage
|
ms.mktglfcycl: manage
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
@ -14,10 +14,10 @@ ms.date: 10/18/2018
|
|||||||
|
|
||||||
> Applies to: Windows 10
|
> Applies to: Windows 10
|
||||||
|
|
||||||
As of Windows 10, version 1709, you can't use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) and language packs for Windows 10 clients. Instead, you can pull them directly from Windows Update - you just need to change a Group Policy setting that lets clients download these directly from Windows Update. You can also host Features on Demand and language packs on a network share, but starting with Windows 10, version 1809, language packs can only be installed from Windows Update.
|
As of Windows 10 version 1709, you cannot use Windows Server Update Services (WSUS) to host [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) (FOD) and language packs for Windows 10 clients locally. Instead, you can enforce a Group Policy setting that tells the clients to pull them directly from Windows Update. You can also host FOD and language packs on a network share, but starting with Windows 10 version 1809, language packs can only be installed from Windows Update.
|
||||||
|
|
||||||
For Active Directory and Group Policy environments running in a WSUS\SCCM environment change the **Specify settings for optional component installation and component repair** policy to enable downloading Features on Demand directly from Windows Update or a local share. This setting is located in Computer Configuration\Administrative Templates\System in the Group Policy Editor.
|
For Windows domain environments running WSUS or SCCM, change the **Specify settings for optional component installation and component repair** policy to enable downloading language and FOD packs from Windows Update. This setting is located in `Computer Configuration\Administrative Templates\System` in the Group Policy Editor.
|
||||||
|
|
||||||
Changing this policy only enables Features on Demand and language pack downloads from Windows Update - it doesn't affect how clients get feature and quality updates. Feature and quality updates will continue to come directly from WSUS\SCCM. It also doesn't affect the schedule for your clients to receive updates.
|
|
||||||
|
|
||||||
Learn about other client management options, including using Group Policy and ADMX, in [Manage clients in Windows 10](https://docs.microsoft.com/windows/client-management/).
|
Changing this policy does not affect how other updates are distributed. They continue to come from WSUS or SCCM as you have scheduled them.
|
||||||
|
|
||||||
|
Learn about other client management options, including using Group Policy and administrative templates, in [Manage clients in Windows 10](https://docs.microsoft.com/windows/client-management/).
|
||||||
|
@ -63,10 +63,6 @@ Starting with Windows 10, version 1703, users can configure the branch readiness
|
|||||||
|
|
||||||
After you configure the servicing branch (Windows Insider Preview or Semi-Annual Channel), you can then define if, and for how long, you would like to defer receiving Feature Updates following their availability from Microsoft on Windows Update. You can defer receiving these Feature Updates for a period of up to 365 days from their release by setting the `DeferFeatureUpdatesPeriodinDays` value.
|
After you configure the servicing branch (Windows Insider Preview or Semi-Annual Channel), you can then define if, and for how long, you would like to defer receiving Feature Updates following their availability from Microsoft on Windows Update. You can defer receiving these Feature Updates for a period of up to 365 days from their release by setting the `DeferFeatureUpdatesPeriodinDays` value.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
|
||||||
>
|
|
||||||
>You can only defer up to 180 days on devices running Windows 10, version 1703.
|
|
||||||
|
|
||||||
For example, a device on the Semi-Annual Channel with `DeferFeatureUpdatesPeriodinDays=30` will not install a feature update that is first publicly available on Windows Update in September until 30 days later, in October.
|
For example, a device on the Semi-Annual Channel with `DeferFeatureUpdatesPeriodinDays=30` will not install a feature update that is first publicly available on Windows Update in September until 30 days later, in October.
|
||||||
|
|
||||||
|
|
||||||
@ -274,4 +270,4 @@ When a device running a newer version sees an update available on Windows Update
|
|||||||
- [Walkthrough: use Intune to configure Windows Update for Business](waas-wufb-intune.md)
|
- [Walkthrough: use Intune to configure Windows Update for Business](waas-wufb-intune.md)
|
||||||
- [Deploy Windows 10 updates using Windows Server Update Services](waas-manage-updates-wsus.md)
|
- [Deploy Windows 10 updates using Windows Server Update Services](waas-manage-updates-wsus.md)
|
||||||
- [Deploy Windows 10 updates using System Center Configuration Manager](waas-manage-updates-configuration-manager.md)
|
- [Deploy Windows 10 updates using System Center Configuration Manager](waas-manage-updates-configuration-manager.md)
|
||||||
- [Manage device restarts after updates](waas-restart.md)
|
- [Manage device restarts after updates](waas-restart.md)
|
||||||
|
@ -7,7 +7,6 @@ ms.sitesec: library
|
|||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 11/16/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Deploy updates using Windows Update for Business
|
# Deploy updates using Windows Update for Business
|
||||||
@ -76,7 +75,7 @@ The group policy path for Windows Update for Business has changed to correctly r
|
|||||||
|
|
||||||
## Managing Windows Update for Business with MDM
|
## Managing Windows Update for Business with MDM
|
||||||
|
|
||||||
Starting with Windows 10, version 1709, Windows Update for Business was changed to correctly reflect its association to Windows Update for Business and provide the ability to easily manage Windows Insider Preview builds in 1709.
|
Starting with Windows 10, version 1709, the Windows Update for Business settings in MDM were changed to correctly reflect the associations with Windows Update for Business and provide the ability to easily manage Windows Insider Preview builds in 1709.
|
||||||
|
|
||||||
| Action | Windows 10 versions prior to 1709 | Windows 10 versions after 1709 |
|
| Action | Windows 10 versions prior to 1709 | Windows 10 versions after 1709 |
|
||||||
| --- | --- | --- |
|
| --- | --- | --- |
|
||||||
|
@ -8,7 +8,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: jaimeo
|
author: jaimeo
|
||||||
ms.author: jaimeo
|
ms.author: jaimeo
|
||||||
ms.date: 10/29/2018
|
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -209,7 +208,8 @@ If you want to stop using Upgrade Readiness and stop sending diagnostic data to
|
|||||||
2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the diagnostic data level to **Security**:
|
2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the diagnostic data level to **Security**:
|
||||||
|
|
||||||
**Windows 7 and Windows 8.1**: Delete CommercialDataOptIn registry property from *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection*
|
**Windows 7 and Windows 8.1**: Delete CommercialDataOptIn registry property from *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection*
|
||||||
**Windows 10**: Follow the instructions in the [Configure Windows diagnostic data in your organization](/configuration/configure-windows-diagnostic-data-in-your-organization.md) topic.
|
|
||||||
|
**Windows 10**: Follow the instructions in [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/privacy/configure-windows-diagnostic-data-in-your-organization).
|
||||||
|
|
||||||
3. If you enabled **Internet Explorer Site Discovery**, you can disable Internet Explorer data collection by setting the *IEDataOptIn* registry key to value "0". The IEDataOptIn key can be found under: *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection*.
|
3. If you enabled **Internet Explorer Site Discovery**, you can disable Internet Explorer data collection by setting the *IEDataOptIn* registry key to value "0". The IEDataOptIn key can be found under: *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection*.
|
||||||
4. **Optional step:** You can also remove the “CommercialId” key from: "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection".
|
4. **Optional step:** You can also remove the “CommercialId” key from: "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection".
|
||||||
|
@ -49,7 +49,44 @@ The Settings UI is talking to the Update Orchestrator service which in turn is t
|
|||||||
2. Launch Services.msc and check if the following services are running:
|
2. Launch Services.msc and check if the following services are running:
|
||||||
- Update State Orchestrator
|
- Update State Orchestrator
|
||||||
- Windows Update
|
- Windows Update
|
||||||
|
|
||||||
|
## Feature updates are not being offered while other updates are
|
||||||
|
On computers running [Windows 10 1709 or higher](#BKMK_DCAT) configured to update from Windows Update (usually WUfB scenario) servicing and definition updates are being installed successfully, but feature updates are never offered.
|
||||||
|
|
||||||
|
Checking the WindowsUpdate.log reveals the following error:
|
||||||
|
```
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent * START * Finding updates CallerId = Update;taskhostw Id = 25
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Online = Yes; Interactive = No; AllowCachedResults = No; Ignore download priority = No
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent ServiceID = {855E8A7C-ECB4-4CA3-B045-1DFA50104289} Third party service
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Search Scope = {Current User}
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Caller SID for Applicability: S-1-12-1-2933642503-1247987907-1399130510-4207851353
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc Got 855E8A7C-ECB4-4CA3-B045-1DFA50104289 redir Client/Server URL: https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx""
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc Token Requested with 0 category IDs.
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc GetUserTickets: No user tickets found. Returning WU_E_NO_USERTOKEN.
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::GetDeviceTickets:570]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::GetDeviceTickets:570]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetDeviceTickets
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [AuthTicketHelper::AddTickets:1092]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Method failed [CUpdateEndpointProvider::GenerateSecurityTokenWithAuthTickets:1587]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetAgentTokenFromServer
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] GetAgentToken
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] EP:Call to GetEndpointToken
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Misc *FAILED* [80070426] Failed to obtain service 855E8A7C-ECB4-4CA3-B045-1DFA50104289 plugin Client/Server auth token of type 0x00000001
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID ProtocolTalker *FAILED* [80070426] Method failed [CAgentProtocolTalkerContext::DetermineServiceEndpoint:377]
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID ProtocolTalker *FAILED* [80070426] Initialization failed for Protocol Talker Context
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent Exit code = 0x80070426
|
||||||
|
YYYY/MM/DD HH:mm:ss:SSS PID TID Agent * END * Finding updates CallerId = Update;taskhostw Id = 25
|
||||||
|
```
|
||||||
|
|
||||||
|
The 0x80070426 error code translates to:
|
||||||
|
```
|
||||||
|
ERROR_SERVICE_NOT_ACTIVE - # The service has not been started.
|
||||||
|
```
|
||||||
|
|
||||||
|
Microsoft Account Sign In Assistant (MSA or wlidsvc) is the service in question. The DCAT Flighting service (ServiceId: 855E8A7C-ECB4-4CA3-B045-1DFA50104289) relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client and the search for feature updates never completes successfully.
|
||||||
|
|
||||||
|
In order to solve this issue, we need to reset the MSA service to the default StartType of manual.
|
||||||
|
|
||||||
## Issues related to HTTP/Proxy
|
## Issues related to HTTP/Proxy
|
||||||
Windows Update uses WinHttp with Partial Range requests (RFC 7233) to download updates and applications from Windows Update servers or on-premises WSUS servers. Because of this proxy servers configured on the network must support HTTP RANGE requests. If a proxy was configured in Internet Explorer (User level) but not in WinHTTP (System level), connections to Windows Update will fail.
|
Windows Update uses WinHttp with Partial Range requests (RFC 7233) to download updates and applications from Windows Update servers or on-premises WSUS servers. Because of this proxy servers configured on the network must support HTTP RANGE requests. If a proxy was configured in Internet Explorer (User level) but not in WinHTTP (System level), connections to Windows Update will fail.
|
||||||
|
|
||||||
@ -115,7 +152,7 @@ Check the output for the Name and OffersWindowsUPdates parameters, which you can
|
|||||||
|Output|Interpretation|
|
|Output|Interpretation|
|
||||||
|-|-|
|
|-|-|
|
||||||
|- Name: Microsoft Update <br>-OffersWindowsUpdates: True| - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) |
|
|- Name: Microsoft Update <br>-OffersWindowsUpdates: True| - The update source is Microsoft Update, which means that updates for other Microsoft products besides the operating system could also be delivered.<br>- Indicates that the client is configured to receive updates for all Microsoft Products (Office, etc.) |
|
||||||
|- Name: DCat Flighting Prod <br>- OffersWindowsUpdates: False|- The update source is the Windows Insider Program.<br>- Indicates that the client will not receive or is not configured to receive these updates. |
|
|- <a name="BKMK_DCAT"></a>Name: DCat Flighting Prod <br>- OffersWindowsUpdates: True |- Starting with Windows 10 1709, feature updates are always delivered through the DCAT service.<br>- Indicates that the client is configured to receive feature updates from Windows Update. |
|
||||||
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client will not receive or is not configured to receive these updates.|
|
|- Name: Windows Store (DCat Prod) <br>- OffersWindowsUpdates: False |-The update source is Insider Updates for Store Apps.<br>- Indicates that the client will not receive or is not configured to receive these updates.|
|
||||||
|- Name: Windows Server Update Service <br>- OffersWindowsUpdates: True |- The source is a Windows Server Updates Services server. <br>- The client is configured to receive updates from WSUS. |
|
|- Name: Windows Server Update Service <br>- OffersWindowsUpdates: True |- The source is a Windows Server Updates Services server. <br>- The client is configured to receive updates from WSUS. |
|
||||||
|- Name: Windows Update<br>- OffersWindowsUpdates: True|- The source is Windows Update. <br>- The client is configured to receive updates from Windows Update Online.|
|
|- Name: Windows Update<br>- OffersWindowsUpdates: True|- The source is Windows Update. <br>- The client is configured to receive updates from Windows Update Online.|
|
||||||
|
@ -42,7 +42,7 @@ To quickly use SetupDiag on your current computer:
|
|||||||
8. Use Notepad to open the log file: **SetupDiagResults.log**.
|
8. Use Notepad to open the log file: **SetupDiagResults.log**.
|
||||||
9. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below.
|
9. Review the information that is displayed. If a rule was matched this can tell you why the computer failed to upgrade, and potentially how to fix the problem. See the [Text log sample](#text-log-sample) below.
|
||||||
|
|
||||||
For instructions on how to run the tool in offline more and with more advanced options, see the [Parameters](#parameters) and [Examples](#examples) sections below.
|
For instructions on how to run the tool in offline mode and with more advanced options, see the [Parameters](#parameters) and [Examples](#examples) sections below.
|
||||||
|
|
||||||
The [Release notes](#release-notes) section at the bottom of this topic has information about recent updates to this tool.
|
The [Release notes](#release-notes) section at the bottom of this topic has information about recent updates to this tool.
|
||||||
|
|
||||||
@ -509,4 +509,4 @@ Refer to https://docs.microsoft.com/windows/deployment/upgrade/upgrade-error-cod
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Resolve Windows 10 upgrade errors: Technical information for IT Pros](https://docs.microsoft.com/windows/deployment/upgrade/resolve-windows-10-upgrade-errors)
|
[Resolve Windows 10 upgrade errors: Technical information for IT Pros](https://docs.microsoft.com/windows/deployment/upgrade/resolve-windows-10-upgrade-errors)
|
||||||
|
@ -135,7 +135,7 @@ Error creating or updating registry key: **CommercialId** at **HKLM:\SOFTWARE\Mi
|
|||||||
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. Check the ExceptionHResult and ExceptionMessage for more details. |
|
| 51 - RunCensus failed with an unexpected exception. | RunCensus explitly runs the process used to collect device information. The method failed with an unexpected exception. Check the ExceptionHResult and ExceptionMessage for more details. |
|
||||||
| 52 - DeviceCensus.exe not found on a Windows 10 machine. | On computers running Windows 10, the process devicecensus.exe should be present in the \system32 directory. Error code 52 is returned if the process was not found. Ensure that it exists at the specified location. |
|
| 52 - DeviceCensus.exe not found on a Windows 10 machine. | On computers running Windows 10, the process devicecensus.exe should be present in the \system32 directory. Error code 52 is returned if the process was not found. Ensure that it exists at the specified location. |
|
||||||
| 53 - There is a different CommercialID present at the GPO path: **HKLM:\SOFTWARE\Policies\Microsoft \Windows\DataCollection**. This will take precedence over the CommercialID provided in the script. | Provide the correct CommercialID at the GPO location. |
|
| 53 - There is a different CommercialID present at the GPO path: **HKLM:\SOFTWARE\Policies\Microsoft \Windows\DataCollection**. This will take precedence over the CommercialID provided in the script. | Provide the correct CommercialID at the GPO location. |
|
||||||
| 54 - Microsoft Account Sign In Assistant Service is Disabled. | This service is required for devices running Windows 10. The diagnostic data client relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client. |
|
| 54 - Microsoft Account Sign In Assistant Service is Disabled. | This service is required for devices running Windows 10. The diagnostic data client relies on the Microsoft Account Sign In Assistant (MSA) to get the Global Device ID for the device. Without the MSA service running, the global device ID will not be generated and sent by the client and Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). |
|
||||||
| 55 - SetDeviceNameOptIn function failed to create registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | The function SetDeviceNameOptIn sets the registry key value which determines whether to send the device name in diagnostic data. The function tries to create the registry key path if it does not already exist. Verify that the account has the correct permissions to change or add registry keys. |
|
| 55 - SetDeviceNameOptIn function failed to create registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | The function SetDeviceNameOptIn sets the registry key value which determines whether to send the device name in diagnostic data. The function tries to create the registry key path if it does not already exist. Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
| 56 - SetDeviceNameOptIn function failed to create property AllowDeviceNameInTelemetry at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys.|
|
| 56 - SetDeviceNameOptIn function failed to create property AllowDeviceNameInTelemetry at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys.|
|
||||||
| 57 - SetDeviceNameOptIn function failed to update AllowDeviceNameInTelemetry property to value 1 at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys. |
|
| 57 - SetDeviceNameOptIn function failed to update AllowDeviceNameInTelemetry property to value 1 at registry key path: **HKLM:\SOFTWARE\Policies\Microsoft\Windows\DataCollection** | Verify that the account has the correct permissions to change or add registry keys. |
|
||||||
|
@ -22,7 +22,7 @@ The simplest path to upgrade PCs currently running Windows 7, Windows 8, or Wi
|
|||||||
## Proof-of-concept environment
|
## Proof-of-concept environment
|
||||||
|
|
||||||
|
|
||||||
For the purposes of this topic, we will use three machines: DC01, CM01, and PC0003. DC01 is a domain controller and CM01 is a Windows Server 2012 R2 standard machine, fully patched with the latest security updates, and configured as a member server in the fictional contoso.com domain. PC0003 is a machine with Windows 7 SP1, targeted for the Windows 10 upgrade. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
For the purposes of this topic, we will use three machines: DC01, CM01, and PC0001. DC01 is a domain controller and CM01 is a Windows Server 2012 R2 standard machine, fully patched with the latest security updates, and configured as a member server in the fictional contoso.com domain. PC0001 is a machine with Windows 7 SP1, targeted for the Windows 10 upgrade. For more details on the setup for this topic, please see [Deploy Windows 10 with the Microsoft Deployment Toolkit](../deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md).
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
@ -48,7 +48,7 @@ For full details and an explanation of the task sequence steps, review the full
|
|||||||
## Create a device collection
|
## Create a device collection
|
||||||
|
|
||||||
|
|
||||||
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0003 machine running Windows 7 SP1, with the Configuration Manager client installed.
|
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0001 machine running Windows 7 SP1, with the Configuration Manager client installed.
|
||||||
|
|
||||||
1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||||
- General
|
- General
|
||||||
@ -65,13 +65,13 @@ After you create the upgrade task sequence, you can create a collection to test
|
|||||||
|
|
||||||
- Attribute Name: Name
|
- Attribute Name: Name
|
||||||
|
|
||||||
- Value: PC0003
|
- Value: PC0001
|
||||||
|
|
||||||
- Select Resources
|
- Select Resources
|
||||||
|
|
||||||
- Select PC0003
|
- Select PC0001
|
||||||
|
|
||||||
2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0003 machine in the collection.
|
2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0001 machine in the collection.
|
||||||
|
|
||||||
## Deploy the Windows 10 upgrade
|
## Deploy the Windows 10 upgrade
|
||||||
|
|
||||||
@ -94,9 +94,9 @@ In this section, you create a deployment for the Windows 10 Enterprise x64 Upda
|
|||||||
## Start the Windows 10 upgrade
|
## Start the Windows 10 upgrade
|
||||||
|
|
||||||
|
|
||||||
In this section, you start the Windows 10 Upgrade task sequence on PC0003 (currently running Windows 7 SP1).
|
In this section, you start the Windows 10 Upgrade task sequence on PC0001 (currently running Windows 7 SP1).
|
||||||
|
|
||||||
1. On PC0003, start the **Software Center**.
|
1. On PC0001, start the **Software Center**.
|
||||||
2. Select the **Windows vNext Upgrade** task sequence, and then click **Install**.
|
2. Select the **Windows vNext Upgrade** task sequence, and then click **Install**.
|
||||||
|
|
||||||
When the task sequence begins, it will automatically initiate the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
When the task sequence begins, it will automatically initiate the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
||||||
@ -143,7 +143,7 @@ Figure 3. The Configuration Manager upgrade task sequence.
|
|||||||
|
|
||||||
### Create a device collection
|
### Create a device collection
|
||||||
|
|
||||||
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0003 machine running Windows 7 SP1, with the next version of System Center Configuration Manager client installed.
|
After you create the upgrade task sequence, you can create a collection to test a deployment. In this section, we assume you have the PC0001 machine running Windows 7 SP1, with the next version of System Center Configuration Manager client installed.
|
||||||
|
|
||||||
1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
1. On CM01, using the Configuration Manager console, in the Asset and Compliance workspace, right-click **Device Collections**, and then select **Create Device Collection**. Use the following settings:
|
||||||
- General
|
- General
|
||||||
@ -160,13 +160,13 @@ After you create the upgrade task sequence, you can create a collection to test
|
|||||||
|
|
||||||
- Attribute Name: Name
|
- Attribute Name: Name
|
||||||
|
|
||||||
- Value: PC0003
|
- Value: PC0001
|
||||||
|
|
||||||
- Select Resources
|
- Select Resources
|
||||||
|
|
||||||
- Select PC0003
|
- Select PC0001
|
||||||
|
|
||||||
2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0003 machine in the collection.
|
2. Review the Windows 10 Enterprise x64 Upgrade collection. Do not continue until you see the PC0001 machine in the collection.
|
||||||
|
|
||||||
### Deploy the Windows 10 upgrade
|
### Deploy the Windows 10 upgrade
|
||||||
|
|
||||||
@ -187,9 +187,9 @@ In this section, you create a deployment for the Windows 10 Enterprise x64 Upda
|
|||||||
|
|
||||||
### Start the Windows 10 upgrade
|
### Start the Windows 10 upgrade
|
||||||
|
|
||||||
In this section, you start the Windows 10 Upgrade task sequence on PC0003 (currently running Windows 7 SP1).
|
In this section, you start the Windows 10 Upgrade task sequence on PC0001 (currently running Windows 7 SP1).
|
||||||
|
|
||||||
1. On PC0003, start the **Software Center**.
|
1. On PC0001, start the **Software Center**.
|
||||||
2. Select the **Windows 10 Enterprise x64 Upgrade** task sequence, and then click **Install.**
|
2. Select the **Windows 10 Enterprise x64 Upgrade** task sequence, and then click **Install.**
|
||||||
|
|
||||||
When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
When the task sequence begins, it automatically initiates the in-place upgrade process by invoking the Windows setup program (Setup.exe) with the necessary command-line parameters to perform an automated upgrade, which preserves all data, settings, apps, and drivers.
|
||||||
|
@ -64,7 +64,7 @@ For Microsoft customers with Enterprise Agreements (EA) or Microsoft Products &
|
|||||||
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
- Devices must be Azure AD-joined or Active Directory joined with Azure AD Connect. Workgroup-joined devices are not supported.
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>In issue has been identified with Hybrid Azure AD joined devices that have enabled [multi-factor authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted) (MFA). If a user signs into a device using their Active Directory account and MFA is enabled, the device will not successfully upgrade to their Windows Enterprise subscription. To resolve this issue, the user must either sign in with an Azure Active Directory account, or you must disable MFA for this user during the 30-day polling period and renewal.
|
>An issue has been identified with Hybrid Azure AD joined devices that have enabled [multi-factor authentication](https://docs.microsoft.com/azure/active-directory/authentication/howto-mfa-getstarted) (MFA). If a user signs into a device using their Active Directory account and MFA is enabled, the device will not successfully upgrade to their Windows Enterprise subscription. To resolve this issue, the user must either sign in with an Azure Active Directory account, or you must disable MFA for this user during the 30-day polling period and renewal.
|
||||||
|
|
||||||
For Microsoft customers that do not have EA or MPSA, you can obtain Windows 10 Enterprise E3 or E5 through a cloud solution provider (CSP). Identity management and device requirements are the same when you use CSP to manage licenses, with the exception that Windows 10 Enterprise E3 is also available through CSP to devices running Windows 10, version 1607. For more information about obtaining Windows 10 Enterprise E3 through your CSP, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
|
For Microsoft customers that do not have EA or MPSA, you can obtain Windows 10 Enterprise E3 or E5 through a cloud solution provider (CSP). Identity management and device requirements are the same when you use CSP to manage licenses, with the exception that Windows 10 Enterprise E3 is also available through CSP to devices running Windows 10, version 1607. For more information about obtaining Windows 10 Enterprise E3 through your CSP, see [Windows 10 Enterprise E3 in CSP](windows-10-enterprise-e3-overview.md).
|
||||||
|
|
||||||
|
@ -24,6 +24,7 @@
|
|||||||
### [Administering Autopilot via Microsoft 365 Business & Office 365 Admin portal](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa)
|
### [Administering Autopilot via Microsoft 365 Business & Office 365 Admin portal](https://support.office.com/article/Create-and-edit-Autopilot-profiles-5cf7139e-cfa1-4765-8aad-001af1c74faa)
|
||||||
## Getting started
|
## Getting started
|
||||||
### [Demonstrate Autopilot deployment on a VM](demonstrate-deployment-on-vm.md)
|
### [Demonstrate Autopilot deployment on a VM](demonstrate-deployment-on-vm.md)
|
||||||
|
## [Customer consent](registration-auth.md)
|
||||||
## [Troubleshooting](troubleshooting.md)
|
## [Troubleshooting](troubleshooting.md)
|
||||||
## [FAQ](autopilot-faq.md)
|
## [FAQ](autopilot-faq.md)
|
||||||
## [Support](autopilot-support.md)
|
## [Support](autopilot-support.md)
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 12/12/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Adding devices to Windows Autopilot
|
# Adding devices to Windows Autopilot
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 11/05/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot FAQ
|
# Windows Autopilot FAQ
|
||||||
@ -25,8 +24,9 @@ A [glossary](#glossary) of abbreviations used in this topic is provided at the e
|
|||||||
|
|
||||||
| Question | Answer |
|
| Question | Answer |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| In the Partner Center, does the Tenant ID need to be provided with every device file upload (to then allow the business customer to access their devices in MSfB)? | No. Providing the Tenant ID is a one-time entry in the Partner Center that can be re-used with future device uploads. |
|
| In the Partner Center, does the Tenant ID need to be provided with every device file upload? Is this needed to allow the business customer to access their devices in MSfB? | No. Providing the Tenant ID is a one-time entry in the Partner Center that can be re-used with future device uploads. |
|
||||||
| How does the customer or tenant know that their devices are ready to be claimed in MSfB? | After the device file upload is completed in the Partner Center, the tenant can see the devices available for Windows Autopilot setup in MSfB. The OEM would need to advise the tenant to access MSfB. Auto-notification from MSfB to the tenant is being developed. |
|
| How does the customer or tenant know that their devices are ready to be claimed in MSfB? | After the device file upload is completed in the Partner Center, the tenant can see the devices available for Windows Autopilot setup in MSfB. The OEM would need to advise the tenant to access MSfB. Auto-notification from MSfB to the tenant is being developed. |
|
||||||
|
| How does a customer authorize an OEM or Channel Partner to register Autopilot devices on the customer’s behalf? | Before an OEM or Channel Partner can register a device for Autopilot on behalf of a customer, the customer must first give them consent. The consent process begins with the OEM or Channel Partner sending a link to the customer, which directs the customer to a consent page in Microsoft Store for Business. The steps explaining this process are [here](registration-auth.md). |
|
||||||
| Are there any restrictions if a business customer has registered devices in MSfB and later wants those devices to be managed by a CSP via the Partner Center? | The devices will need to be deleted in MSfB by the business customer before the CSP can upload and manage them in the Partner Center. |
|
| Are there any restrictions if a business customer has registered devices in MSfB and later wants those devices to be managed by a CSP via the Partner Center? | The devices will need to be deleted in MSfB by the business customer before the CSP can upload and manage them in the Partner Center. |
|
||||||
| Does Windows Autopilot support removing the option to enable a local administrator account? | Windows Autopilot doesn’t support removing the local admin account. However, it does support restricting the user performing AAD domain join in OOBE to a standard account (versus admin account by default).|
|
| Does Windows Autopilot support removing the option to enable a local administrator account? | Windows Autopilot doesn’t support removing the local admin account. However, it does support restricting the user performing AAD domain join in OOBE to a standard account (versus admin account by default).|
|
||||||
| How can I test the Windows Autopilot CSV file in the Partner Center? | Only CSP Partners have access to the Partner Center portal. If you are a CSP, you can create a Sales agent user account which has access to “Devices” for testing the file. This can be done today in the Partner Center. <br><br>Go [here](https://msdn.microsoft.com/partner-center/createuseraccounts-and-set-permissions) for more information. |
|
| How can I test the Windows Autopilot CSV file in the Partner Center? | Only CSP Partners have access to the Partner Center portal. If you are a CSP, you can create a Sales agent user account which has access to “Devices” for testing the file. This can be done today in the Partner Center. <br><br>Go [here](https://msdn.microsoft.com/partner-center/createuseraccounts-and-set-permissions) for more information. |
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Autopilot deployment
|
# Configure Autopilot deployment
|
||||||
@ -32,4 +31,4 @@ When deploying new devices using Windows Autopilot, a common set of steps are re
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Windows Autopilot scenarios](windows-autopilot-scenarios.md)
|
[Windows Autopilot scenarios](windows-autopilot-scenarios.md)
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Demonstrate Autopilot deployment on a VM
|
# Demonstrate Autopilot deployment on a VM
|
||||||
|
@ -10,7 +10,6 @@ ms.pagetype: deploy
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 12/13/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot Enrollment Status page
|
# Windows Autopilot Enrollment Status page
|
||||||
@ -63,6 +62,4 @@ For more information on configuring the Enrollment Status page, see the [Microso
|
|||||||
For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP docuementation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).<br>
|
For details about the underlying implementation, see the [FirstSyncStatus details in the DMClient CSP docuementation](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp).<br>
|
||||||
For more information about blocking for app installation:
|
For more information about blocking for app installation:
|
||||||
- [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/).
|
- [Blocking for app installation using Enrollment Status Page](https://blogs.technet.microsoft.com/mniehaus/2018/12/06/blocking-for-app-installation-using-enrollment-status-page/).
|
||||||
- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514).
|
- [Support Tip: Office C2R installation is now tracked during ESP](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Support-Tip-Office-C2R-installation-is-now-tracked-during-ESP/ba-p/295514).
|
||||||
|
|
||||||
|
|
BIN
windows/deployment/windows-autopilot/images/csp1.png
Normal file
After Width: | Height: | Size: 8.8 KiB |
BIN
windows/deployment/windows-autopilot/images/csp2.png
Normal file
After Width: | Height: | Size: 58 KiB |
BIN
windows/deployment/windows-autopilot/images/csp3.png
Normal file
After Width: | Height: | Size: 234 KiB |
BIN
windows/deployment/windows-autopilot/images/csp4.png
Normal file
After Width: | Height: | Size: 74 KiB |
BIN
windows/deployment/windows-autopilot/images/csp5.png
Normal file
After Width: | Height: | Size: 23 KiB |
BIN
windows/deployment/windows-autopilot/images/csp6.png
Normal file
After Width: | Height: | Size: 234 KiB |
BIN
windows/deployment/windows-autopilot/images/csp7.png
Normal file
After Width: | Height: | Size: 74 KiB |
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 12/13/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Configure Autopilot profiles
|
# Configure Autopilot profiles
|
||||||
@ -58,4 +57,4 @@ The following profile settings are available:
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Configure Autopilot deployment](configure-autopilot.md)
|
[Configure Autopilot deployment](configure-autopilot.md)
|
||||||
|
76
windows/deployment/windows-autopilot/registration-auth.md
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
---
|
||||||
|
title: Windows Autopilot customer consent
|
||||||
|
description: Support information for Windows Autopilot
|
||||||
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune, csp, OEM
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.localizationpriority: low
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: deploy
|
||||||
|
author: greg-lindsay
|
||||||
|
ms.author: greg-lindsay
|
||||||
|
---
|
||||||
|
|
||||||
|
# Windows Autopilot customer consent
|
||||||
|
|
||||||
|
**Applies to: Windows 10**
|
||||||
|
|
||||||
|
This article describes how a cloud service provider (CSP) partner (direct bill, indirect provider, or indirect reseller) or an OEM can get customer authorization to register Windows Autopilot devices on the customer’s behalf.
|
||||||
|
|
||||||
|
## CSP authorization
|
||||||
|
|
||||||
|
CSP partners can get customer authorization to register Windows Autopilot devices on the customer’s behalf per the following restrictions:
|
||||||
|
|
||||||
|
<table>
|
||||||
|
<tr><td>Direct CSP<td>Gets direct authorization from the customer to register devices.
|
||||||
|
<tr><td>Indirect CSP Provider<td>Gets implicit permission to register devices through the relationship their CSP Reseller partner has with the customer. Indirect CSP Providers register devices through Microsoft Partner Center.
|
||||||
|
<tr><td>Indirect CSP Reseller<td>Gets direct authorization from the customer to register devices. At the same time, their indirect CSP Provider partner also gets authorization, which mean that either the Indirect Provider or the Indirect Reseller can register devices for the customer. However, the Indirect CSP Reseller must register devices through the MPC UI (manually uploading CSV file), whereas the Indirect CSP Provider has the option to register devices using the MPC APIs.
|
||||||
|
</table>
|
||||||
|
|
||||||
|
### Steps
|
||||||
|
|
||||||
|
For a CSP to register Windows Autopilot devices on behalf of a customer, the customer must first grant that CSP partner permission using the following process:
|
||||||
|
|
||||||
|
1. CSP sends link to customer requesting authorization/consent to register/manage devices on their behalf. To do so:
|
||||||
|
- CSP logs into Microsoft Partner Center
|
||||||
|
- Click **Dashboard** on the top menu
|
||||||
|
- Click **Customer** on the side menu
|
||||||
|
- Click the **Request a reseller relationship** link:
|
||||||
|

|
||||||
|
- Select the checkbox indicating whether or not you want delegated admin rights:
|
||||||
|

|
||||||
|
- NOTE: Depending on your partner, they might request Delegated Admin Permissions (DAP) when requesting this consent. You should ask them to use the newer DAP-free process (shown in tihs document) if possible. If not, you can easily remove their DAP status either from Microsoft Store for Business or the Office 365 admin portal: https://docs.microsoft.com/en-us/partner-center/customers_revoke_admin_privileges
|
||||||
|
- Send the template above to the customer via email.
|
||||||
|
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link in the body of the email once they receive it from the CSP, which takes them directly to the following MSfB page:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
NOTE: A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
3. Customer selects the **Yes** checkbox, followed by the **Accept** button. Authorization happens instantaneously.
|
||||||
|
4. The CSP will know that this consent/authorization request has been completed because the customer will show up in the CSP’s MPC account under their **customers** list, for example:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## OEM authorization
|
||||||
|
|
||||||
|
Each OEM has a unique link to provide to their respective customers, which the OEM can request from Microsoft via msoemops@microsoft.com.
|
||||||
|
|
||||||
|
1. OEM emails link to their customer.
|
||||||
|
2. Customer with global administrator privileges in Microsoft Store for Business (MSfB) clicks the link once they receive it from the OEM, which takes them directly to the following MSfB page:
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
NOTE: A user without global admin privileges who clicks the link will see a message similar to the following:
|
||||||
|
|
||||||
|

|
||||||
|
3. Customer selects the **Yes** checkbox, followed by the **Accept** button, and they’re done. Authorization happens instantaneously.
|
||||||
|
|
||||||
|
4. The OEM can use the Validate Device Submission Data API to verify the consent has completed. This API is discussed in the latest version of the API Whitepaper, p. 14ff [https://devicepartner.microsoft.com/assets/detail/windows-autopilot-integration-with-oem-api-design-whitepaper-docx](https://devicepartner.microsoft.com/assets/detail/windows-autopilot-integration-with-oem-api-design-whitepaper-docx). **Note**: this link is only accessible by Microsoft Device Partners. As discussed in this whitepaper, it’s a best practice recommendation for OEM partners to run the API check to confirm they’ve received customer consent before attempting to register devices, thus avoiding errors in the registration process.
|
||||||
|
|
||||||
|
## Summary
|
||||||
|
|
||||||
|
At this stage of the process, Microsoft is no longer involved; the consent exchange happens directly between the OEM and the customer. And, it all happens instantaneously - as quickly as buttons are clicked.
|
||||||
|
|
19
windows/deployment/windows-autopilot/rip-and-replace.md
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
title: Rip and Replace
|
||||||
|
description: Listing of Autopilot scenarios
|
||||||
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: deploy
|
||||||
|
ms.localizationpriority: high
|
||||||
|
ms.sitesec: library
|
||||||
|
ms.pagetype: deploy
|
||||||
|
author: coreyp-at-msft
|
||||||
|
ms.author: coreyp
|
||||||
|
ms.date: 06/01/2018
|
||||||
|
---
|
||||||
|
|
||||||
|
# Rip and replace
|
||||||
|
|
||||||
|
**Applies to: Windows 10**
|
||||||
|
|
||||||
|
DO NOT PUBLISH. Just a placeholder for now, coming with 1809.
|
@ -10,7 +10,6 @@ ms.pagetype:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot Self-Deploying mode (Preview)
|
# Windows Autopilot Self-Deploying mode (Preview)
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshooting Windows Autopilot
|
# Troubleshooting Windows Autopilot
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 11/07/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot user-driven mode for Azure Active Directory join
|
# Windows Autopilot user-driven mode for Azure Active Directory join
|
||||||
@ -32,4 +31,4 @@ For each device that will be deployed using user-driven deployment, these additi
|
|||||||
- If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
|
- If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
|
||||||
- If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
|
- If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
|
||||||
|
|
||||||
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 11/12/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@ -37,4 +36,4 @@ To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
|
|||||||
|
|
||||||
See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid).
|
See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid).
|
||||||
|
|
||||||
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
||||||
|
@ -10,7 +10,6 @@ ms.pagetype: deploy
|
|||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.date: 11/07/2018
|
ms.date: 11/07/2018
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 11/07/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot user-driven mode
|
# Windows Autopilot user-driven mode
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot configuration requirements
|
# Windows Autopilot configuration requirements
|
||||||
|
@ -9,10 +9,8 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
ms.author: greg-lindsay
|
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot licensing requirements
|
# Windows Autopilot licensing requirements
|
||||||
|
|
||||||
**Applies to: Windows 10**
|
**Applies to: Windows 10**
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot networking requirements
|
# Windows Autopilot networking requirements
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 12/13/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot requirements
|
# Windows Autopilot requirements
|
||||||
@ -28,4 +27,4 @@ There are no additional hardware requirements to use Windows 10 Autopilot, beyon
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Configure Autopilot deployment](configure-autopilot.md)
|
[Configure Autopilot deployment](configure-autopilot.md)
|
||||||
|
@ -10,7 +10,6 @@ ms.pagetype:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reset devices with local Windows Autopilot Reset
|
# Reset devices with local Windows Autopilot Reset
|
||||||
|
@ -10,7 +10,6 @@ ms.pagetype:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Reset devices with remote Windows Autopilot Reset (Preview)
|
# Reset devices with remote Windows Autopilot Reset (Preview)
|
||||||
|
@ -10,7 +10,6 @@ ms.pagetype:
|
|||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot Reset
|
# Windows Autopilot Reset
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 12/13/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot scenarios
|
# Windows Autopilot scenarios
|
||||||
|
@ -9,7 +9,6 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 01/03/2018
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# Overview of Windows Autopilot
|
# Overview of Windows Autopilot
|
||||||
@ -71,4 +70,4 @@ See [Windows Autopilot scenarios](https://docs.microsoft.com/en-us/windows/deplo
|
|||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
|
||||||
[Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/en-us/intune/enrollment-autopilot)
|
[Enroll Windows devices in Intune by using Windows Autopilot](https://docs.microsoft.com/en-us/intune/enrollment-autopilot)
|
||||||
|
@ -590,7 +590,7 @@ To turn off the Windows Mail app:
|
|||||||
|
|
||||||
### <a href="" id="bkmk-microsoft-account"></a>11. Microsoft Account
|
### <a href="" id="bkmk-microsoft-account"></a>11. Microsoft Account
|
||||||
|
|
||||||
To prevent communication to the Microsoft Account cloud authentication service. Many apps and system components that depend on Microsoft Account authentication may lose functionality. Some of them could be in unexpected ways.
|
To prevent communication to the Microsoft Account cloud authentication service. Many apps and system components that depend on Microsoft Account authentication may lose functionality. Some of them could be in unexpected ways. For example, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are).
|
||||||
|
|
||||||
- Apply the Group Policy: **Computer Configuration** > **Windows Settings** > **Security Settings** > **Local Policies** > **Security Options** > **Accounts: Block Microsoft Accounts** and set it to **Users can't add Microsoft accounts**.
|
- Apply the Group Policy: **Computer Configuration** > **Windows Settings** > **Security Settings** > **Local Policies** > **Security Options** > **Accounts: Block Microsoft Accounts** and set it to **Users can't add Microsoft accounts**.
|
||||||
|
|
||||||
@ -1915,8 +1915,8 @@ If you're not running Windows 10, version 1607 or later, you can use the other o
|
|||||||
|
|
||||||
- **Personalization** > **Lock screen** > **Background** > **Windows spotlight**, select a different background, and turn off **Get fun facts, tips, tricks and more on your lock screen**.
|
- **Personalization** > **Lock screen** > **Background** > **Windows spotlight**, select a different background, and turn off **Get fun facts, tips, tricks and more on your lock screen**.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> In Windows 10, version 1507 and Windows 10, version 1511, this setting was named **Show me tips, tricks, and more on the lock screen**.
|
> In Windows 10, version 1507 and Windows 10, version 1511, this setting was named **Show me tips, tricks, and more on the lock screen**.
|
||||||
|
|
||||||
- **Personalization** > **Start** > **Occasionally show suggestions in Start**.
|
- **Personalization** > **Start** > **Occasionally show suggestions in Start**.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Connection endpoints for Windows 10, version 1803
|
title: Connection endpoints for Windows 10, version 1809
|
||||||
description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact.
|
description: Explains what Windows 10 endpoints are used for, how to turn off traffic to them, and the impact.
|
||||||
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
keywords: privacy, manage connections to Microsoft, Windows 10, Windows Server 2016
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -511,13 +511,15 @@ If you disable this endpoint, Windows Defender won't be able to update its malwa
|
|||||||
|
|
||||||
## Other Windows 10 editions
|
## Other Windows 10 editions
|
||||||
|
|
||||||
To view endpoints for other versions of Windows 10 enterprise, see:
|
To view endpoints for other versions of Windows 10 Enterprise, see:
|
||||||
- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md)
|
|
||||||
- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md)
|
- [Manage connection endpoints for Windows 10, version 1803](manage-windows-1803-endpoints.md)
|
||||||
|
- [Manage connection endpoints for Windows 10, version 1709](manage-windows-1709-endpoints.md)
|
||||||
|
|
||||||
To view endpoints for non-Enterprise Windows 10 editions, see:
|
To view endpoints for non-Enterprise Windows 10 editions, see:
|
||||||
- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md)
|
- [Windows 10, version 1809, connection endpoints for non-Enterprise editions](windows-endpoints-1809-non-enterprise-editions.md)
|
||||||
- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md)
|
- [Windows 10, version 1803, connection endpoints for non-Enterprise editions](windows-endpoints-1803-non-enterprise-editions.md)
|
||||||
|
- [Windows 10, version 1709, connection endpoints for non-Enterprise editions](windows-endpoints-1709-non-enterprise-editions.md)
|
||||||
|
|
||||||
|
|
||||||
## Related links
|
## Related links
|
||||||
|
|
||||||
|
@ -77,11 +77,11 @@ Device Registration is a prerequisite to Windows Hello for Business provisioning
|
|||||||
| Phase | Description |
|
| Phase | Description |
|
||||||
| :----: | :----------- |
|
| :----: | :----------- |
|
||||||
| A | The user signs in to a domain joined Windows 10 computers using domain credentials. This can be user name and password or smart card authentication. The user sign-in triggers the Automatic Device Join task.|
|
| A | The user signs in to a domain joined Windows 10 computers using domain credentials. This can be user name and password or smart card authentication. The user sign-in triggers the Automatic Device Join task.|
|
||||||
|B | The task queries Active Directory using the LDAP protocol for the keywords attribute on service connection point stored in the configuration partition in Active Directory (CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=corp,DC=contoso,DC=com). The value returned in the keywords attribute determines directs device registration to Azure Device Registration Service (ADRS).|
|
|B | The task queries Active Directory using the LDAP protocol for the keywords attribute on service connection point stored in the configuration partition in Active Directory (CN=62a0ff2e-97b9-4513-943f-0d221bd30080,CN=Device Registration Configuration,CN=Services,CN=Configuration,DC=corp,DC=contoso,DC=com). The value returned in the keywords attribute determines if device registration is directed to Azure Device Registration Service (ADRS) or the enterprise device registration service hosted on-premises.|
|
||||||
|C | For the federated environments, the computer authenticates ADFS/STS using Windows integrated authentication. The enterprise device registration service creates and returns a token that includes claims for the object GUID, computer SID, and domain joined state. The task submits the token and claims to Azure Active Directory where it is validated. Azure Active Directory returns an ID token to the running task.
|
|C | For the federated environments, the computer authenticates the enterprise device registration endpoint using Windows integrated authentication. The enterprise device registration service creates and returns a token that includes claims for the object GUID, computer SID, and domain joined state. The task submits the token and claims to Azure Active Directory where it is validated. Azure Active Directory returns an ID token to the running task.
|
||||||
|D | The application creates TPM bound (preferred) RSA 2048 bit key-pair known as the device key (dkpub/dkpriv). The application create a certificate request using dkpub and the public key and signs the certificate request with using dkpriv. Next, the application derives second key pair from the TPM's storage root key. This is the transport key (tkpub/tkpriv).|
|
|D | The application creates TPM bound (preferred) RSA 2048 bit key-pair known as the device key (dkpub/dkpriv). The application create a certificate request using dkpub and the public key and signs the certificate request with using dkpriv. Next, the application derives second key pair from the TPM's storage root key. This is the transport key (tkpub/tkpriv).|
|
||||||
|E | To provide SSO for on-premises federated application, the task requests an enterprise PRT from the on-premises STS. Windows Server 2016 running the Active Directory Federation Services role validate the request and return it the running task.|
|
|E | To provide SSO for on-premises federated application, the task requests an enterprise PRT from the on-premises STS. Windows Server 2016 running the Active Directory Federation Services role validate the request and return it the running task.|
|
||||||
|F | The task sends a device registration request to Azure DRS that includes the ID token, certificate request, tkpub, and attestation data. Azure DRS validates the ID token, creates a device ID, and creates a certificate based on the included certificate request. Azure DRS then writes a device object in Azure Active Directory and sends the device ID and the device certificate to the client. Device registration completes by receiving the device ID and the device certificate from Azure DRS. The device ID is saved for future reference (viewable from dsregcmd.exe /status), and the device certificate is installed in the Personal store of the computer. With device registration complete, the task exits.|
|
|F | The task sends a device registration request to Azure DRS that includes the ID token, certificate request, tkpub, and attestation data. Azure DRS validates the ID token, creates a device ID, and creates a certificate based on the included certificate request. Azure DRS then writes a device object in Azure Active Directory and sends the device ID and the device certificate to the client. Device registration completes by receiving the device ID and the device certificate from Azure DRS. The device ID is saved for future reference (viewable from dsregcmd.exe /status), and the device certificate is installed in the Personal store of the computer. With device registration complete, the task exits.|
|
||||||
|G |If device write-back is enabled, on it's next synchronization cycle, Azure AD Connect requests updates from Azure Active Directory. Azure Active Directory correlates the device object with a matching synchronized computer object. Azure AD Connect receives the device object that includes the object GUID and computer SID and writes the device object to Active Directory.|
|
|G | If Azure AD Connect device write-back is enabled, Azure AD Connect requests updates from Azure Active Directory at its next synchronization cycle (device write-back is required for hybrid deployment using certificate trust). Azure Active Directory correlates the device object with a matching synchronized computer object. Azure AD Connect receives the device object that includes the object GUID and computer SID and writes the device object to Active Directory.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-and-Device-Registration)
|
[Return to top](#Windows-Hello-for-Business-and-Device-Registration)
|
||||||
|
@ -22,11 +22,12 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|
|
||||||
[Azure AD joined provisioning in a Managed environment](#Azure-AD-joined-provisioning-in-a-Managed-environment)<br>
|
[Azure AD joined provisioning in a Managed environment](#Azure-AD-joined-provisioning-in-a-Managed-environment)<br>
|
||||||
[Azure AD joined provisioning in a Federated environment](#Azure-AD-joined-provisioning-in-a-Federated-environment)<br>
|
[Azure AD joined provisioning in a Federated environment](#Azure-AD-joined-provisioning-in-a-Federated-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Key Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-Key-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a Key Trust deployment in a Managed envrionment](#Hybrid-Azure-AD-joined-provisioning-in-a-Key-Trust-deployment-in-a-Managed-envrionment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-Certificate-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a Certificate Trust deployment in a Managed environment](#Hybrid-Azure-AD-joined-provisioning-in-a-Certificate-Trust-deployment-in-a-Managed-environment)<br>
|
||||||
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment-in-a-Managed-environment)<br>
|
||||||
[Domain joined provisioning in an On-premises Key Trust deployment](#Domain-joined-provisioning-in-an-Onpremises-Key-Trust-deployment)<br>
|
[Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Federated environment](#Hybrid-Azure-AD-joined-provisioning-in-a-synchronous-Certificate-Trust-deployment-in-a-Federated-environment)<br>
|
||||||
[Domain joined provisioning in an On-premises Certificate Trust deployment](#Domain-joined-provisioning-in-an-Onpremises-Certificate-Trust-deployment)<br>
|
[Domain joined provisioning in an On-premises Key Trust deployment](#Domain-joined-provisioning-in-an-On-premises-Key-Trust-deployment)<br>
|
||||||
|
[Domain joined provisioning in an On-premises Certificate Trust deployment](#Domain-joined-provisioning-in-an-On-premises-Certificate-Trust-deployment)<br>
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@ -85,7 +86,7 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
||||||
## Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environmnet
|
## Hybrid Azure AD joined provisioning in a synchronous Certificate Trust deployment in a Managed environment
|
||||||

|

|
||||||
|
|
||||||
| Phase | Description |
|
| Phase | Description |
|
||||||
@ -140,6 +141,6 @@ Windows Hello for Business provisioning enables a user to enroll a new, strong,
|
|||||||
|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.<br> The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.<br> After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys.|
|
|D | The certificate request portion of provisioning begins after the application receives a successful response from key registration. The application creates a PKCS#10 certificate request. The key used in the certificate request is the same key that was securely provisioned.<br> The application sends the certificate request, which includes the public key, to the certificate registration authority hosted on the Active Directory Federation Services (AD FS) farm.<br> After receiving the certificate request, the certificate registration authority queries Active Directory for the msDS-KeyCredentailsLink for a list of registered public keys.|
|
||||||
|E | The registration authority validates the public key in the certificate request matches a registered key for the user.<br> After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.|
|
|E | The registration authority validates the public key in the certificate request matches a registered key for the user.<br> After validating the public key, the registration authority signs the certificate request using its enrollment agent certificate.|
|
||||||
|F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.|
|
|F |The registration authority sends the certificate request to the enterprise issuing certificate authority. The certificate authority validates the certificate request is signed by a valid enrollment agent and, on success, issues a certificate and returns it to the registration authority that then returns the certificate to the application.|
|
||||||
|G | The application receives the newly issued certificate and installs the it into the Personal store of the user. This signals the end of provisioning.|
|
|G | The application receives the newly issued certificate and installs it into the Personal store of the user. This signals the end of provisioning.|
|
||||||
|
|
||||||
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
[Return to top](#Windows-Hello-for-Business-Provisioning)
|
||||||
|
@ -66,7 +66,7 @@ Sign-in using _Enterprise Admin_ equivalent credentials on Windows Server 2012 o
|
|||||||
|
|
||||||
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
|
3. Use the following command to configure the Certificate Authority using a basic certificate authority configuration.
|
||||||
```PowerShell
|
```PowerShell
|
||||||
Install-AdcsCertificateAuthority
|
Install-AdcsCertificationAuthority
|
||||||
```
|
```
|
||||||
|
|
||||||
## Configure a Production Public Key Infrastructure
|
## Configure a Production Public Key Infrastructure
|
||||||
|
@ -23,7 +23,7 @@ Hybrid environments are distributed systems that enable organizations to use on-
|
|||||||
|
|
||||||
The distributed systems on which these technologies were built involved several pieces of on-premises and cloud infrastructure. High-level pieces of the infrastructure include:
|
The distributed systems on which these technologies were built involved several pieces of on-premises and cloud infrastructure. High-level pieces of the infrastructure include:
|
||||||
* [Directories](#directories)
|
* [Directories](#directories)
|
||||||
* [Public Key Infrastructure](#public-key-infrastructure)
|
* [Public Key Infrastucture](#public-key-infastructure)
|
||||||
* [Directory Synchronization](#directory-synchronization)
|
* [Directory Synchronization](#directory-synchronization)
|
||||||
* [Federation](#federation)
|
* [Federation](#federation)
|
||||||
* [MultiFactor Authentication](#multifactor-authentication)
|
* [MultiFactor Authentication](#multifactor-authentication)
|
||||||
@ -114,9 +114,9 @@ Organizations wanting to deploy hybrid key trust need their domain joined device
|
|||||||
<br>
|
<br>
|
||||||
|
|
||||||
### Next Steps ###
|
### Next Steps ###
|
||||||
Follow the Windows Hello for Business hybrid key trust deployment guide. For proof-of-concepts, labs, and new installations, choose the **New Installation Baseline**.
|
Follow the Windows Hello for Business hybrid key trust deployment guide. For proof-of-concepts, labs, and new installations, choose the **New Installation Basline**.
|
||||||
|
|
||||||
For environments transitioning from on-premises to hybrid, start with **Configure Azure Directory Synchronization**.
|
For environments transitioning from on-premises to hybrid, start with **Configure Azure Directory Syncrhonization**.
|
||||||
|
|
||||||
For federated and non-federated environments, start with **Configure Windows Hello for Business settings**.
|
For federated and non-federated environments, start with **Configure Windows Hello for Business settings**.
|
||||||
|
|
||||||
|
@ -46,7 +46,7 @@ Sign-in a certificate authority or management workstations with _Domain Admin_ e
|
|||||||
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2008 R2** from the **Certification Authority** list. Select **Windows 7.Server 2008 R2** from the **Certification Recipient** list.
|
4. On the **Compatibility** tab, clear the **Show resulting changes** check box. Select **Windows Server 2008 R2** from the **Certification Authority** list. Select **Windows 7.Server 2008 R2** from the **Certification Recipient** list.
|
||||||
5. On the **General** tab, type **Domain Controller Authentication (Kerberos)** in Template display name. Adjust the validity and renewal period to meet your enterprise's needs.
|
5. On the **General** tab, type **Domain Controller Authentication (Kerberos)** in Template display name. Adjust the validity and renewal period to meet your enterprise's needs.
|
||||||
**Note**If you use different template names, you'll need to remember and substitute these names in different portions of the lab.
|
**Note**If you use different template names, you'll need to remember and substitute these names in different portions of the lab.
|
||||||
6. On the **Subject** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **None** from the **Subject name format** list. Select **DNS name** from the **Include this information in alternate subject** list. Clear all other items.
|
6. On the **Subject Name** tab, select the **Build from this Active Directory information** button if it is not already selected. Select **None** from the **Subject name format** list. Select **DNS name** from the **Include this information in alternate subject** list. Clear all other items.
|
||||||
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list. Click **OK**.
|
7. On the **Cryptography** tab, select **Key Storage Provider** from the **Provider Category** list. Select **RSA** from the **Algorithm name** list. Type **2048** in the **Minimum key size** text box. Select **SHA256** from the **Request hash** list. Click **OK**.
|
||||||
8. Close the console.
|
8. Close the console.
|
||||||
|
|
||||||
|
@ -39,7 +39,7 @@ Windows Hello addresses the following problems with passwords:
|
|||||||
* Azure AD Premium subscription - *optional*, needed for automatic MDM enrollment when the device joins Azure Active Directory
|
* Azure AD Premium subscription - *optional*, needed for automatic MDM enrollment when the device joins Azure Active Directory
|
||||||
|
|
||||||
### Hybrid Deployments
|
### Hybrid Deployments
|
||||||
The table shows the minimum requirements for each deployment.
|
The table shows the minimum requirements for each deployment. For key trust in a multi-domain/multi-forest deployment, the following requirements are applicable for each domain/forest that hosts Windows Hello for business components or is involved in the Kerberos referral process.
|
||||||
|
|
||||||
| Key trust</br>Group Policy managed | Certificate trust</br>Mixed managed | Key trust</br>Modern managed | Certificate trust</br>Modern managed |
|
| Key trust</br>Group Policy managed | Certificate trust</br>Mixed managed | Key trust</br>Modern managed | Certificate trust</br>Modern managed |
|
||||||
| --- | --- | --- | --- |
|
| --- | --- | --- | --- |
|
||||||
|
@ -10,7 +10,7 @@ ms.author: pashort
|
|||||||
manager: elizapo
|
manager: elizapo
|
||||||
ms.reviewer:
|
ms.reviewer:
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 04/20/2018
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# VPN and conditional access
|
# VPN and conditional access
|
||||||
@ -30,9 +30,9 @@ Conditional Access Platform components used for Device Compliance include the fo
|
|||||||
|
|
||||||
- [Windows Health Attestation Service](https://technet.microsoft.com/itpro/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices#device-health-attestation) (optional)
|
- [Windows Health Attestation Service](https://technet.microsoft.com/itpro/windows/keep-secure/protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices#device-health-attestation) (optional)
|
||||||
|
|
||||||
- Azure AD Certificate Authority - It is a requirement that the client certificate used for the cloud-based device compliance solution be issued by an Azure Active Directory-based Certificate Authority (CA). An Azure AD CA is essentially a mini-CA cloud tenant in Azure. The Azure AD CA cannot be configured as part of an on-premises Enterprise CA.
|
- Azure AD Certificate Authority - It is a requirement that the client certificate used for the cloud-based device compliance solution be issued by an Azure Active Directory-based Certificate Authority (CA). An Azure AD CA is essentially a mini-CA cloud tenant in Azure. The Azure AD CA cannot be configured as part of an on-premises Enterprise CA.
|
||||||
|
|
||||||
- Azure AD-issued short-lived certificates - When a VPN connection attempt is made, the Azure AD Token Broker on the local device communicates with Azure Active Directory, which then checks for health based on compliance rules. If compliant, Azure AD sends back a short-lived certificate that is used to authenticate the VPN. Note that certificate authentication methods such as EAP-TLS can be used.
|
- Azure AD-issued short-lived certificates - When a VPN connection attempt is made, the Azure AD Token Broker on the local device communicates with Azure Active Directory, which then checks for health based on compliance rules. If compliant, Azure AD sends back a short-lived certificate that is used to authenticate the VPN. Note that certificate authentication methods such as EAP-TLS can be used.
|
||||||
|
|
||||||
Additional details regarding the Azure AD issued short-lived certificate:
|
Additional details regarding the Azure AD issued short-lived certificate:
|
||||||
- The default lifetime is 60 minutes and is configurable
|
- The default lifetime is 60 minutes and is configurable
|
||||||
@ -52,15 +52,13 @@ The following client-side components are also required:
|
|||||||
- Trusted Platform Module (TPM)
|
- Trusted Platform Module (TPM)
|
||||||
|
|
||||||
## VPN device compliance
|
## VPN device compliance
|
||||||
According to the VPNv2 CSP, these settings options are **Optional**. If you want your users to access on-premises resources, such as files on a network share, based on the credential of a certificate that was issued by an on-premises CA, and not the Cloud CA certificate, you add these settings to the VPNv2 profile. Alternatively, if you add the cloud root certificates to the NTAuth store in on-prem AD, your user's cloud certificate will chain and KDC will issue TGT and TGS tickets to them.
|
At this time, the Azure AD certificates issued to users do not contain a CRL Distribution Point (CDP) and are not suitable for Key Distribution Centers (KDCs) to issue Kerberos tokens. For users to gain access to on-premises resources such as files on a network share, client authentication certificates must be deployed to the Windows profiles of the users, and their VPNv2 profiles must contain the <SSO> section.
|
||||||
|
|
||||||
Server-side infrastructure requirements to support VPN device compliance include:
|
Server-side infrastructure requirements to support VPN device compliance include:
|
||||||
|
|
||||||
- The VPN server should be configured for certificate authentication.
|
- The VPN server should be configured for certificate authentication
|
||||||
- The VPN server should trust the tenant-specific Azure AD CA
|
- The VPN server should trust the tenant-specific Azure AD CA
|
||||||
- Either of the below should be true for Kerberos/NTLM SSO:
|
- For client access using Kerberos/NTLM, a domain-trusted certificate is deployed to the client device and is configured to be used for single sign-on (SSO)
|
||||||
- Domain servers trust Azure AD CA
|
|
||||||
- A domain-trusted certificate is deployed to the client device and is configured to be used for single sign-on (SSO)
|
|
||||||
|
|
||||||
After the server side is set up, VPN admins can add the policy settings for conditional access to the VPN profile using the VPNv2 DeviceCompliance node.
|
After the server side is set up, VPN admins can add the policy settings for conditional access to the VPN profile using the VPNv2 DeviceCompliance node.
|
||||||
|
|
||||||
@ -68,7 +66,7 @@ Two client-side configuration service providers are leveraged for VPN device com
|
|||||||
|
|
||||||
- VPNv2 CSP DeviceCompliance settings
|
- VPNv2 CSP DeviceCompliance settings
|
||||||
- **Enabled**: enables the Device Compliance flow from the client. If marked as **true**, the VPN client attempts to communicate with Azure AD to get a certificate to use for authentication. The VPN should be set up to use certificate authentication and the VPN server must trust the server returned by Azure AD.
|
- **Enabled**: enables the Device Compliance flow from the client. If marked as **true**, the VPN client attempts to communicate with Azure AD to get a certificate to use for authentication. The VPN should be set up to use certificate authentication and the VPN server must trust the server returned by Azure AD.
|
||||||
- **Sso**: nodes under SSO can be used to choose a certificate different from the VPN authentication certificate for Kerberos authentication in the case of device compliance.
|
- **Sso**: entries under SSO should be used to direct the VPN client to use a certificate other than the VPN authentication certificate when accessing resources that require Kerberos authentication.
|
||||||
- **Sso/Enabled**: if this field is set to **true**, the VPN client looks for a separate certificate for Kerberos authentication.
|
- **Sso/Enabled**: if this field is set to **true**, the VPN client looks for a separate certificate for Kerberos authentication.
|
||||||
- **Sso/IssuerHash**: hashes for the VPN client to look for the correct certificate for Kerberos authentication.
|
- **Sso/IssuerHash**: hashes for the VPN client to look for the correct certificate for Kerberos authentication.
|
||||||
- **Sso/Eku**: comma-separated list of Enhanced Key Usage (EKU) extensions for the VPN client to look for the correct certificate for Kerberos authentication.
|
- **Sso/Eku**: comma-separated list of Enhanced Key Usage (EKU) extensions for the VPN client to look for the correct certificate for Kerberos authentication.
|
||||||
@ -79,8 +77,7 @@ Two client-side configuration service providers are leveraged for VPN device com
|
|||||||
- Upon request, forwards the Health Attestation Certificate (received from HAS) and related runtime information to the MDM server for verification
|
- Upon request, forwards the Health Attestation Certificate (received from HAS) and related runtime information to the MDM server for verification
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Enabling SSO is not necessarily required unless you want VPN users to be issued Kerberos tickets to access on-premises resources using a certificate issued by the on-premises CA; not the cloud certificate issued by AAD.
|
>Currently, it is required that certificates be issued from an on-premises CA, and that SSO be enabled in the user’s VPN profile. This will enable the user to obtain Kerberos tickets in order to access resources on-premises. Kerberos currently does not support the use of Azure AD certificates.
|
||||||
|
|
||||||
|
|
||||||
## Client connection flow
|
## Client connection flow
|
||||||
The VPN client side connection flow works as follows:
|
The VPN client side connection flow works as follows:
|
||||||
@ -89,7 +86,7 @@ The VPN client side connection flow works as follows:
|
|||||||
|
|
||||||
When a VPNv2 Profile is configured with \<DeviceCompliance> \<Enabled>true<\/Enabled> the VPN client uses this connection flow:
|
When a VPNv2 Profile is configured with \<DeviceCompliance> \<Enabled>true<\/Enabled> the VPN client uses this connection flow:
|
||||||
|
|
||||||
1. The VPN client calls into Windows 10’s AAD Token Broker, identifying itself as a VPN client.
|
1. The VPN client calls into Windows 10’s Azure AD Token Broker, identifying itself as a VPN client.
|
||||||
2. The Azure AD Token Broker authenticates to Azure AD and provides it with information about the device trying to connect. The Azure AD Server checks if the device is in compliance with the policies.
|
2. The Azure AD Token Broker authenticates to Azure AD and provides it with information about the device trying to connect. The Azure AD Server checks if the device is in compliance with the policies.
|
||||||
3. If compliant, Azure AD requests a short-lived certificate
|
3. If compliant, Azure AD requests a short-lived certificate
|
||||||
4. Azure AD pushes down a short-lived certificate to the Certificate Store via the Token Broker. The Token Broker then returns control back over to the VPN client for further connection processing.
|
4. Azure AD pushes down a short-lived certificate to the Certificate Store via the Token Broker. The Token Broker then returns control back over to the VPN client for further connection processing.
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 09/17/2018
|
ms.date: 01/26/2019
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker Management for Enterprises
|
# BitLocker Management for Enterprises
|
||||||
@ -25,11 +25,11 @@ Enterprises can use [Microsoft BitLocker Administration and Monitoring (MBAM)](h
|
|||||||
|
|
||||||
## Managing devices joined to Azure Active Directory
|
## Managing devices joined to Azure Active Directory
|
||||||
|
|
||||||
Devices joined to Azure AD are managed using Mobile Device Management (MDM) policy from an MDM solution such as [Microsoft Intune](https://www.microsoft.com/cloud-platform/microsoft-intune). BitLocker Device Encryption status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
Devices joined to Azure AD are managed using Mobile Device Management (MDM) policy from an MDM solution such as Microsoft Intune. [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) status can be queried from managed machines via the [Policy Configuration Settings Provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider), which reports on whether BitLocker Device Encryption is enabled on the device. Compliance with BitLocker Device Encryption policy can be a requirement for [Conditional Access](https://www.microsoft.com/cloud-platform/conditional-access) to services like Exchange Online and SharePoint Online.
|
||||||
|
|
||||||
Starting with Windows 10 version 1703 (also known as the Windows Creators Update), the enablement of BitLocker can be triggered over MDM either by the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) or the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The BitLocker CSP adds policy options that go beyond ensuring that encryption has occurred, and is available on computers that run Windows 10 Business or Enterprise editions and on Windows Phones.
|
Starting with Windows 10 version 1703 (also known as the Windows Creators Update), the enablement of BitLocker can be triggered over MDM either by the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-configuration-service-provider) or the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp). The BitLocker CSP adds policy options that go beyond ensuring that encryption has occurred, and is available on computers that run Windows 10 Business or Enterprise editions and on Windows Phones.
|
||||||
|
|
||||||
For hardware that is compliant with Modern Standby and HSTI, when using either of these features, BitLocker Device Encryption is automatically turned on whenever the user joins a device to Azure AD. Azure AD provides a portal where recovery keys are also backed up, so users can retrieve their own recovery key for self-service, if required. For older devices that are not yet encrypted, beginning with Windows 10 version 1703 (the Windows 10 Creators Update), admins can use the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) to trigger encryption and store the recovery key in Azure AD.
|
For hardware that is compliant with Modern Standby and HSTI, when using either of these features, [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md#bitlocker-device-encryption) is automatically turned on whenever the user joins a device to Azure AD. Azure AD provides a portal where recovery keys are also backed up, so users can retrieve their own recovery key for self-service, if required. For older devices that are not yet encrypted, beginning with Windows 10 version 1703 (the Windows 10 Creators Update), admins can use the [BitLocker CSP](https://docs.microsoft.com/windows/client-management/mdm/bitlocker-csp) to trigger encryption and store the recovery key in Azure AD.
|
||||||
|
|
||||||
|
|
||||||
## Managing workplace-joined PCs and phones
|
## Managing workplace-joined PCs and phones
|
||||||
|
@ -8,7 +8,7 @@ ms.sitesec: library
|
|||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
ms.date: 10/16/2017
|
ms.date: 01/26/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker
|
# BitLocker
|
||||||
@ -42,7 +42,7 @@ BitLocker control panel, and they are appropriate to use for automated deploymen
|
|||||||
|
|
||||||
## <a href="" id="bkmk-new"></a>New and changed functionality
|
## <a href="" id="bkmk-new"></a>New and changed functionality
|
||||||
|
|
||||||
To find out what's new in BitLocker for Windows 10, such as support for the XTS-AES encryption algorithm, see the [BitLocker](https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511#bitlocker) section in "What's new in Windows 10, versions 1507 and 1511."
|
To find out what's new in BitLocker for Windows 10, such as support for the XTS-AES encryption algorithm, see the [BitLocker](https://technet.microsoft.com/itpro/windows/whats-new/whats-new-windows-10-version-1507-and-1511#bitlocker) section in "What's new in Windows 10."
|
||||||
|
|
||||||
## System requirements
|
## System requirements
|
||||||
|
|
||||||
@ -71,7 +71,7 @@ When installing the BitLocker optional component on a server you will also need
|
|||||||
| [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md) | This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.|
|
| [BitLocker frequently asked questions (FAQ)](bitlocker-frequently-asked-questions.md) | This topic for the IT professional answers frequently asked questions concerning the requirements to use, upgrade, deploy and administer, and key management policies for BitLocker.|
|
||||||
| [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)| This topic for the IT professional explains how can you plan your BitLocker deployment. |
|
| [Prepare your organization for BitLocker: Planning and policies](prepare-your-organization-for-bitlocker-planning-and-policies.md)| This topic for the IT professional explains how can you plan your BitLocker deployment. |
|
||||||
| [BitLocker basic deployment](bitlocker-basic-deployment.md) | This topic for the IT professional explains how BitLocker features can be used to protect your data through drive encryption. |
|
| [BitLocker basic deployment](bitlocker-basic-deployment.md) | This topic for the IT professional explains how BitLocker features can be used to protect your data through drive encryption. |
|
||||||
| [BitLocker: How to deploy on Windows Server 2012 and later](bitlocker-how-to-deploy-on-windows-server.md)| This topic for the IT professional explains how to deploy BitLocker and Windows Server 2012 and later.|
|
| [BitLocker: How to deploy on Windows Server](bitlocker-how-to-deploy-on-windows-server.md)| This topic for the IT professional explains how to deploy BitLocker on Windows Server.|
|
||||||
| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. |
|
| [BitLocker: How to enable Network Unlock](bitlocker-how-to-enable-network-unlock.md) | This topic for the IT professional describes how BitLocker Network Unlock works and how to configure it. |
|
||||||
| [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md)| This topic for the IT professional describes how to use tools to manage BitLocker.|
|
| [BitLocker: Use BitLocker Drive Encryption Tools to manage BitLocker](bitlocker-use-bitlocker-drive-encryption-tools-to-manage-bitlocker.md)| This topic for the IT professional describes how to use tools to manage BitLocker.|
|
||||||
| [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md) | This topic for the IT professional describes how to use the BitLocker Recovery Password Viewer. |
|
| [BitLocker: Use BitLocker Recovery Password Viewer](bitlocker-use-bitlocker-recovery-password-viewer.md) | This topic for the IT professional describes how to use the BitLocker Recovery Password Viewer. |
|
||||||
|
@ -7,8 +7,6 @@ ms.mktglfcycl: deploy
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
author: brianlic-msft
|
author: brianlic-msft
|
||||||
|
|
||||||
ms.date: 08/17/2017
|
|
||||||
---
|
---
|
||||||
|
|
||||||
# BitLocker recovery guide
|
# BitLocker recovery guide
|
||||||
@ -26,7 +24,7 @@ This article does not detail how to configure AD DS to store the BitLocker reco
|
|||||||
|
|
||||||
## <a href="" id="bkmk-whatisrecovery"></a>What is BitLocker recovery?
|
## <a href="" id="bkmk-whatisrecovery"></a>What is BitLocker recovery?
|
||||||
|
|
||||||
BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario you have the following options to restore access to the drive:
|
BitLocker recovery is the process by which you can restore access to a BitLocker-protected drive in the event that you cannot unlock the drive normally. In a recovery scenario, you have the following options to restore access to the drive:
|
||||||
|
|
||||||
- The user can supply the recovery password. If your organization allows users to print or store recovery passwords, the user can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft Account online. (Saving a recovery password with your Microsoft Account online is only allowed when BitLocker is used on a PC that is not a member of a domain).
|
- The user can supply the recovery password. If your organization allows users to print or store recovery passwords, the user can type in the 48-digit recovery password that they printed or stored on a USB drive or with your Microsoft Account online. (Saving a recovery password with your Microsoft Account online is only allowed when BitLocker is used on a PC that is not a member of a domain).
|
||||||
- A data recovery agent can use their credentials to unlock the drive. If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it.
|
- A data recovery agent can use their credentials to unlock the drive. If the drive is an operating system drive, the drive must be mounted as a data drive on another computer for the data recovery agent to unlock it.
|
||||||
@ -36,7 +34,7 @@ BitLocker recovery is the process by which you can restore access to a BitLocker
|
|||||||
|
|
||||||
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
The following list provides examples of specific events that will cause BitLocker to enter recovery mode when attempting to start the operating system drive:
|
||||||
|
|
||||||
- On PCs that use BitLocker, or on devices such as tablets or phones that use Device Encryption only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](https://technet.microsoft.com/library/aa998357.aspx) (also configurable through [Windows Intune](https://technet.microsoft.com/library/jj733621.aspx)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
- On PCs that use BitLocker Drive Encryption, or on devices such as tablets or phones that use [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md) only, when an attack is detected, the device will immediately reboot and enter into BitLocker recovery mode. To take advantage of this functionality Administrators can set the **Interactive logon: Machine account lockout threshold** Group Policy setting located in **\\Computer Configuration\\Windows Settings\\Security Settings\\Local Policies\\Security Options** in the Local Group Policy Editor, or use the **MaxFailedPasswordAttempts** policy of [Exchange ActiveSync](https://technet.microsoft.com/library/aa998357.aspx) (also configurable through [Windows Intune](https://technet.microsoft.com/library/jj733621.aspx)), to limit the number of failed password attempts before the device goes into Device Lockout.
|
||||||
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
- On devices with TPM 1.2, changing the BIOS or firmware boot device order causes BitLocker recovery. However, devices with TPM 2.0 do not start BitLocker recovery in this case. TPM 2.0 does not consider a firmware change of boot device order as a security threat because the OS Boot Loader is not compromised.
|
||||||
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
- Having the CD or DVD drive before the hard drive in the BIOS boot order and then inserting or removing a CD or DVD.
|
||||||
- Failing to boot from a network drive before booting from the hard drive.
|
- Failing to boot from a network drive before booting from the hard drive.
|
||||||
@ -245,7 +243,7 @@ This error might occur if you updated the firmware. As a best practice you shoul
|
|||||||
|
|
||||||
## Windows RE and BitLocker Device Encryption
|
## Windows RE and BitLocker Device Encryption
|
||||||
|
|
||||||
Windows Recovery Environment (RE) can be used to recover access to a drive protected by BitLocker Device Encryption. If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
Windows Recovery Environment (RE) can be used to recover access to a drive protected by [BitLocker Device Encryption](bitlocker-device-encryption-overview-windows-10.md). If a PC is unable to boot after two failures, Startup Repair will automatically start. When Startup Repair is launched automatically due to boot failures, it will only execute operating system and driver file repairs, provided that the boot logs or any available crash dump point to a specific corrupted file. In Windows 8.1 and later, devices that include firmware to support specific TPM measurements for PCR\[7\] the TPM can validate that Windows RE is a trusted operating environment and will unlock any BitLocker-protected drives if Windows RE has not been modified. If the Windows RE environment has been modified, for example the TPM has been disabled, the drives will stay locked until the BitLocker recovery key is provided. If Startup Repair is not able to be run automatically from the PC and instead Windows RE is manually started from a repair disk, the BitLocker recovery key must be provided to unlock the BitLocker–protected drives.
|
||||||
|
|
||||||
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
## <a href="" id="bkmk-usingaddrecovery"></a>Using additional recovery information
|
||||||
|
|
||||||
|
@ -87,7 +87,7 @@ For end consumers, TPM is behind the scenes but is still very relevant. TPM is u
|
|||||||
|
|
||||||
### Windows 10 for desktop editions (Home, Pro, Enterprise, and Education)
|
### Windows 10 for desktop editions (Home, Pro, Enterprise, and Education)
|
||||||
|
|
||||||
- Since July 28, 2016, all new device models, lines or series (or if you are updating the hardware configuration of a existing model, line or series with a major update, such as CPU, graphic cards) must implement and enable by default TPM 2.0 (details in section 3.7 of the [Minimum hardware requirements](https://msdn.microsoft.com/library/windows/hardware/dn91508.aspx) page). The requirement to enable TPM 2.0 only applies to the manufacturing of new devices. For TPM recommendations for specific Windows features, see [TPM and Windows Features](#tpm-and-windows-features).
|
- Since July 28, 2016, all new device models, lines or series (or if you are updating the hardware configuration of a existing model, line or series with a major update, such as CPU, graphic cards) must implement and enable by default TPM 2.0 (details in section 3.7 of the [Minimum hardware requirements](https://docs.microsoft.com/windows-hardware/design/minimum/minimum-hardware-requirements-overview) page). The requirement to enable TPM 2.0 only applies to the manufacturing of new devices. For TPM recommendations for specific Windows features, see [TPM and Windows Features](#tpm-and-windows-features).
|
||||||
|
|
||||||
### IoT Core
|
### IoT Core
|
||||||
|
|
||||||
@ -104,7 +104,7 @@ The following table defines which Windows features require TPM support.
|
|||||||
| Windows Features | TPM Required | Supports TPM 1.2 | Supports TPM 2.0 | Details |
|
| Windows Features | TPM Required | Supports TPM 1.2 | Supports TPM 2.0 | Details |
|
||||||
|-------------------------|--------------|--------------------|--------------------|----------|
|
|-------------------------|--------------|--------------------|--------------------|----------|
|
||||||
| Measured Boot | Yes | Yes | Yes | Measured Boot requires TPM 1.2 or 2.0 and UEFI Secure Boot |
|
| Measured Boot | Yes | Yes | Yes | Measured Boot requires TPM 1.2 or 2.0 and UEFI Secure Boot |
|
||||||
| BitLocker | Yes | Yes | Yes | TPM 1.2 or 2.0 is required |
|
| BitLocker | Yes | Yes | Yes | TPM 1.2 or 2.0 is required, but [Automatic Device Encryption requires Modern Standby](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10#bitlocker-device-encryption) including TPM 2.0 support |
|
||||||
| Device Encryption | Yes | N/A | Yes | Device Encryption requires Modern Standby/Connected Standby certification, which requires TPM 2.0. |
|
| Device Encryption | Yes | N/A | Yes | Device Encryption requires Modern Standby/Connected Standby certification, which requires TPM 2.0. |
|
||||||
| Windows Defender Application Control (Device Guard) | No | Yes | Yes | |
|
| Windows Defender Application Control (Device Guard) | No | Yes | Yes | |
|
||||||
| Windows Defender Exploit Guard | No | N/A | N/A | |
|
| Windows Defender Exploit Guard | No | N/A | N/A | |
|
||||||
|
@ -145,7 +145,7 @@ Advertisements shown to you must:
|
|||||||
|
|
||||||
#### Consumer opinion
|
#### Consumer opinion
|
||||||
|
|
||||||
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps us identify new malware quickly. After analysis, Microsoft creates definitions for software that meets the described criteria. These definitions identify the software as malware and are available to all users through Windows Defender Antivirus and other Microsoft antimalware solutions.
|
Microsoft maintains a worldwide network of analysts and intelligence systems where you can [submit software for analysis](https://www.microsoft.com/wdsi/filesubmission). Your participation helps us identify new malware quickly. After analysis, Microsoft creates Security intelligence for software that meets the described criteria. This Security intelligence identifies the software as malware and are available to all users through Windows Defender Antivirus and other Microsoft antimalware solutions.
|
||||||
|
|
||||||
## Potentially unwanted application (PUA)
|
## Potentially unwanted application (PUA)
|
||||||
|
|
||||||
|
@ -20,6 +20,6 @@ Learn about the common questions we receive from software developers and get oth
|
|||||||
Topic | Description
|
Topic | Description
|
||||||
:---|:---
|
:---|:---
|
||||||
[Software developer FAQ](developer-faq.md) | Provides answers to common questions we receive from software developers.
|
[Software developer FAQ](developer-faq.md) | Provides answers to common questions we receive from software developers.
|
||||||
[Developer resources](developer-resources.md) | Provides information about how to submit files, detection criteria, and how to check your software against the latest definitions and cloud protection from Microsoft.
|
[Developer resources](developer-resources.md) | Provides information about how to submit files, detection criteria, and how to check your software against the latest Security intelligence and cloud protection from Microsoft.
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
title: Software developer resources
|
title: Software developer resources
|
||||||
description: This page provides information for developers such as detection criteria, developer questions, and how to check your software against definitions.
|
description: This page provides information for developers such as detection criteria, developer questions, and how to check your software against Security intelligence.
|
||||||
keywords: wdsi, software, developer, resources, detection, criteria, questions, scan, software, definitions, cloud, protection
|
keywords: wdsi, software, developer, resources, detection, criteria, questions, scan, software, definitions, cloud, protection, security intelligence
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
@ -34,4 +34,4 @@ Find more guidance about the file submission and detection dispute process in ou
|
|||||||
|
|
||||||
### Scan your software
|
### Scan your software
|
||||||
|
|
||||||
Use [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-docs-avreports) to check your software against the latest definitions and cloud protection from Microsoft.
|
Use [Windows Defender Antivirus](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10?ocid=cx-docs-avreports) to check your software against the latest Security intelligence and cloud protection from Microsoft.
|
||||||
|
Before Width: | Height: | Size: 19 KiB |