mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Corrected problems with notes
This commit is contained in:
parent
d8b1e9f52a
commit
c820645fe7
@ -1550,9 +1550,8 @@ You can control if your settings are synchronized:
|
|||||||
|
|
||||||
To turn off Messaging cloud sync:
|
To turn off Messaging cloud sync:
|
||||||
|
|
||||||
- Note: There is no Group Policy corresponding to this registry key.
|
> [!NOTE]
|
||||||
|
> There is no Group Policy corresponding to this registry key.
|
||||||
-or-
|
|
||||||
|
|
||||||
- Create a REG_DWORD registry setting named **CloudServiceSyncEnabled** in **HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Messaging** and set to a **value of 0 (zero)**.
|
- Create a REG_DWORD registry setting named **CloudServiceSyncEnabled** in **HKEY_CURRENT_USER\\SOFTWARE\\Microsoft\\Messaging** and set to a **value of 0 (zero)**.
|
||||||
|
|
||||||
@ -1642,7 +1641,8 @@ You can turn off **Malicious Software Reporting Tool (MSRT) diagnostic data**:
|
|||||||
|
|
||||||
- Set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to **1**.
|
- Set the REG_DWORD value **HKEY_LOCAL_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to **1**.
|
||||||
|
|
||||||
**Note:** There is no Group Policy to turn off the Malicious Software Reporting Tool diagnostic data.
|
> [!NOTE]
|
||||||
|
> There is no Group Policy to turn off the Malicious Software Reporting Tool diagnostic data.
|
||||||
|
|
||||||
|
|
||||||
You can turn off **Enhanced Notifications** as follows:
|
You can turn off **Enhanced Notifications** as follows:
|
||||||
@ -1737,11 +1737,11 @@ If you're running Windows 10, version 1607 or later, you need to:
|
|||||||
> This will only take effect if the policy is applied before the first logon.
|
> This will only take effect if the policy is applied before the first logon.
|
||||||
> If you cannot apply the **Force a specific default lock screen image** policy before the first logon to the device,
|
> If you cannot apply the **Force a specific default lock screen image** policy before the first logon to the device,
|
||||||
> you can **Enable** the **Do not display the lock screen** policy under **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization**
|
> you can **Enable** the **Do not display the lock screen** policy under **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization**
|
||||||
|
>
|
||||||
> Alternatively, you can create a new REG_SZ registry setting named **LockScreenImage** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization**
|
> Alternatively, you can create a new REG_SZ registry setting named **LockScreenImage** in **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization**
|
||||||
> with a value of **C:\\windows\\web\\screen\\lockscreen.jpg** and create a new REG_DWORD registry setting named **LockScreenOverlaysDisabled** in
|
> with a value of **C:\\windows\\web\\screen\\lockscreen.jpg** and create a new REG_DWORD registry setting named **LockScreenOverlaysDisabled** in
|
||||||
> **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of **1 (one)**.
|
> **HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Personalization** with a value of **1 (one)**.
|
||||||
|
>
|
||||||
> The Group Policy for the **LockScreenOverlaysDisabled** regkey is **Force a specific default lock screen and logon image** that is under **Control Panel** **Personalization**.
|
> The Group Policy for the **LockScreenOverlaysDisabled** regkey is **Force a specific default lock screen and logon image** that is under **Control Panel** **Personalization**.
|
||||||
|
|
||||||
|
|
||||||
@ -1900,7 +1900,7 @@ For China releases of Windows 10 there is one additional Regkey to be set to pre
|
|||||||
|
|
||||||
### <a href="" id="bkmk-allowedtraffic"></a> Allowed traffic list for Windows Restricted Traffic Limited Functionality Baseline
|
### <a href="" id="bkmk-allowedtraffic"></a> Allowed traffic list for Windows Restricted Traffic Limited Functionality Baseline
|
||||||
|
|
||||||
|**Allowed traffic endpoints** |
|
|Allowed traffic endpoints|
|
||||||
| --- |
|
| --- |
|
||||||
|activation-v2.sls.microsoft.com/*|
|
|activation-v2.sls.microsoft.com/*|
|
||||||
|crl.microsoft.com/pki/crl/*|
|
|crl.microsoft.com/pki/crl/*|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user