diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 76543bd50f..7ee6468dd6 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -10,7 +10,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/08/2018 +ms.date: 01/12/2018 --- # What's new in MDM enrollment and management @@ -1037,6 +1037,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • DeviceGuard/EnableVirtualizationBasedSecurity
  • DeviceGuard/RequirePlatformSecurityFeatures
  • DeviceGuard/LsaCfgFlags
  • +
  • DeviceLock/MinimumPasswordAge
  • ExploitGuard/ExploitProtectionSettings
  • Games/AllowAdvancedGamingServices
  • Handwriting/PanelDefaultModeDocked
  • @@ -1085,8 +1086,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • Education/PrinterNames
  • Search/AllowCloudSearch
  • Security/ClearTPMIfNotReady
  • +
  • Settings/AllowOnlineTips
  • Start/HidePeopleBar
  • Storage/AllowDiskHealthModelUpdates
  • +
  • System/DisableEnterpriseAuthProxy
  • System/LimitEnhancedDiagnosticDataWindowsAnalytics
  • Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork
  • Update/DisableDualScan
  • @@ -1495,6 +1498,12 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
  • WindowsDefenderSecurityCenter/HideSecureBoot
  • WindowsDefenderSecurityCenter/HideTPMTroubleshooting
  • +

    Added the following policies the were added in Windows 10, version 1709

    + diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 6efa6508b9..ad98eba42b 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -7,7 +7,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/17/2017 +ms.date: 01/12/2018 --- # Policy CSP @@ -950,6 +950,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    DeviceLock/MinDevicePasswordLength
    +
    + DeviceLock/MinimumPasswordAge +
    DeviceLock/PreventLockScreenSlideShow
    diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index a23b509f96..b056313e5a 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -6,11 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/12/2018 --- # Policy CSP - DeviceLock +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
    @@ -61,6 +63,9 @@ ms.date: 12/14/2017
    DeviceLock/MinDevicePasswordLength
    +
    + DeviceLock/MinimumPasswordAge +
    DeviceLock/PreventLockScreenSlideShow
    @@ -115,7 +120,6 @@ ms.date: 12/14/2017 > [!NOTE] > This policy must be wrapped in an Atomic command. - The following list shows the supported values: @@ -918,6 +922,60 @@ The number of authentication failures allowed before the device will be wiped. A
    +**DeviceLock/MinimumPasswordAge** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark3check mark3check mark3check mark3cross markcross mark
    + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
    + + + +This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. + +The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. + +Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. + + + + + + + + + + + + +
    + **DeviceLock/PreventLockScreenSlideShow**