Merge branch 'master' into mdm-security-baseline-update
@ -18,124 +18,25 @@ The following types of apps run on Windows 10:
|
|||||||
- "Win32" apps - traditional Windows applications.
|
- "Win32" apps - traditional Windows applications.
|
||||||
|
|
||||||
Digging into the Windows apps, there are two categories:
|
Digging into the Windows apps, there are two categories:
|
||||||
- System apps - Apps that are installed in the c:\Windows\* directory. These apps are integral to the OS.
|
- Apps - All other apps, installed in C:\Program Files\WindowsApps. There are two classes of apps:
|
||||||
- Apps - All other apps, installed in c:\Program Files\WindowsApps. There are two classes of apps:
|
|
||||||
- Provisioned: Installed in user account the first time you sign in with a new user account.
|
- Provisioned: Installed in user account the first time you sign in with a new user account.
|
||||||
- Installed: Installed as part of the OS.
|
- Installed: Installed as part of the OS.
|
||||||
|
- System apps - Apps that are installed in the C:\Windows\* directory. These apps are integral to the OS.
|
||||||
|
|
||||||
The following tables list the system apps, installed Windows apps, and provisioned Windows apps in a standard Windows 10 Enterprise installation. (If you have a custom image, your specific apps might differ.) The tables list the app, the full name, show the app's status in Windows 10 version 1607, 1703, and 1709, and indicate whether an app can be uninstalled through the UI.
|
The following tables list the system apps, installed Windows apps, and provisioned Windows apps in a standard Windows 10 Enterprise installation. (If you have a custom image, your specific apps might differ.) The tables list the app, the full name, show the app's status in Windows 10 version 1607, 1703, and 1709, and indicate whether an app can be uninstalled through the UI.
|
||||||
|
|
||||||
Some of the apps show up in multiple tables - that's because their status changed between versions. Make sure to check the version column for the version you are currently running.
|
Some of the apps show up in multiple tables - that's because their status changed between versions. Make sure to check the version column for the version you are currently running.
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Want to see a list of the apps installed on your specific image? You can run the following PowerShell cmdlet:
|
|
||||||
> ```powershell
|
|
||||||
> Get-AppxPackage | select Name,PackageFamilyName
|
|
||||||
> Get-AppxProvisionedPackage -Online | select DisplayName,PackageName
|
|
||||||
> ```
|
|
||||||
|
|
||||||
## System apps
|
|
||||||
|
|
||||||
System apps are integral to the operating system. Here are the typical system apps in Windows 10 versions 1703, 1709, and 1803.
|
|
||||||
|
|
||||||
| Name | Full name |1703 | 1709 | 1803 |Uninstall through UI? |
|
|
||||||
|------------------|-------------------------------------------|:------:|:------:|:------:|-------------------------------------------------------|
|
|
||||||
| Cortana UI | CortanaListenUIApp | x | | |No |
|
|
||||||
| | Desktop Learning | x | | |No |
|
|
||||||
| | DesktopView | x | | |No |
|
|
||||||
| | EnvironmentsApp | x | | |No |
|
|
||||||
| Mixed Reality + | HoloCamera | x | | |No |
|
|
||||||
| Mixed Reality + | HoloItemPlayerApp | x | | |No |
|
|
||||||
| Mixed Reality + | HoloShell | x | | |No |
|
|
||||||
| | InputApp | | x | x |No |
|
|
||||||
| | Microsoft.AAD.Broker.Plugin | x | x | x |No |
|
|
||||||
| | Microsoft.AccountsControl | x | x | x |No |
|
|
||||||
| Hello setup UI | Microsoft.BioEnrollment | x | x | x |No |
|
|
||||||
| | Microsoft.CredDialogHost | x | x | x |No |
|
|
||||||
| | Microsoft.ECApp | | x | x |No |
|
|
||||||
| | Microsoft.LockApp | x | x | x |No |
|
|
||||||
| Microsoft Edge | Microsoft.Microsoft.Edge | x | x | x |No |
|
|
||||||
| | Microsoft.PPIProjection | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. Apprep.ChxApp | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. AssignedAccessLockApp | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. CloudExperienceHost | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. ContentDeliveryManager | x | x | x |No |
|
|
||||||
| Cortana | Microsoft.Windows.Cortana | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. Holographic.FirstRun | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. ModalSharePickerHost | x | | |No |
|
|
||||||
| | Microsoft.Windows. OOBENetworkCaptivePort | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. OOBENetworkConnectionFlow | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. ParentalControls | x | x | x |No |
|
|
||||||
| People Hub | Microsoft.Windows. PeopleExperienceHost | | x | x |No |
|
|
||||||
| | Microsoft.Windows. PinningConfirmationDialog | | x | x |No |
|
|
||||||
| | Microsoft.Windows. SecHealthUI | x | x | x |No |
|
|
||||||
| | Microsoft.Windows. SecondaryTileExperience | x | x | |No |
|
|
||||||
| | Microsoft.Windows. SecureAssessmentBrowser | x | x | x |No |
|
|
||||||
| Start | Microsoft.Windows. ShellExperienceHost | x | x | x |No |
|
|
||||||
| Windows Feedback | Microsoft.WindowsFeedback | * | * | |No |
|
|
||||||
| | Microsoft.XboxGameCallableUI | x | x | x |No |
|
|
||||||
| Contact Support* | Windows.ContactSupport | x | * | |Via Optional Features app |
|
|
||||||
| Settings | Windows.ImmersiveControlPanel | x | x | |No |
|
|
||||||
| Connect | Windows.MiracastView | x | | |No |
|
|
||||||
| Print 3D | Windows.Print3D | | x | |Yes |
|
|
||||||
| Print UI | Windows.PrintDialog | x | x | x |No |
|
|
||||||
| Purchase UI | Windows.PurchaseDialog | | | x |No |
|
|
||||||
| | Microsoft.AsyncTextService | | | x |No |
|
|
||||||
| | Microsoft.MicrosoftEdgeDevToolsClient | | | x |No |
|
|
||||||
| | Microsoft.Win32WebViewHost | | | x |No |
|
|
||||||
| | Microsoft.Windows.CapturePicker | | | x |No |
|
|
||||||
| | Windows.CBSPreview | | | x |No |
|
|
||||||
|File Picker | 1527c705-839a-4832-9118-54d4Bd6a0c89 | | | x |No |
|
|
||||||
|File Explorer | c5e2524a-ea46-4f67-841f-6a9465d9d515 | | | x |No |
|
|
||||||
|App Resolver | E2A4F912-2574-4A75-9BB0-0D023378592B | | | x |No |
|
|
||||||
|Add Suggested folder Dialog box| F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE|| | x |No |
|
|
||||||
|
|
||||||
> [!NOTE]
|
|
||||||
> - The Contact Support app changed to Get Help in version 1709. Get Help is a provisioned app (instead of system app like Contact Support).
|
|
||||||
|
|
||||||
## Installed Windows apps
|
|
||||||
|
|
||||||
Here are the typical installed Windows apps in Windows 10 versions 1703, 1709, and 1803.
|
|
||||||
|
|
||||||
| Name | Full name | 1703 | 1709 | 1803 |Uninstall through UI? |
|
|
||||||
|--------------------|------------------------------------------|:----:|:----:|:----:|:----------------------:|
|
|
||||||
| Remote Desktop | Microsoft.RemoteDesktop | x | x | | Yes |
|
|
||||||
| PowerBI | Microsoft.Microsoft PowerBIforWindows | x | | | Yes |
|
|
||||||
| Code Writer | ActiproSoftwareLLC.562882FEEB491 | x | x | x | Yes |
|
|
||||||
| Eclipse Manager | 46928bounde.EclipseManager | x | x | x | Yes |
|
|
||||||
| Pandora | PandoraMediaInc.29680B314EFC2 | x | x | x | Yes |
|
|
||||||
| Photoshop Express | AdobeSystemIncorporated. AdobePhotoshop | x | x | x | Yes |
|
|
||||||
| Duolingo | D5EA27B7.Duolingo- LearnLanguagesforFree | x | x | x | Yes |
|
|
||||||
| Network Speed Test | Microsoft.NetworkSpeedTest | x | x | x | Yes |
|
|
||||||
| News | Microsoft.BingNews | x | x | x | Yes |
|
|
||||||
| Flipboard | | | | | Yes |
|
|
||||||
| | Microsoft.Advertising.Xaml | x | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Framework.1.2 | x | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Framework.1.3 | x | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Framework.1.6 | | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Framework.1.7 | | | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Framework.2.0 | | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.1.1 | | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.1.3 | x | x | | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.1.4 | x | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.1.6 | | x | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.1.7 | | | x | Yes |
|
|
||||||
| | Microsoft.NET.Native.Runtime.2.0 | | x | x | Yes |
|
|
||||||
| | Microsoft.Services.Store.Engagement | | x | x | Yes |
|
|
||||||
| | Microsoft.VCLibs.120.00 | x | x | x | Yes |
|
|
||||||
| | Microsoft.VCLibs.140.00 | x | x | x | Yes |
|
|
||||||
| | Microsoft.VCLibs.120.00.Universal | | x | | Yes |
|
|
||||||
| | Microsoft.VCLibs.140.00.UWPDesktop | | | x | Yes |
|
|
||||||
| | Microsoft.WinJS.2.0 | x | | | Yes |
|
|
||||||
---
|
|
||||||
|
|
||||||
## Provisioned Windows apps
|
## Provisioned Windows apps
|
||||||
|
|
||||||
Here are the provisioned Windows apps in Windows 10 versions 1703, 1709, 1803 and 1809.
|
Here are the provisioned Windows apps in Windows 10 versions 1703, 1709, 1803 and 1809.
|
||||||
|
|
||||||
```
|
> [!TIP]
|
||||||
> Get-AppxProvisionedPackage -Online | Select-Object DisplayName, PackageName
|
> You can list all provisioned Windows apps with this PowerShell command:
|
||||||
```
|
> ```
|
||||||
|
> Get-AppxProvisionedPackage -Online | Format-Table DisplayName, PackageName
|
||||||
|
> ```
|
||||||
|
|
||||||
| Package name | App name | 1703 | 1709 | 1803 | 1809 | Uninstall through UI? |
|
| Package name | App name | 1703 | 1709 | 1803 | 1809 | Uninstall through UI? |
|
||||||
|----------------------------------------|--------------------------------------------------------------------------------------------------------------------|:----:|:----:|:----:|:----:|:---------------------:|
|
|----------------------------------------|--------------------------------------------------------------------------------------------------------------------|:----:|:----:|:----:|:----:|:---------------------:|
|
||||||
@ -152,7 +53,7 @@ Here are the provisioned Windows apps in Windows 10 versions 1703, 1709, 1803 an
|
|||||||
| Microsoft.MicrosoftStickyNotes | [Microsoft Sticky Notes](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe) | x | x | x | x | No |
|
| Microsoft.MicrosoftStickyNotes | [Microsoft Sticky Notes](ms-windows-store://pdp/?PFN=Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe) | x | x | x | x | No |
|
||||||
| Microsoft.MixedReality.Portal | [Mixed Reality Portal](ms-windows-store://pdp/?PFN=Microsoft.MixedReality.Portal_8wekyb3d8bbwe) | | | | x | No |
|
| Microsoft.MixedReality.Portal | [Mixed Reality Portal](ms-windows-store://pdp/?PFN=Microsoft.MixedReality.Portal_8wekyb3d8bbwe) | | | | x | No |
|
||||||
| Microsoft.MSPaint | [Paint 3D](ms-windows-store://pdp/?PFN=Microsoft.MSPaint_8wekyb3d8bbwe) | x | x | x | x | No |
|
| Microsoft.MSPaint | [Paint 3D](ms-windows-store://pdp/?PFN=Microsoft.MSPaint_8wekyb3d8bbwe) | x | x | x | x | No |
|
||||||
| Microsoft.Office.OneNote | [OneNote](ms-windows-store://pdp/?PFN=Microsoft.Office.OneNote_8wekyb3d8bbwe) | x | x | x | x | Yes |
|
| Microsoft.Office.OneNote | [OneNote](ms-windows-store://pdp/?PFN=Microsoft.Office.OneNote_8wekyb3d8bbwe) | x | x | x | x | Yes |
|
||||||
| Microsoft.OneConnect | [Paid Wi-Fi & Cellular](ms-windows-store://pdp/?PFN=Microsoft.OneConnect_8wekyb3d8bbwe) | x | x | x | x | No |
|
| Microsoft.OneConnect | [Paid Wi-Fi & Cellular](ms-windows-store://pdp/?PFN=Microsoft.OneConnect_8wekyb3d8bbwe) | x | x | x | x | No |
|
||||||
| Microsoft.People | [Microsoft People](ms-windows-store://pdp/?PFN=Microsoft.People_8wekyb3d8bbwe) | x | x | x | x | No |
|
| Microsoft.People | [Microsoft People](ms-windows-store://pdp/?PFN=Microsoft.People_8wekyb3d8bbwe) | x | x | x | x | No |
|
||||||
| Microsoft.Print3D | [Print 3D](ms-windows-store://pdp/?PFN=Microsoft.Print3D_8wekyb3d8bbwe) | | x | x | x | No |
|
| Microsoft.Print3D | [Print 3D](ms-windows-store://pdp/?PFN=Microsoft.Print3D_8wekyb3d8bbwe) | | x | x | x | No |
|
||||||
@ -185,4 +86,106 @@ Here are the provisioned Windows apps in Windows 10 versions 1703, 1709, 1803 an
|
|||||||
---
|
---
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The Store app can't be removed. If you want to remove and reinstall the Store app, you can only bring Store back by either restoring your system from a backup or resetting your system. Instead of removing the Store app, you should use group policies to hide or disable it.
|
>The Store app can't be removed. If you want to remove and reinstall the Store app, you can only bring Store back by either restoring your system from a backup or resetting your system. Instead of removing the Store app, you should use group policies to hide or disable it.
|
||||||
|
---
|
||||||
|
|
||||||
|
## System apps
|
||||||
|
|
||||||
|
System apps are integral to the operating system. Here are the typical system apps in Windows 10 versions 1703, 1709, and 1803.
|
||||||
|
|
||||||
|
> [!TIP]
|
||||||
|
> You can list all system apps with this PowerShell command:
|
||||||
|
> ```
|
||||||
|
> Get-AppxPackage -PackageTypeFilter Main | ? { $_.SignatureKind -eq "System" } | Sort Name | Format-Table Name, InstallLocation
|
||||||
|
> ```
|
||||||
|
|
||||||
|
| Name | Package Name | 1703 | 1709 | 1803 | Uninstall through UI? |
|
||||||
|
|----------------------------------|---------------------------------------------|:-----:|:----:|:----:|-----------------------|
|
||||||
|
| File Picker | 1527c705-839a-4832-9118-54d4Bd6a0c89 | | | x | No |
|
||||||
|
| File Explorer | c5e2524a-ea46-4f67-841f-6a9465d9d515 | | | x | No |
|
||||||
|
| App Resolver UX | E2A4F912-2574-4A75-9BB0-0D023378592B | | | x | No |
|
||||||
|
| Add Suggested Folders To Library | F46D4000-FD22-4DB4-AC8E-4E1DDDE828FE | | | x | No |
|
||||||
|
| | InputApp | | x | x | No |
|
||||||
|
| Cortana UI | CortanaListenUIApp | x | | | No |
|
||||||
|
| | Desktop Learning | x | | | No |
|
||||||
|
| | DesktopView | x | | | No |
|
||||||
|
| | EnvironmentsApp | x | | | No |
|
||||||
|
| Mixed Reality + | HoloCamera | x | | | No |
|
||||||
|
| Mixed Reality + | HoloItemPlayerApp | x | | | No |
|
||||||
|
| Mixed Reality + | HoloShell | x | | | No |
|
||||||
|
| | Microsoft.AAD.Broker.Plugin | x | x | x | No |
|
||||||
|
| | Microsoft.AccountsControl | x | x | x | No |
|
||||||
|
| | Microsoft.AsyncTextService | | | x | No |
|
||||||
|
| Hello setup UI | Microsoft.BioEnrollment | x | x | x | No |
|
||||||
|
| | Microsoft.CredDialogHost | x | x | x | No |
|
||||||
|
| | Microsoft.ECApp | | x | x | No |
|
||||||
|
| | Microsoft.LockApp | x | x | x | No |
|
||||||
|
| Microsoft Edge | Microsoft.MicrosoftEdge | x | x | x | No |
|
||||||
|
| | Microsoft.MicrosoftEdgeDevToolsClient | | | x | No |
|
||||||
|
| | Microsoft.PPIProjection | x | x | | No |
|
||||||
|
| | Microsoft.Win32WebViewHost | | | x | No |
|
||||||
|
| | Microsoft.Windows.Apprep.ChxApp | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.AssignedAccessLockApp | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.CapturePicker | | | x | No |
|
||||||
|
| | Microsoft.Windows.CloudExperienceHost | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.ContentDeliveryManager | x | x | x | No |
|
||||||
|
| Cortana | Microsoft.Windows.Cortana | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.Holographic.FirstRun | x | x | | No |
|
||||||
|
| | Microsoft.Windows.ModalSharePickerHost | x | | | No |
|
||||||
|
| | Microsoft.Windows.OOBENetworkCaptivePort | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.OOBENetworkConnectionFlow | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.ParentalControls | x | x | x | No |
|
||||||
|
| People Hub | Microsoft.Windows.PeopleExperienceHost | | x | x | No |
|
||||||
|
| | Microsoft.Windows.PinningConfirmationDialog | | x | x | No |
|
||||||
|
| | Microsoft.Windows.SecHealthUI | x | x | x | No |
|
||||||
|
| | Microsoft.Windows.SecondaryTileExperience | x | x | | No |
|
||||||
|
| | Microsoft.Windows.SecureAssessmentBrowser | x | x | x | No |
|
||||||
|
| Start | Microsoft.Windows.ShellExperienceHost | x | x | x | No |
|
||||||
|
| Windows Feedback | Microsoft.WindowsFeedback | * | * | | No |
|
||||||
|
| | Microsoft.XboxGameCallableUI | x | x | x | No |
|
||||||
|
| | Windows.CBSPreview | | | x | No |
|
||||||
|
| Contact Support* | Windows.ContactSupport | x | * | | Via Settings App |
|
||||||
|
| Settings | Windows.immersivecontrolpanel | x | x | x | No |
|
||||||
|
| Connect | Windows.MiracastView | x | | | No |
|
||||||
|
| Print 3D | Windows.Print3D | | x | | Yes |
|
||||||
|
| Print UI | Windows.PrintDialog | x | x | x | No |
|
||||||
|
| Purchase UI | Windows.PurchaseDialog | | | | No |
|
||||||
|
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> - The Contact Support app changed to Get Help in version 1709. Get Help is a provisioned app (instead of system app like Contact Support).
|
||||||
|
|
||||||
|
## Installed Windows apps
|
||||||
|
|
||||||
|
Here are the typical installed Windows apps in Windows 10 versions 1703, 1709, and 1803.
|
||||||
|
|
||||||
|
| Name | Full name | 1703 | 1709 | 1803 |Uninstall through UI? |
|
||||||
|
|--------------------|------------------------------------------|:----:|:----:|:----:|:---------------------:|
|
||||||
|
| Remote Desktop | Microsoft.RemoteDesktop | x | x | | Yes |
|
||||||
|
| PowerBI | Microsoft.Microsoft PowerBIforWindows | x | | | Yes |
|
||||||
|
| Code Writer | ActiproSoftwareLLC.562882FEEB491 | x | x | x | Yes |
|
||||||
|
| Eclipse Manager | 46928bounde.EclipseManager | x | x | x | Yes |
|
||||||
|
| Pandora | PandoraMediaInc.29680B314EFC2 | x | x | x | Yes |
|
||||||
|
| Photoshop Express | AdobeSystemIncorporated. AdobePhotoshop | x | x | x | Yes |
|
||||||
|
| Duolingo | D5EA27B7.Duolingo- LearnLanguagesforFree | x | x | x | Yes |
|
||||||
|
| Network Speed Test | Microsoft.NetworkSpeedTest | x | x | x | Yes |
|
||||||
|
| News | Microsoft.BingNews | x | x | x | Yes |
|
||||||
|
| Flipboard | | | | | Yes |
|
||||||
|
| | Microsoft.Advertising.Xaml | x | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Framework.1.2 | x | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Framework.1.3 | x | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Framework.1.6 | | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Framework.1.7 | | | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Framework.2.0 | | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.1.1 | | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.1.3 | x | x | | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.1.4 | x | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.1.6 | | x | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.1.7 | | | x | Yes |
|
||||||
|
| | Microsoft.NET.Native.Runtime.2.0 | | x | x | Yes |
|
||||||
|
| | Microsoft.Services.Store.Engagement | | x | x | Yes |
|
||||||
|
| | Microsoft.VCLibs.120.00 | x | x | x | Yes |
|
||||||
|
| | Microsoft.VCLibs.140.00 | x | x | x | Yes |
|
||||||
|
| | Microsoft.VCLibs.120.00.Universal | | x | | Yes |
|
||||||
|
| | Microsoft.VCLibs.140.00.UWPDesktop | | | x | Yes |
|
||||||
|
| | Microsoft.WinJS.2.0 | x | | | Yes |
|
||||||
---
|
---
|
@ -21,7 +21,7 @@ Looking for the DDF XML files? See [CSP DDF files download](configuration-servic
|
|||||||
|
|
||||||
The XML below is for Windows 10, version 1809.
|
The XML below is for Windows 10, version 1809.
|
||||||
|
|
||||||
``` syntax
|
```xml
|
||||||
<?xml version="1.0" encoding="UTF-8"?>
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN"
|
<!DOCTYPE MgmtTree PUBLIC " -//OMA//DTD-DM-DDF 1.2//EN"
|
||||||
"http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd"
|
"http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd"
|
||||||
@ -1262,7 +1262,7 @@ Note that enhanced anti-spoofing for Windows Hello face authentication is not re
|
|||||||
<Replace />
|
<Replace />
|
||||||
</AccessType>
|
</AccessType>
|
||||||
<DefaultValue>False</DefaultValue>
|
<DefaultValue>False</DefaultValue>
|
||||||
<Description>Enables/Disables Dyanamic Lock</Description>
|
<Description>Enables/Disables Dynamic Lock</Description>
|
||||||
<DFFormat>
|
<DFFormat>
|
||||||
<bool />
|
<bool />
|
||||||
</DFFormat>
|
</DFFormat>
|
||||||
@ -1304,4 +1304,4 @@ Note that enhanced anti-spoofing for Windows Hello face authentication is not re
|
|||||||
</Node>
|
</Node>
|
||||||
</Node>
|
</Node>
|
||||||
</MgmtTree>
|
</MgmtTree>
|
||||||
```
|
```
|
||||||
|
@ -215,6 +215,7 @@
|
|||||||
### [Quick guide to Windows as a service](update/waas-quick-start.md)
|
### [Quick guide to Windows as a service](update/waas-quick-start.md)
|
||||||
#### [Servicing stack updates](update/servicing-stack-updates.md)
|
#### [Servicing stack updates](update/servicing-stack-updates.md)
|
||||||
### [Overview of Windows as a service](update/waas-overview.md)
|
### [Overview of Windows as a service](update/waas-overview.md)
|
||||||
|
### [Understand how servicing differs in Windows 10](update/waas-servicing-differences.md)
|
||||||
### [Prepare servicing strategy for Windows 10 updates](update/waas-servicing-strategy-windows-10-updates.md)
|
### [Prepare servicing strategy for Windows 10 updates](update/waas-servicing-strategy-windows-10-updates.md)
|
||||||
### [Build deployment rings for Windows 10 updates](update/waas-deployment-rings-windows-10-updates.md)
|
### [Build deployment rings for Windows 10 updates](update/waas-deployment-rings-windows-10-updates.md)
|
||||||
### [Assign devices to servicing channels for Windows 10 updates](update/waas-servicing-channels-windows-10-updates.md)
|
### [Assign devices to servicing channels for Windows 10 updates](update/waas-servicing-channels-windows-10-updates.md)
|
||||||
@ -260,6 +261,7 @@
|
|||||||
##### [Step 1: Identify apps](upgrade/upgrade-readiness-identify-apps.md)
|
##### [Step 1: Identify apps](upgrade/upgrade-readiness-identify-apps.md)
|
||||||
##### [Step 2: Resolve issues](upgrade/upgrade-readiness-resolve-issues.md)
|
##### [Step 2: Resolve issues](upgrade/upgrade-readiness-resolve-issues.md)
|
||||||
##### [Step 3: Deploy Windows](upgrade/upgrade-readiness-deploy-windows.md)
|
##### [Step 3: Deploy Windows](upgrade/upgrade-readiness-deploy-windows.md)
|
||||||
|
##### [Step 4: Monitor deployment](upgrade/upgrade-readiness-monitor-deployment.md)
|
||||||
##### [Additional insights](upgrade/upgrade-readiness-additional-insights.md)
|
##### [Additional insights](upgrade/upgrade-readiness-additional-insights.md)
|
||||||
##### [Targeting a new operating system version](upgrade/upgrade-readiness-target-new-OS.md)
|
##### [Targeting a new operating system version](upgrade/upgrade-readiness-target-new-OS.md)
|
||||||
### [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md)
|
### [Monitor Windows Updates with Update Compliance](update/update-compliance-monitor.md)
|
||||||
|
BIN
windows/deployment/images/UR-driver-issue-detail.png
Normal file
After Width: | Height: | Size: 86 KiB |
BIN
windows/deployment/images/UR-example-feedback.png
Normal file
After Width: | Height: | Size: 124 KiB |
BIN
windows/deployment/images/UR-monitor-main.png
Normal file
After Width: | Height: | Size: 174 KiB |
BIN
windows/deployment/images/UR-update-progress-failed-detail.png
Normal file
After Width: | Height: | Size: 98 KiB |
BIN
windows/deployment/update/images/servicing-cadence.png
Normal file
After Width: | Height: | Size: 53 KiB |
BIN
windows/deployment/update/images/servicing-previews.png
Normal file
After Width: | Height: | Size: 76 KiB |
106
windows/deployment/update/waas-servicing-differences.md
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
---
|
||||||
|
title: Servicing differences between Windows 10 and older operating systems
|
||||||
|
description: Learn the differences between servicing Windows 10 and servicing older operating systems.
|
||||||
|
keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools
|
||||||
|
ms.prod: w10
|
||||||
|
ms.mktglfcycl: manage
|
||||||
|
ms.sitesec: library
|
||||||
|
author: KarenSimWindows
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.author: karensim
|
||||||
|
ms.date: 11/09/2018
|
||||||
|
---
|
||||||
|
# Understanding the differences between servicing Windows 10-era and legacy Windows operating systems
|
||||||
|
|
||||||
|
>Applies to: Windows 10
|
||||||
|
|
||||||
|
Today, many enterprise customers have a mix of modern and legacy client and server operating systems. Managing the servicing and updating differences between those legacy operating systems and Windows 10 versions adds a level of complexity that is not well understood. This can be confusing. With the end of support for legacy [Windows 7 SP1](https://support.microsoft.com/help/4057281/windows-7-support-will-end-on-january-14-2020) and Windows Server 2008 R2 variants on January 14, 2020, System Administrators have a critical need critical to understand how best to leverage a modern workplace to support system updates.
|
||||||
|
|
||||||
|
The following provides an initial overview of how updating client and server differs between the Windows 10-era operating systems (such as Windows 10 version 1709, Windows Server 2016) and legacy operating systems (such as Windows 7, Windows 8.1, Windows Server 2008 R2, Windows Server 2012 R2).
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
> A note on naming convention in this article: For brevity, "Windows 10" refers to all operating systems across client, server and IoT released since July 2015, while "legacy" refers to all operating systems prior to that period for client and server, including Windows 7, Window 8.1, Windows Server 2008 R2, Windows Server 2012 R2, etc.
|
||||||
|
|
||||||
|
## Infinite fragmentation
|
||||||
|
Prior to Windows 10, all updates to operating system (OS) components were published individually. On "Update Tuesday," customers would pick and choose individual updates they wanted to apply. Most chose to update security fixes, while far fewer selected non-security fixes, updated drivers, or installed .NET Framework updates.
|
||||||
|
|
||||||
|
As a result, each environment with the global Windows ecosystem that had only a subset of security and non-security fixes installed had a different set of binaries and behaviors than those that consistently installed every available update as tested by Microsoft.
|
||||||
|
|
||||||
|
This resulted in a fragmented ecosystem that created diverse challenges in predictively testing interoperability, resulting in high update failure rates - which were subsequently mitigated by customers removing individual updates that were causing issues. Each customer that selectively removed individual updates amplified this fragmentation by creating more diverse environment permutations across the ecosystem. As an IT Administrator once quipped, "If you’ve seen one Windows 7 PC, you have seen one Windows 7 PC," suggesting no consistency or predictability across more than 250M commercial devices at the time.
|
||||||
|
|
||||||
|
## Windows 10 – Next generation
|
||||||
|
Windows 10 provided an opportunity to end the era of infinite fragmentation. With Windows 10 and the Windows as a service model, updates came rolled together in the "latest cumulative update" (LCU) packages for both client and server. Every new update published includes all changes from previous updates, as well as new fixes. Since Windows client and server share the same code base, these LCUs This helps simplify servicing. Devices with the original Release to Market (RTM) version of a feature release installed could get up to date by installing the most recent LCU.
|
||||||
|
|
||||||
|
Windows publishes the new LCU packages for each Windows 10 version (1607, 1709, etc.) on the second Tuesday of each month. This package is classified as a required security update and contains contents from the previous LCU as well as new security, non-security and Internet Explorer 11 (IE11) fixes. The security classification, by definition, requires a reboot of the device to complete installation of the update.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
Another benefit of the LCU model is fewer steps. Devices that have the original Release to Market (RTM) version of a release can install the most recent LCU to get up to date in one step, rather than having to install multiple updates with reboots after each.
|
||||||
|
|
||||||
|
This cumulative update model for Windows 10 has helped provide the Windows ecosystem with consistent update experiences that can be predicted by baseline testing before release. Even with highly complex updates with hundreds of fixes, the number of incidents with monthly security updates for Windows 10 have fallen month over month since the initial release of Windows 10.
|
||||||
|
|
||||||
|
### Points to consider
|
||||||
|
|
||||||
|
- Windows 10 does not have the concept of a Security-Only or Monthly Rollup for updates. All updates are an LCU package, which includes the last release plus anything new.
|
||||||
|
- Windows 10 no longer has the concept of a "hotfix" since all individual updates must be rolled into the cumulative packages. (Note: Any private fix is offered for customer validation only, and then rolled into an LCU.)
|
||||||
|
- [Updates for the .NET Framework](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) are NOT included in the Windows 10 LCU. They are separate packages with different behaviors depending on the version of .NET Framework being updated, and on which OS. As of October 2018, .NET Framework updates for Windows 10 will be separate and have their own cumulative update model.
|
||||||
|
- For Windows 10, available update types vary by publishing channel:
|
||||||
|
- For customers using Windows Server Update Services (WSUS) and for the Update Catalog, several different updates types for Windows 10 are rolled together for the core OS in a single LCU package, with exception of Servicing Stack Updates.
|
||||||
|
- Servicing Stack Updates (SSU) are available for download from the Update Catalog and can be imported through WSUS, but will not be automatically synced. (See this [example](https://support.microsoft.com/help/4132650/servicing-stack-update-for-windows-10-version-1709-may-21-2018) for Windows 10, version 1709). For more information on Servicing Stack Updates, please see this [blog](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-7-servicing-stack-updates-managing-change-and/ba-p/260434).
|
||||||
|
- For customers connecting to Windows Update, the new cloud update architecture uses a database of updates which break out all the different update types, including Servicing Stack Updates (SSU) and Dynamic Updates (DU). The update scanning in the Windows 10 servicing stack on the client automatically takes only the updates that are needed by the device to be completely up to date.
|
||||||
|
- Windows 7 and other legacy operating systems have cumulative updates that operate differently than in Windows 10 (see next section).
|
||||||
|
|
||||||
|
## Windows 7 and legacy OS versions
|
||||||
|
While Windows 10 updates could have been controlled as cumulative from "Day 1," the legacy OS ecosystem for both client and server was highly fragmented. Recognizing the challenges of update quality in aa fragmented environment, we moved Windows 7 to a cumulative update model in October 2016.
|
||||||
|
|
||||||
|
Customers saw the LCU model used for Windows 10 as having packages that were too large and represented too much of a change for legacy operating systems, so a different model was implemented. Windows instead offered two cumulative package types for all legacy operating systems: Monthly Rollups and Security-only updates.
|
||||||
|
|
||||||
|
The Monthly Rollup includes new non-security, security updates, Internet Explorer (IE) updates, and all updates from the previous month, similar to the Windows 10 model. The Security-only package includes new security updates and all security updates from the previous month. Additionally, a cumulative package is offered for IE, which can be tested and installed separately, reducing the total update package size. The IE cumulative update includes both security and non-security fixes following the same model as Windows 10.
|
||||||
|
|
||||||
|
Moving to the cumulative model for legacy OS versions continues to improve predictability of update quality. The Windows legacy environments have fully updated machines, which means that the baseline against which all legacy OS version updates are tested include all of the updates (security and non-security) prior to and after October 2016. Many customer environments do not have all updates prior to this change installed, which leaves some continued fragmentation in the ecosystem. This remaining fragmentation results in issues like those seen when the September 2016 Servicing Stack Update (SSU) was needed for smooth installation of the August 2018 security update. These environments did not have the SSU applied previously.
|
||||||
|
|
||||||
|
### Points to consider
|
||||||
|
- Windows 7 and Windows 8 legacy operating system updates [moved from individual to cumulative in October 2016](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783). Devices with updates missing prior to that point are still missing those updates, as they were not included in the subsequent cumulative packages.
|
||||||
|
- "Hotfixes" are no longer published for legacy OS versions. All updates are rolled into the appropriate package depending on their classification as either non-security, security, or Internet Explorer updates. (Note: any private fix is offered for customer validation only. Once validated they are then rolled into a Monthly Rollup or IE cumulative update, as appropriate.)
|
||||||
|
- Both Monthly Rollups and Security-only updates released on Update Tuesday for legacy OS versions are identified as "security, critical" updates, because both have the full set of security updates in them. The Monthly Rollup has additional non-security updates that are not included in the Security Only update. The "security" classification requires the device be rebooted so the update can be fully installed.
|
||||||
|
- Despite the cumulative nature of both Monthly Rollups and Security-only updates, switching between these update types is not advised. Small differences in the baselines of these packages may result in installation errors and conflicts. Choosing one and staying on that update type – Monthly Rollup or Security-only – is recommended.
|
||||||
|
- In [February 2017](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplified-servicing-for-Windows-7-and-Windows-8-1-the-latest/ba-p/166798), Windows pulled IE updates out of the legacy OS versions Security-only updates, while leaving them in the Monthly Rollup updates. This was done specifically to reduce package size based on customer feedback.
|
||||||
|
- The IE cumulative update includes both security and non-security updates and is also needed for to help secure the entire environment. This update can be installed separately or as part of the Monthly Rollup.
|
||||||
|
- [Updates for the .NET Framework](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/) are NOT included in legacy Monthly Rollup or Security Only packages. They are separate packages with different behaviors depending on the version of the .NET Framework, and which legacy OS, being updated.
|
||||||
|
- For [Windows Server 2008 SP2](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/), cumulative updates began in October 2018, and follow the same model as Windows 7. Updates for IE9 are included in those packages, as the last supported version of Internet Explorer for that Legacy OS version.
|
||||||
|
|
||||||
|
## Public preview releases
|
||||||
|
Lastly, the cumulative update model directly impacts the public Preview releases offered in the 3rd and/or 4th weeks of the month. Update Tuesday, also referred to as the "B" week release occurs on the second Tuesday of the month. It is always a required security update across all operating systems. In addition to this monthly release, Windows also releases non-security update "previews" targeting the 3rd (C) and the 4th (D) weeks of the month. These preview releases include that month’s B-release plus a set of non-security updates for testing and validation as a cumulative package. We recommend IT Administrators uses the C/D previews to test the update in their environments. Any issues identified with the updates in the C/D releases are identified and then fixed or removed, prior to being rolled up in to the next month’s B release package together with new security updates.
|
||||||
|
|
||||||
|
### Examples
|
||||||
|
Windows 10 version 1709:
|
||||||
|
|
||||||
|
- (9B) September 11, 2018 Update Tuesday / B release - includes security, non-security and IE update. This update is categorized as "Required, Security" it requires a system reboot.
|
||||||
|
- (9C) September 26, 2018 Preview C release - includes everything from 9B PLUS some non-security updates for testing/validation. This update is qualified as not required, non-security. No system reboot is required.
|
||||||
|
- (10B) October 9, 2018 Update Tuesday / B release includes all fixes included in 9B, all fixes in 9C and introduces new security fixes and IE updates. This update is qualified as "Required, Security" and requires a system reboot.
|
||||||
|
|
||||||
|
All of these updates are cumulative and build on each other for Windows 10. This is in contrast to legacy OS versions, where the 9C release becomes part of the "Monthly Rollup," but not the "Security Only" update. In other words, a Window 7 SP1 9C update is part of the cumulative "Monthly Rollup" but not included in the "Security Only" update because the fixes are qualified as "non-security". This is an important variation to note on the two models.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
### Previews vs. on-demand releases
|
||||||
|
In 2018, we experienced incidents that required urgent remediation that didn’t map to the monthly update release cadence. These incidents were situations that required an immediate fix to an Update Tuesday release. While Windows engineering worked aggressively to respond within a week of the B-release, these "on-demand" releases created confusion with the C Preview releases.
|
||||||
|
|
||||||
|
#### Points to consider:
|
||||||
|
- When Windows identifies an issue with a Update Tuesday release, engineering teams work to remediate or fix the issue as quickly as possible. The outcome is often a new update which may be released at any time, including during the 3rd or 4th week of the month. Such updates are independent of the regularly scheduled "C" and "D" update previews. These updates are created on-demand to remediate a customer impacting issue. In most cases they are qualified as a "non-security" update, and do not require a system reboot.
|
||||||
|
- With the new Windows Update (WU) architecture, updates can be targeted to affected devices. This targeting is not available through the Update Catalog or WSUS channels, however.
|
||||||
|
- On-demand releases address a specific issue with an Update Tuesday release and are often qualified as "non-security" for one of two reasons. First, the fix may not be an additional security fix, but a non-security change to the update. Second, the "non-security" designation allows individuals or companies to choose when and how to reboot the devices, rather than forcing a system reboot on all Windows devices receiving the update globally. This trade-off is rarely a difficult choice as it has the potential to impact customer experience across client and server, across consumer and commercial customers for more than one billion devices.
|
||||||
|
- Because the cumulative model is used across Window 10 and legacy Windows OS versions, despite variations between these OS versions, an out of band release will include all of the changes from the Update Tuesday release plus the fix that addresses the issue. And since Windows no longer releases hotfixes, everything is cumulative in some way.
|
||||||
|
|
||||||
|
In closing, I hope this overview of the update model across current and legacy Windows OS versions highlights the benefits of the Windows 10 cumulative update model to help defragment the Windows ecosystem environments, simplify servicing and help make systems more secure.
|
||||||
|
|
||||||
|
|
||||||
|
## Resources
|
||||||
|
- [Simplifying updates for Windows 7 and 8.1](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplifying-updates-for-Windows-7-and-8-1/ba-p/166530)
|
||||||
|
- [Further simplifying servicing models for Windows 7 and Windows 8.1](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Further-simplifying-servicing-models-for-Windows-7-and-Windows-8/ba-p/166772)
|
||||||
|
- [More on Windows 7 and Windows 8.1 servicing changes](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/More-on-Windows-7-and-Windows-8-1-servicing-changes/ba-p/166783)
|
||||||
|
- [.NET Framework Monthly Rollups Explained](https://blogs.msdn.microsoft.com/dotnet/2016/10/11/net-framework-monthly-rollups-explained/)
|
||||||
|
- [Simplified servicing for Windows 7 and Windows 8.1: the latest improvements](https://techcommunity.microsoft.com/t5/Windows-Blog-Archive/Simplified-servicing-for-Windows-7-and-Windows-8-1-the-latest/ba-p/166798)
|
||||||
|
- [Windows Server 2008 SP2 servicing changes](https://cloudblogs.microsoft.com/windowsserver/2018/06/12/windows-server-2008-sp2-servicing-changes/)
|
||||||
|
- [Windows 10 update servicing cadence](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376)
|
||||||
|
- [Windows 7 servicing stack updates: managing change and appreciating cumulative updates](https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-7-servicing-stack-updates-managing-change-and/ba-p/260434)
|
@ -1,8 +1,8 @@
|
|||||||
---
|
---
|
||||||
title: Upgrade Readiness - Get a list of computers that are upgrade-ready (Windows 10)
|
title: Upgrade Readiness - Get a list of computers that are upgrade ready (Windows 10)
|
||||||
description: Describes how to get a list of computers that are ready to be upgraded in Upgrade Readiness.
|
description: Describes how to get a list of computers that are ready to be upgraded in Upgrade Readiness.
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
author: greg-lindsay
|
author: jaimeo
|
||||||
ms.date: 04/19/2017
|
ms.date: 04/19/2017
|
||||||
---
|
---
|
||||||
|
|
||||||
|
@ -93,7 +93,7 @@ The deployment script displays the following exit codes to let you know if it wa
|
|||||||
<td>N/A</td>
|
<td>N/A</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>1 - Unexpected error occurred while executiEng the script.</td>
|
<td>1 - Unexpected error occurred while executing the script.</td>
|
||||||
<td> The files in the deployment script are likely corrupted. Download the [latest script](https://go.microsoft.com/fwlink/?LinkID=822966) from the download center and try again.</td>
|
<td> The files in the deployment script are likely corrupted. Download the [latest script](https://go.microsoft.com/fwlink/?LinkID=822966) from the download center and try again.</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -0,0 +1,48 @@
|
|||||||
|
---
|
||||||
|
title: Monitor deployment with Upgrade Readiness
|
||||||
|
description: Describes how to use Upgrade Readiness to monitor the deployment after Windows upgrades.
|
||||||
|
keywords: windows analytics, oms, operations management suite, prerequisites, requirements, upgrades, log analytics,
|
||||||
|
ms.localizationpriority: medium
|
||||||
|
ms.prod: w10
|
||||||
|
author: jaimeo
|
||||||
|
ms.author: jaimeo
|
||||||
|
ms.date: 11/07/2018
|
||||||
|
---
|
||||||
|
|
||||||
|
# Upgrade Readiness - Step 4: Monitor
|
||||||
|
|
||||||
|
Now that you have started deploying an update with Upgrade Readiness, you can use it to monitor important elements.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
## Update progress
|
||||||
|
|
||||||
|
The **Update progress** blade allows you to monitor the progress and status of your deployment. Any device that has attepted to upgrade in the last 30 days displays the **DeploymentStatus** attribute. You'll be able to see the number of computers that have successfully upgraded, failed to upgrade, are stalled, etc.
|
||||||
|
|
||||||
|
|
||||||
|
Selecting this blade allows you to view device-level details about the deployment. For example, select **Failed** to view the original operating system version, the target operating system version, and the reason the update failed for each of the devices that failed to upgrade. In the case of the device illustrated in the following image, an attempt was made to upgrade from Windows 10, version 1703 to 1709, but the operation timed out.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
|
## Driver issues
|
||||||
|
|
||||||
|
The **Driver issues** blade allows you to see Device Manager errors for your upgraded devices. We include data for all compatibility-related device errors, such as "driver not found" and "driver not started." The blade summarizes errors by error type, but you can select a particular error type to see device-level details about which device(s) are failing and where to obtain a driver.
|
||||||
|
|
||||||
|
|
||||||
|
For example, by selecting error code **28 - driver not installed**, you would see that the device in the following image is missing the driver for a network controller. Upgrade Readiness also notifies that a suitable driver is available online through Windows Update. If this device is configured to automatically receive updates from Windows Update, this issue would likely resolve itself following the device's next Windows Update scan. If this device does not automatically receive updates from Windows Update, you would need to deliver the driver manually.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
## User feedback
|
||||||
|
|
||||||
|
The **User Feedback** blade focuses on gathering subjective feedback from your end users. If a user submits feedback through the Feedback Hub app on a device in your workspace, we will make that feedback visible to you in this blade. The Feedback Hub app is built into Windows 10 and can be accessed by typing "Feedback Hub" in the Cortana search bar.
|
||||||
|
|
||||||
|
|
||||||
|
We recommend that you encourage your end users to submit any feedback they have through Feedback Hub. Not only will this feedback be sent directly to Microsoft for review, but you'll also be able to see it by using Upgrade Readiness. You should be aware that **feedback submitted through Feedback Hub will be publicly visible**, so it's best to avoid submitting feedback about internal line-of-business applications.
|
||||||
|
|
||||||
|
When viewing user feedback in Upgrade Readiness, you'll be able to see the raw "Title" and "Feedback" text from the user's submission in Feedback Hub, as well as the number of upvotes the submission has received. (Since feedback is publicly visible, the number of upvotes is a global value and not specific to your company.) If a Microsoft engineer has responded to the submission in Feedback Hub, we'll pull in the Microsoft response for you to see as well.
|
||||||
|
|
||||||
|

|
||||||
|
|
@ -6,6 +6,8 @@
|
|||||||
## [Scenarios and Capabilities](windows-autopilot-scenarios.md)
|
## [Scenarios and Capabilities](windows-autopilot-scenarios.md)
|
||||||
### [Support for existing devices](existing-devices.md)
|
### [Support for existing devices](existing-devices.md)
|
||||||
### [User-driven mode](user-driven.md)
|
### [User-driven mode](user-driven.md)
|
||||||
|
#### [Azure Active Directory joined](user-driven-aad.md)
|
||||||
|
#### [Hybrid Azure Active Directory joined](user-driven-hybrid.md)
|
||||||
### [Self-deploying mode](self-deploying.md)
|
### [Self-deploying mode](self-deploying.md)
|
||||||
### [Enrollment status page](enrollment-status.md)
|
### [Enrollment status page](enrollment-status.md)
|
||||||
### [Windows Autopilot Reset](windows-autopilot-reset.md)
|
### [Windows Autopilot Reset](windows-autopilot-reset.md)
|
||||||
|
@ -1,19 +1,35 @@
|
|||||||
---
|
---
|
||||||
title: User-driven mode for AAD
|
title: User-driven mode for AAD
|
||||||
description: Listing of Autopilot scenarios
|
description: Listing of Autopilot scenarios
|
||||||
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: deploy
|
ms.mktglfcycl: deploy
|
||||||
ms.localizationpriority: low
|
ms.localizationpriority: low
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
ms.date: 11/07/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Autopilot user-driven mode for Azure Active Directory
|
# Windows Autopilot user-driven mode for Azure Active Directory join
|
||||||
|
|
||||||
**Applies to: Windows 10**
|
**Applies to: Windows 10**
|
||||||
|
|
||||||
PLACEHOLDER. This topic is a placeholder for the AAD-specific instuctions currently in user-driven.md.
|
## Procedures
|
||||||
|
|
||||||
|
In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed:
|
||||||
|
|
||||||
|
- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information.
|
||||||
|
- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected.
|
||||||
|
- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group.
|
||||||
|
|
||||||
|
For each device that will be deployed using user-driven deployment, these additional steps are needed:
|
||||||
|
|
||||||
|
- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information.
|
||||||
|
- Ensure an Autopilot profile has been assigned to the device:
|
||||||
|
- If using Intune and Azure Active Directory dynamic device groups, this can be done automatically.
|
||||||
|
- If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
|
||||||
|
- If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
|
||||||
|
|
||||||
|
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
||||||
|
@ -9,12 +9,31 @@ ms.sitesec: library
|
|||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
ms.date: 11/07/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
# Windows Autopilot user-driven mode for Hybrid Azure Active Directory Join
|
# Windows Autopilot user-driven mode for hybrid Azure Active Directory join
|
||||||
|
|
||||||
**Applies to: Windows 10**
|
**Applies to: Windows 10**
|
||||||
|
|
||||||
PLACEHOLDER. This topic is a placeholder for the AD-specific (hybrid) instuctions.
|
Windows Autopilot requires that devices be Azure Active Directory joined. If you have an on-premises Active Directory environment and want to also join devices to your on-premises domain, you can accomplish this by configuring Autopilot devices to be [hybrid Azure Active Directory (AAD) joined](https://docs.microsoft.com/azure/active-directory/devices/hybrid-azuread-join-plan).
|
||||||
|
|
||||||
|
## Requirements
|
||||||
|
|
||||||
|
To perform a user-driven hybrid AAD joined deployment using Windows Autopilot:
|
||||||
|
|
||||||
|
- Users must be able to join devices to Azure Active Directory.
|
||||||
|
- A Windows Autopilot profile for user-driven mode must be created and
|
||||||
|
- **Hybrid Azure AD joined** must be specified as the selected option under **Join to Azure AD as** in the Autopilot profile.
|
||||||
|
- If using Intune, a device group in Azure Active Directory must exist with the Windows Autopilot profile assigned to that group.
|
||||||
|
- The device must be running Windows 10, version 1809 or later.
|
||||||
|
- The device must be connected to the Internet and have access to an Active Directory domain controller.
|
||||||
|
- The Intune Connector for Active Directory must be installed.
|
||||||
|
- Note: The Intune Connector will perform an on-prem AD join, therefore users do not need on-prem AD-join permission, assuming the Connector is [configured to perform this action](https://docs.microsoft.com/intune/windows-autopilot-hybrid#increase-the-computer-account-limit-in-the-organizational-unit) on the user's behalf.
|
||||||
|
|
||||||
|
## Step by step instructions
|
||||||
|
|
||||||
|
See [Deploy hybrid Azure AD joined devices using Intune and Windows Autopilot](https://docs.microsoft.com/intune/windows-autopilot-hybrid).
|
||||||
|
|
||||||
|
Also see the **Validation** section in the [Windows Autopilot user-driven mode](user-driven.md) topic.
|
@ -8,11 +8,13 @@ ms.localizationpriority: medium
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: deploy
|
ms.pagetype: deploy
|
||||||
author: greg-lindsay
|
author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
ms.date: 11/07/2018
|
||||||
ms.author: greg-lindsay
|
ms.author: greg-lindsay
|
||||||
ms.date: 10/02/2018
|
ms.date: 11/07/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
# Windows Autopilot user-driven mode
|
||||||
|
|
||||||
Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions:
|
Windows Autopilot user-driven mode is designed to enable new Windows 10 devices to be transformed from their initial state, directly from the factory, into a ready-to-use state without requiring that IT personnel ever touch the device. The process is designed to be simple so that anyone can complete it, enabling devices to be shipped or distributed to the end user directly with simple instructions:
|
||||||
|
|
||||||
- Unbox the device, plug it in, and turn it on.
|
- Unbox the device, plug it in, and turn it on.
|
||||||
@ -24,21 +26,12 @@ After completing those simple steps, the remainder of the process is completely
|
|||||||
|
|
||||||
Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options.
|
Today, Windows Autopilot user-driven mode supports joining devices to Azure Active Directory. Support for Hybrid Azure Active Directory Join (with devices joined to an on-premises Active Directory domain) will be available in a future Windows 10 release. See [Introduction to device management in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/device-management-introduction) for more information about the differences between these two join options.
|
||||||
|
|
||||||
## Step by step
|
## Available user-driven modes
|
||||||
|
|
||||||
In order to perform a user-driven deployment using Windows Autopilot, the following preparation steps need to be completed:
|
The following options are available for user-driven deployment:
|
||||||
|
|
||||||
- Ensure that the users who will be performing user-driven mode deployments are able to join devices to Azure Active Directory. See [Configure device settings](https://docs.microsoft.com/azure/active-directory/device-management-azure-portal#configure-device-settings) in the Azure Active Directory documentation for more information.
|
- [Azure Active Directory join](user-driven-aad.md) is available if devices do not need to be joined to an on-prem Active Directory domain.
|
||||||
- Create an Autopilot profile for user-driven mode with the desired settings. In Microsoft Intune, this mode is explicitly chosen when creating the profile. With Microsoft Store for Business and Partner Center, user-driven mode is the default and does not need to be selected.
|
- [Hybrid Azure Active Directory join](user-driven-hybrid.md) is available for devices that must be joined to both Azure Active Directory and your on-prem Active Directory domain.
|
||||||
- If using Intune, create a device group in Azure Active Directory and assign the Autopilot profile to that group.
|
|
||||||
|
|
||||||
For each machine that will be deployed using user-driven deployment, these additional steps are needed:
|
|
||||||
|
|
||||||
- Ensure that the device has been added to Windows Autopilot. This can be done automatically by an OEM or partner at the time the device is purchased, or it can be done through a manual harvesting process later. See [Adding devices to Windows Autopilot](add-devices.md) for more information.
|
|
||||||
- Ensure an Autopilot profile has been assigned to the device:
|
|
||||||
- If using Intune and Azure Active Directory dynamic device groups, this can be done automatically.
|
|
||||||
- If using Intune and Azure Active Directory static device groups, manually add the device to the device group.
|
|
||||||
- If using other methods (e.g. Microsoft Store for Business or Partner Center), manually assign an Autopilot profile to the device.
|
|
||||||
|
|
||||||
## Validation
|
## Validation
|
||||||
|
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# [Privacy](index.yml)
|
# [Privacy](index.yml)
|
||||||
## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)
|
## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)
|
||||||
## [Windows 10 and the GDPR for IT Decision Makers](gdpr-it-guidance.md)
|
## [Windows and the GDPR: Information for IT Administrators and Decision Makers](gdpr-it-guidance.md)
|
||||||
## [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md)
|
## [Windows 10 personal data services configuration](windows-personal-data-services-configuration.md)
|
||||||
## [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md)
|
## [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md)
|
||||||
## [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md)
|
## [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md)
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
title: Windows 10 and the GDPR for IT Decision Makers
|
title: Windows and the GDPR-Information for IT Administrators and Decision Makers
|
||||||
description: Use this topic to understand the relationship between users in your organization and Microsoft in the context of the GDPR (General Data Protection Regulation).
|
description: Use this topic to understand the relationship between users in your organization and Microsoft in the context of the GDPR (General Data Protection Regulation).
|
||||||
keywords: privacy, GDPR, windows, IT
|
keywords: privacy, GDPR, windows, IT
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -11,12 +11,17 @@ author: danihalfin
|
|||||||
ms.author: daniha
|
ms.author: daniha
|
||||||
ms.date: 05/11/2018
|
ms.date: 05/11/2018
|
||||||
---
|
---
|
||||||
# Windows 10 and the GDPR for IT Decision Makers
|
# Windows and the GDPR: Information for IT Administrators and Decision Makers
|
||||||
|
|
||||||
Applies to:
|
Applies to:
|
||||||
|
- Windows 10, version 1809
|
||||||
- Windows 10, version 1803
|
- Windows 10, version 1803
|
||||||
- Windows 10, version 1709
|
- Windows 10, version 1709
|
||||||
- Windows 10, version 1703
|
- Windows 10, version 1703
|
||||||
|
- Windows 10 Team Edition, version 1703 for Surface Hub
|
||||||
|
- Windows Server 2019
|
||||||
|
- Windows Server 2016
|
||||||
|
- Windows Analytics
|
||||||
|
|
||||||
This topic provides IT Decision Makers with a basic understanding of the relationship between users in an organization and Microsoft in the context of the GDPR (General Data Protection Regulation). You will also learn what role an IT organization plays for that relationship.
|
This topic provides IT Decision Makers with a basic understanding of the relationship between users in an organization and Microsoft in the context of the GDPR (General Data Protection Regulation). You will also learn what role an IT organization plays for that relationship.
|
||||||
|
|
||||||
@ -35,7 +40,7 @@ Here are some GDPR fundamentals:
|
|||||||
* The European law establishes strict global data privacy requirements governing how organizations manage and protect personal data while respecting individual choice – no matter where data is sent, processed, or stored.
|
* The European law establishes strict global data privacy requirements governing how organizations manage and protect personal data while respecting individual choice – no matter where data is sent, processed, or stored.
|
||||||
* A request by an individual to an organization to take an action on their personal data is referred to here as a *data subject request*, or *DSR*.
|
* A request by an individual to an organization to take an action on their personal data is referred to here as a *data subject request*, or *DSR*.
|
||||||
|
|
||||||
Microsoft believes data privacy is a fundamental right, and that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We also recognize that the GDPR requires significant changes by organizations all over the world with regard to the discovery, management, protection, and reporting of personal data that is collected, processed, and stored within an organization.
|
Microsoft believes data privacy is a fundamental right, and that the GDPR is an important step forward for clarifying and enabling individual privacy rights. We also recognize that the GDPR required significant changes by organizations all over the world with regard to the discovery, management, protection, and reporting of personal data that is collected, processed, and stored within an organization.
|
||||||
|
|
||||||
### What is personal data under the GDPR?
|
### What is personal data under the GDPR?
|
||||||
|
|
||||||
@ -87,7 +92,7 @@ It is important to differentiate between two distinct types of data Windows serv
|
|||||||
A user action, such as performing a Skype call, usually triggers the collection and transmission of Windows *functional data*. Some Windows components and applications connecting to Microsoft services also exchange Windows functional data to provide user functionality.
|
A user action, such as performing a Skype call, usually triggers the collection and transmission of Windows *functional data*. Some Windows components and applications connecting to Microsoft services also exchange Windows functional data to provide user functionality.
|
||||||
|
|
||||||
Some other examples of Windows functional data:
|
Some other examples of Windows functional data:
|
||||||
* The Weather app which uses the device’s location to retrieve local weather or community news.
|
* The Weather app which can use the device’s location to retrieve local weather or community news.
|
||||||
* Wallpaper and desktop settings that are synchronized across multiple devices.
|
* Wallpaper and desktop settings that are synchronized across multiple devices.
|
||||||
|
|
||||||
For more info on how IT Professionals can manage Windows functional data sent from an organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md).
|
For more info on how IT Professionals can manage Windows functional data sent from an organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md).
|
||||||
@ -100,10 +105,10 @@ Some examples of diagnostic data include:
|
|||||||
* The type of hardware being used, information about installed apps and usage details, and reliability data on drivers running on the device.
|
* The type of hardware being used, information about installed apps and usage details, and reliability data on drivers running on the device.
|
||||||
* For users who have turned on “Tailored experiences”, it can be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for the needs of the user.
|
* For users who have turned on “Tailored experiences”, it can be used to offer personalized tips, ads, and recommendations to enhance Microsoft products and services for the needs of the user.
|
||||||
|
|
||||||
To find more about what information is collected, how it is handled, and the available Windows diagnostic data levels, see [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data) and [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md).
|
Diagnostic data is categorized into the levels "Security", "Basic", "Enhanced", and "Full". For a detailed discussion about these diagnostic data levels please see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). To find more about what information is collected and how it is handled, see [Understanding Windows diagnostic data](configure-windows-diagnostic-data-in-your-organization.md#understanding-windows-diagnostic-data).
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Other Microsoft services as well as 3rd party applications and drivers running on Windows devices may implement their own functionality, independently from Windows, to transport their diagnostic data to the respective publisher. Please contact them for further guidance on how to control the diagnostic data collection level and transmission of these publishers.
|
>Other Microsoft services as well as 3rd party applications and drivers running on Windows devices may implement their own functionality, independently from Windows, to transport their diagnostic data. Please contact the publisher for further guidance on how to control the diagnostic data collection level and transmission of these applications and services.
|
||||||
|
|
||||||
### Windows services where Microsoft is the processor under the GDPR
|
### Windows services where Microsoft is the processor under the GDPR
|
||||||
|
|
||||||
@ -123,7 +128,7 @@ As a result, in terms of the GDPR, the organization that has subscribed to Windo
|
|||||||
>The IT organization must explicitly enable Windows Analytics for a device after the organization subscribes.
|
>The IT organization must explicitly enable Windows Analytics for a device after the organization subscribes.
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Windows Analytics does not collect Windows Diagnostic data by itself. Instead, Windows Analytics only uses a subset of Windows Diagnostic data that is collected by Windows for a particular device. The Windows Diagnostic data collection is controlled by the IT department of an organization or the user of a device.
|
>Windows Analytics does not collect Windows Diagnostic data by itself. Instead, Windows Analytics only uses a subset of Windows Diagnostic data that is collected by Windows for an enrolled device. The Windows Diagnostic data collection is controlled by the IT department of an organization or the user of a device.
|
||||||
|
|
||||||
#### Windows Defender ATP
|
#### Windows Defender ATP
|
||||||
|
|
||||||
@ -140,27 +145,43 @@ The following table lists in what GDPR mode – controller or processor – Wind
|
|||||||
|
|
||||||
| Service | Microsoft GDPR mode of operation |
|
| Service | Microsoft GDPR mode of operation |
|
||||||
| --- | --- |
|
| --- | --- |
|
||||||
| Windows Functional data | Controller |
|
| Windows Functional data | Controller or Processor* |
|
||||||
| Windows Diagnostic data | Controller |
|
| Windows Diagnostic data | Controller |
|
||||||
| Windows Analytics | Processor |
|
| Windows Analytics | Processor |
|
||||||
| Windows Defender Advanced Threat Detection (ATP) | Processor |
|
| Windows Defender Advanced Threat Detection (ATP) | Processor |
|
||||||
|
|
||||||
*Table 1: Windows 10 GDPR modes of operations for different Windows 10 services*
|
*Table 1: Windows 10 GDPR modes of operations for different Windows 10 services*
|
||||||
|
|
||||||
## Recommended diagnostic data level settings
|
*/*Depending on which application/feature this is referring to.*
|
||||||
|
|
||||||
Windows diagnostic data collection level can be set by a user in Windows (*Start > Settings > Privacy > Diagnostics & feedback*) or by the IT department of an organization, using Group Policy or Mobile Device Management (MDM) techniques.
|
## Windows diagnostic data and Windows 10
|
||||||
|
|
||||||
* For Windows 10, version 1803, Microsoft recommends setting the Windows diagnostic level to “Enhanced”. This enables organizations to get the full functionality of [Windows Analytics](#windows-analytics). Those organizations who wish to share the smallest set of events for Windows Analytics can use the “Limit Enhanced diagnostic data to the minimum required by Windows Analytics” filtering mechanism that Microsoft introduced in Windows 10, version 1709. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by Windows Analytics.
|
|
||||||
|
### Recommended Windows 10 settings
|
||||||
|
|
||||||
|
Windows diagnostic data collection level for Windows 10 can be set by a user in Windows (*Start > Settings > Privacy > Diagnostics & feedback*) or by the IT department of an organization, using Group Policy or Mobile Device Management (MDM) techniques.
|
||||||
|
|
||||||
|
* For Windows 10, version 1803 and version 1809, Microsoft recommends setting the Windows diagnostic level to “Enhanced”. This enables organizations to get the full functionality of [Windows Analytics](#windows-analytics).
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md).
|
>For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md).
|
||||||
|
|
||||||
* For Windows 10, version 1709, and Windows 10, version 1703, the recommended Windows diagnostic level configuration for EEA and Switzerland commercial users is “Basic”.
|
* For Windows 10, version 1709, and Windows 10, version 1703, the recommended Windows diagnostic level configuration for EEA and Switzerland commercial users is “Basic”.
|
||||||
|
|
||||||
* For Windows 7, Microsoft recommends configuring enterprise devices for Windows Analytics to facilitate upgrade planning to Windows 10.
|
>[!NOTE]
|
||||||
|
>For Windows 7, Microsoft recommends [configuring enterprise devices for Windows Analytics](/windows/deployment/update/windows-analytics-get-started) to facilitate upgrade planning to Windows 10.
|
||||||
|
|
||||||
## Controlling the data collection and notification about it
|
### Additional information for Windows Analytics
|
||||||
|
|
||||||
|
Some Windows Analytics solutions and functionality, such as Update Compliance, works with “Basic” as minimum Windows diagnostic level. Other solutions and functionality of Windows Analytics, such as Device Health, require “Enhanced”.
|
||||||
|
|
||||||
|
Those organizations who wish to share the smallest set of events for Windows Analytics and have set the Windows diagnostic level to “Enhanced” can use the “Limit Enhanced diagnostic data to the minimum required by Windows Analytics” setting. This filtering mechanism was that Microsoft introduced in Windows 10, version 1709. When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to the smallest set of data required by Windows Analytics.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Additional information can be found at [Windows Analytics and privacy](/windows/deployment/update/windows-analytics-privacy
|
||||||
|
).
|
||||||
|
|
||||||
|
## Controlling Windows 10 data collection and notification about it
|
||||||
|
|
||||||
Windows 10 sends diagnostic data to Microsoft services, and some of that data can contain personal data. Both the user and the IT organization have the ability to control the transmission of that data to Microsoft.
|
Windows 10 sends diagnostic data to Microsoft services, and some of that data can contain personal data. Both the user and the IT organization have the ability to control the transmission of that data to Microsoft.
|
||||||
|
|
||||||
@ -200,10 +221,38 @@ IT Professionals that are interested in this configuration, see [Windows 10 pers
|
|||||||
|
|
||||||
To find out more about the network connections that Windows components make to Microsoft as well as the privacy settings that affect data shared with either Microsoft or apps, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) and [Manage Windows 10 connection endpoints](manage-windows-endpoints.md). These articles describe how these settings can be managed by an IT Professional.
|
To find out more about the network connections that Windows components make to Microsoft as well as the privacy settings that affect data shared with either Microsoft or apps, see [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) and [Manage Windows 10 connection endpoints](manage-windows-endpoints.md). These articles describe how these settings can be managed by an IT Professional.
|
||||||
|
|
||||||
## At-a-glance: the relationship between an IT organization and the GDPR
|
### At-a-glance: the relationship between an IT organization and the GDPR
|
||||||
|
|
||||||
Because Microsoft is a controller for data collected by Windows 10, the user can work with Microsoft to satisfy GDPR requirements. While this relationship between Microsoft and a user is evident in a consumer scenario, an IT organization can influence that relationship in an enterprise scenario. For example, the IT organization has the ability to centrally configure the Windows diagnostic data level by using Group Policy or MDM settings.
|
Because Microsoft is a controller for data collected by Windows 10, the user can work with Microsoft to satisfy GDPR requirements. While this relationship between Microsoft and a user is evident in a consumer scenario, an IT organization can influence that relationship in an enterprise scenario. For example, the IT organization has the ability to centrally configure the Windows diagnostic data level by using Group Policy or MDM settings.
|
||||||
|
|
||||||
|
## Windows Server
|
||||||
|
|
||||||
|
Windows Server follows the same mechanisms as Windows 10 for handling of personal data – for example, when collecting Windows diagnostic data.
|
||||||
|
|
||||||
|
More detailed information about Windows Server and the GDPR is available at Beginning your General Data Protection Regulation (GDPR) journey for Windows Server.
|
||||||
|
|
||||||
|
### Windows diagnostic data and Windows Server
|
||||||
|
|
||||||
|
The lowest diagnostic data setting level supported on Windows Server 2016 and Windows Server 2019 through management policies is “Security”. The lowest diagnostic data setting supported through the Settings UI is “Basic”. The default diagnostic data level for all Windows Server 2016 and Windows Server 2019 editions is “Enhanced”.
|
||||||
|
|
||||||
|
IT administrators can configure the Windows Server diagnostic data settings using familiar management tools, such as Group Policy, MDM, or Windows Provisioning. IT administrators can also manually change settings using Registry Editor. Setting the Windows Server diagnostic data levels through a management policy overrides any device-level settings.
|
||||||
|
|
||||||
|
### Backups and Windows Server
|
||||||
|
|
||||||
|
Backups, including live backups and backups that are stored locally within an organization or in the cloud, can contain personal data.
|
||||||
|
|
||||||
|
- Backups an organizations creates, for example by using Windows Server Backup (WSB), are under its control. For example, for exporting personal data contained in a backup, the organization needs to restore the appropriate backup sets to facilitate the respective data subject request (DSR).
|
||||||
|
- The GDPR also applies when storing backups in the cloud. For example, an organization can use Microsoft Azure Backup to backup files and folders from physical or virtual Windows Server machines (located on-premises or in Azure) to the cloud. The organization that is subscribed to this backup service also has the obligation to restore the data in order to exercise the respective DSR.
|
||||||
|
|
||||||
|
## Windows 10 Team Edition, Version 1703 for Surface Hub
|
||||||
|
|
||||||
|
Surface Hub is a shared device used within an organization. The device identifier collected as part of diagnostic data is not connected to a user. For removing Windows diagnostic data sent to Microsoft for a Surface Hub, Microsoft created the Surface Hub Delete Diagnostic Data tool available in the Microsoft Store.
|
||||||
|
|
||||||
|
>[!NOTE]
|
||||||
|
>Additional apps running on the device, that are not delivered as part of the in-box experience of Surface Hub, may implement their own diagnostic data collection and transmission functionality independently to collect and process personal data. Please contact the app publisher for further guidance on how to control this.
|
||||||
|
|
||||||
|
An IT administrator can configure privacy- related settings, such as setting the Windows diagnostic data level to Basic. Surface Hub does not support group policy for centralized management; however, IT administrators can use MDM to apply these settings to Surface Hub. For more information about Surface Hub and MDM, please see [Manage settings with an MDM provider](https://docs.microsoft.com/surface-hub/manage-settings-with-mdm-for-surface-hub).
|
||||||
|
|
||||||
## Further reading
|
## Further reading
|
||||||
|
|
||||||
### Optional settings / features that further improve the protection of personal data
|
### Optional settings / features that further improve the protection of personal data
|
||||||
@ -215,11 +264,11 @@ Personal data protection is one of the goals of the GDPR. One way of improving p
|
|||||||
|
|
||||||
### Windows Security Baselines
|
### Windows Security Baselines
|
||||||
|
|
||||||
Microsoft has created Windows Security Baselines to efficiently configure Windows 10. For more information, please visit [Windows Security Baselines](/windows/security/threat-protection/windows-security-baselines).
|
Microsoft has created Windows Security Baselines to efficiently configure Windows 10 and Windows Server. For more information, please visit [Windows Security Baselines](/windows/security/threat-protection/windows-security-baselines).
|
||||||
|
|
||||||
### Windows Restricted Traffic Limited Functionality Baseline
|
### Windows Restricted Traffic Limited Functionality Baseline
|
||||||
|
|
||||||
To make it easier to deploy settings that restrict connections from Windows 10 to Microsoft, IT Professionals can apply the Windows Restricted Traffic Limited Functionality Baseline, available [here](https://go.microsoft.com/fwlink/?linkid=828887).
|
To make it easier to deploy settings that restrict connections from Windows 10 and Windows Server to Microsoft, IT Professionals can apply the Windows Restricted Traffic Limited Functionality Baseline, available [here](https://go.microsoft.com/fwlink/?linkid=828887).
|
||||||
|
|
||||||
>[!IMPORTANT]
|
>[!IMPORTANT]
|
||||||
>Some of the settings of the Windows Restricted Traffic Limited Functionality Baseline will reduce the functionality and security configuration of a device in the organization and are therefore not recommended.
|
>Some of the settings of the Windows Restricted Traffic Limited Functionality Baseline will reduce the functionality and security configuration of a device in the organization and are therefore not recommended.
|
||||||
|
@ -18,6 +18,7 @@ ms.date: 06/05/2018
|
|||||||
|
|
||||||
- Windows 10 Enterprise, version 1607 and newer
|
- Windows 10 Enterprise, version 1607 and newer
|
||||||
- Windows Server 2016
|
- Windows Server 2016
|
||||||
|
- Windows Server 2019
|
||||||
|
|
||||||
If you're looking for content on what each diagnostic data level means and how to configure it in your organization, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md).
|
If you're looking for content on what each diagnostic data level means and how to configure it in your organization, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md).
|
||||||
|
|
||||||
@ -43,6 +44,12 @@ Note that **Get Help** and **Give us Feedback** links no longer work after the W
|
|||||||
|
|
||||||
We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com.
|
We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com.
|
||||||
|
|
||||||
|
## What's new in Windows 10, version 1809 Enterprise edition
|
||||||
|
|
||||||
|
Here's a list of changes that were made to this article for Windows 10, version 1809:
|
||||||
|
|
||||||
|
- Added a policy to disable Windows Defender SmartScreen
|
||||||
|
|
||||||
## What's new in Windows 10, version 1803 Enterprise edition
|
## What's new in Windows 10, version 1803 Enterprise edition
|
||||||
|
|
||||||
Here's a list of changes that were made to this article for Windows 10, version 1803:
|
Here's a list of changes that were made to this article for Windows 10, version 1803:
|
||||||
@ -99,19 +106,19 @@ The following table lists management options for each setting, beginning with Wi
|
|||||||
|
|
||||||
| Setting | UI | Group Policy | MDM policy | Registry | Command line |
|
| Setting | UI | Group Policy | MDM policy | Registry | Command line |
|
||||||
| - | :-: | :-: | :-: | :-: | :-: |
|
| - | :-: | :-: | :-: | :-: | :-: |
|
||||||
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | |  | | | |
|
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | |  | |  | |
|
||||||
| [2. Cortana and Search](#bkmk-cortana) |  |  |  |  | |
|
| [2. Cortana and Search](#bkmk-cortana) |  |  |  |  | |
|
||||||
| [3. Date & Time](#bkmk-datetime) |  |  | |  | |
|
| [3. Date & Time](#bkmk-datetime) |  |  | |  | |
|
||||||
| [4. Device metadata retrieval](#bkmk-devinst) | |  | |  | |
|
| [4. Device metadata retrieval](#bkmk-devinst) | |  |  |  | |
|
||||||
| [5. Find My Device](#find-my-device) | |  | | | |
|
| [5. Find My Device](#find-my-device) |  |  | |  | |
|
||||||
| [6. Font streaming](#font-streaming) | |  | |  | |
|
| [6. Font streaming](#font-streaming) | |  |  |  | |
|
||||||
| [7. Insider Preview builds](#bkmk-previewbuilds) |  |  |  |  | |
|
| [7. Insider Preview builds](#bkmk-previewbuilds) |  |  |  |  | |
|
||||||
| [8. Internet Explorer](#bkmk-ie) |  |  | |  | |
|
| [8. Internet Explorer](#bkmk-ie) |  |  | |  | |
|
||||||
| [9. Live Tiles](#live-tiles) | |  | |  | |
|
| [9. Live Tiles](#live-tiles) | |  | |  | |
|
||||||
| [10. Mail synchronization](#bkmk-mailsync) |  | |  |  | |
|
| [10. Mail synchronization](#bkmk-mailsync) |  | |  |  | |
|
||||||
| [11. Microsoft Account](#bkmk-microsoft-account) | |  |  |  | |
|
| [11. Microsoft Account](#bkmk-microsoft-account) | |  |  |  | |
|
||||||
| [12. Microsoft Edge](#bkmk-edge) |  |  |  |  | |
|
| [12. Microsoft Edge](#bkmk-edge) |  |  |  |  | |
|
||||||
| [13. Network Connection Status Indicator](#bkmk-ncsi) | |  | |  | |
|
| [13. Network Connection Status Indicator](#bkmk-ncsi) | |  |  |  | |
|
||||||
| [14. Offline maps](#bkmk-offlinemaps) |  |  | |  | |
|
| [14. Offline maps](#bkmk-offlinemaps) |  |  | |  | |
|
||||||
| [15. OneDrive](#bkmk-onedrive) | |  | |  | |
|
| [15. OneDrive](#bkmk-onedrive) | |  | |  | |
|
||||||
| [16. Preinstalled apps](#bkmk-preinstalledapps) |  | | | |  |
|
| [16. Preinstalled apps](#bkmk-preinstalledapps) |  | | | |  |
|
||||||
@ -142,6 +149,7 @@ The following table lists management options for each setting, beginning with Wi
|
|||||||
| [21. Teredo](#bkmk-teredo) | |  | |  |  |
|
| [21. Teredo](#bkmk-teredo) | |  | |  |  |
|
||||||
| [22. Wi-Fi Sense](#bkmk-wifisense) |  |  | |  | |
|
| [22. Wi-Fi Sense](#bkmk-wifisense) |  |  | |  | |
|
||||||
| [23. Windows Defender](#bkmk-defender) | |  |  |  | |
|
| [23. Windows Defender](#bkmk-defender) | |  |  |  | |
|
||||||
|
| [23.1 Windows Defender Smartscreen](#bkmk-defender-smartscreen) | |  |  |  | |
|
||||||
| [24. Windows Media Player](#bkmk-wmp) |  | | | |  |
|
| [24. Windows Media Player](#bkmk-wmp) |  | | | |  |
|
||||||
| [25. Windows Spotlight](#bkmk-spotlight) |  |  |  |  | |
|
| [25. Windows Spotlight](#bkmk-spotlight) |  |  |  |  | |
|
||||||
| [26. Microsoft Store](#bkmk-windowsstore) | |  | |  | |
|
| [26. Microsoft Store](#bkmk-windowsstore) | |  | |  | |
|
||||||
@ -202,6 +210,63 @@ See the following table for a summary of the management settings for Windows Ser
|
|||||||
| [21. Teredo](#bkmk-teredo) | |  |
|
| [21. Teredo](#bkmk-teredo) | |  |
|
||||||
| [28. Windows Update](#bkmk-wu) |  | |
|
| [28. Windows Update](#bkmk-wu) |  | |
|
||||||
|
|
||||||
|
### Settings for Windows Server 2019
|
||||||
|
|
||||||
|
See the following table for a summary of the management settings for Windows Server 2019.
|
||||||
|
|
||||||
|
| Setting | UI | Group Policy | MDM policy | Registry | Command line |
|
||||||
|
| - | :-: | :-: | :-: | :-: | :-: |
|
||||||
|
| [1. Automatic Root Certificates Update](#automatic-root-certificates-update) | |  | |  | |
|
||||||
|
| [2. Cortana and Search](#bkmk-cortana) |  |  |  |  | |
|
||||||
|
| [3. Date & Time](#bkmk-datetime) |  |  | |  | |
|
||||||
|
| [4. Device metadata retrieval](#bkmk-devinst) | |  |  |  | |
|
||||||
|
| [5. Find My Device](#find-my-device) |  |  | |  | |
|
||||||
|
| [6. Font streaming](#font-streaming) | |  |  |  | |
|
||||||
|
| [7. Insider Preview builds](#bkmk-previewbuilds) |  |  |  |  | |
|
||||||
|
| [8. Internet Explorer](#bkmk-ie) |  |  | |  | |
|
||||||
|
| [9. Live Tiles](#live-tiles) | |  | |  | |
|
||||||
|
| [10. Mail synchronization](#bkmk-mailsync) |  | |  |  | |
|
||||||
|
| [11. Microsoft Account](#bkmk-microsoft-account) | |  |  |  | |
|
||||||
|
| [12. Microsoft Edge](#bkmk-edge) |  |  |  |  | |
|
||||||
|
| [13. Network Connection Status Indicator](#bkmk-ncsi) | |  |  |  | |
|
||||||
|
| [14. Offline maps](#bkmk-offlinemaps) |  |  | |  | |
|
||||||
|
| [15. OneDrive](#bkmk-onedrive) | |  | |  | |
|
||||||
|
| [16. Preinstalled apps](#bkmk-preinstalledapps) |  | | | |  |
|
||||||
|
| [17. Settings > Privacy](#bkmk-settingssection) | | | | | |
|
||||||
|
| [17.1 General](#bkmk-general) |  |  |  |  | |
|
||||||
|
| [17.2 Location](#bkmk-priv-location) |  |  |  |  | |
|
||||||
|
| [17.3 Camera](#bkmk-priv-camera) |  |  |  |  | |
|
||||||
|
| [17.4 Microphone](#bkmk-priv-microphone) |  |  |  |  | |
|
||||||
|
| [17.5 Notifications](#bkmk-priv-notifications) |  |  | |  | |
|
||||||
|
| [17.6 Speech, inking, & typing](#bkmk-priv-speech) |  |  |  |  | |
|
||||||
|
| [17.7 Account info](#bkmk-priv-accounts) |  |  |  |  | |
|
||||||
|
| [17.8 Contacts](#bkmk-priv-contacts) |  |  |  |  | |
|
||||||
|
| [17.9 Calendar](#bkmk-priv-calendar) |  |  |  |  | |
|
||||||
|
| [17.10 Call history](#bkmk-priv-callhistory) |  |  |  |  | |
|
||||||
|
| [17.11 Email](#bkmk-priv-email) |  |  |  |  | |
|
||||||
|
| [17.12 Messaging](#bkmk-priv-messaging) |  |  |  |  | |
|
||||||
|
| [17.13 Phone calls](#bkmk-priv-phone-calls) |  |  |  |  | |
|
||||||
|
| [17.14 Radios](#bkmk-priv-radios) |  |  |  |  | |
|
||||||
|
| [17.15 Other devices](#bkmk-priv-other-devices) |  |  |  |  | |
|
||||||
|
| [17.16 Feedback & diagnostics](#bkmk-priv-feedback) |  |  |  |  | |
|
||||||
|
| [17.17 Background apps](#bkmk-priv-background) |  |  |  | | |
|
||||||
|
| [17.18 Motion](#bkmk-priv-motion) |  |  |  |  | |
|
||||||
|
| [17.19 Tasks](#bkmk-priv-tasks) |  |  |  |  | |
|
||||||
|
| [17.20 App Diagnostics](#bkmk-priv-diag) |  |  |  |  | |
|
||||||
|
| [18. Software Protection Platform](#bkmk-spp) | |  |  |  | |
|
||||||
|
| [19. Storage Health](#bkmk-storage-health) | |  | | | |
|
||||||
|
| [20. Sync your settings](#bkmk-syncsettings) |  |  |  |  | |
|
||||||
|
| [21. Teredo](#bkmk-teredo) | |  | |  |  |
|
||||||
|
| [22. Wi-Fi Sense](#bkmk-wifisense) |  |  | |  | |
|
||||||
|
| [23. Windows Defender](#bkmk-defender) | |  |  |  | |
|
||||||
|
| [23.1 Windows Defender Smartscreen](#bkmk-defender-smartscreen) | |  |  |  | |
|
||||||
|
| [24. Windows Media Player](#bkmk-wmp) |  | | | |  |
|
||||||
|
| [25. Windows Spotlight](#bkmk-spotlight) |  |  |  |  | |
|
||||||
|
| [26. Microsoft Store](#bkmk-windowsstore) | |  | |  | |
|
||||||
|
| [26.1 Apps for websites](#bkmk-apps-for-websites) | |  | | |
|
||||||
|
| [27. Windows Update Delivery Optimization](#bkmk-updates) |  |  |  |  | |
|
||||||
|
| [28. Windows Update](#bkmk-wu) |  |  |  | | |
|
||||||
|
|
||||||
## How to configure each setting
|
## How to configure each setting
|
||||||
|
|
||||||
Use the following sections for more information about how to configure each setting.
|
Use the following sections for more information about how to configure each setting.
|
||||||
@ -336,9 +401,17 @@ After that, configure the following:
|
|||||||
|
|
||||||
### <a href="" id="bkmk-devinst"></a>4. Device metadata retrieval
|
### <a href="" id="bkmk-devinst"></a>4. Device metadata retrieval
|
||||||
|
|
||||||
To prevent Windows from retrieving device metadata from the Internet, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Device Installation** > **Prevent device metadata retrieval from the Internet**.
|
To prevent Windows from retrieving device metadata from the Internet:
|
||||||
|
|
||||||
You can also create a new REG\_DWORD registry setting named **PreventDeviceMetadataFromNetwork** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Device Metadata** and set it to 1 (one).
|
- Apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Device Installation** > **Prevent device metadata retrieval from the Internet**.
|
||||||
|
|
||||||
|
-or -
|
||||||
|
|
||||||
|
- Create a new REG\_DWORD registry setting named **PreventDeviceMetadataFromNetwork** in **HKEY\_LOCAL\_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\Device Metadata** and set it to 1 (one).
|
||||||
|
|
||||||
|
-or -
|
||||||
|
|
||||||
|
- Apply the DeviceInstallation/PreventDeviceMetadataFromNetwork MDM policy from the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-deviceinstallation#deviceinstallation-preventdevicemetadatafromnetwork).
|
||||||
|
|
||||||
### <a href="" id="find-my-device"></a>5. Find My Device
|
### <a href="" id="find-my-device"></a>5. Find My Device
|
||||||
|
|
||||||
@ -608,7 +681,7 @@ You can turn off NCSI by doing one of the following:
|
|||||||
|
|
||||||
- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication Settings** > **Turn off Windows Network Connectivity Status Indicator active tests**
|
- Enable the Group Policy: **Computer Configuration** > **Administrative Templates** > **System** > **Internet Communication Management** > **Internet Communication Settings** > **Turn off Windows Network Connectivity Status Indicator active tests**
|
||||||
|
|
||||||
- In Windows 10, version 1703 and later, apply the Connectivity/DisallowNetworkConnectivityActiveTests MDM policy.
|
- In Windows 10, version 1703 and later, apply the Connectivity/DisallowNetworkConnectivityActiveTests MDM policy from the [Policy CSP](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-connectivity#connectivity-disallownetworkconnectivityactivetests) with a value of 1.
|
||||||
|
|
||||||
> [!NOTE]
|
> [!NOTE]
|
||||||
> After you apply this policy, you must restart the device for the policy setting to take effect.
|
> After you apply this policy, you must restart the device for the policy setting to take effect.
|
||||||
@ -879,31 +952,13 @@ To turn off **Turn on SmartScreen Filter to check web content (URLs) that Micros
|
|||||||
|
|
||||||
-or-
|
-or-
|
||||||
|
|
||||||
- In Windows Server 2016, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Edge** > **Configure SmartScreen Filter**.
|
|
||||||
In Windows 10, version 1703, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Edge** > **Configure Windows Defender SmartScreen Filter**.
|
|
||||||
|
|
||||||
In Windows Server 2016, apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **File Explorer** > **Configure Windows SmartScreen**.
|
|
||||||
In Windows 10, version 1703 , apply the Group Policy: **Computer Configuration** > **Administrative Templates** > **Windows Components** > **File Explorer** > **Configure Windows Defender SmartScreen**.
|
|
||||||
|
|
||||||
-or-
|
|
||||||
|
|
||||||
- Apply the Browser/AllowSmartScreen MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on.
|
|
||||||
|
|
||||||
-or-
|
|
||||||
|
|
||||||
- Create a provisioning package, using:
|
- Create a provisioning package, using:
|
||||||
|
- For Internet Explorer: **Runtime settings > Policies > Browser > AllowSmartScreen**
|
||||||
- For Internet Explorer: **Runtime settings** > **Policies** > **Browser** > **AllowSmartScreen**
|
- For Microsoft Edge: **Runtime settings > Policies > MicrosoftEdge > AllowSmartScreen**
|
||||||
|
|
||||||
- For Microsoft Edge: **Runtime settings** > **Policies** > **MicrosoftEdge** > **AllowSmartScreen**
|
|
||||||
|
|
||||||
-or-
|
-or-
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **EnableWebContentEvaluation** in **HKEY\_CURRENT\_USER\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\AppHost** with a value of 0 (zero).
|
- Create a REG_DWORD registry setting named **EnableWebContentEvaluation** in **HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost** with a value of 0 (zero).
|
||||||
|
|
||||||
-or-
|
|
||||||
|
|
||||||
- Create a REG\_DWORD registry setting named **EnableSmartScreen** in **HKEY\_LOCAL\_MACHINE\\Sofware\\Policies\\Microsoft\\Windows\\System** with a value of 0 (zero).
|
|
||||||
|
|
||||||
To turn off **Send Microsoft info about how I write to help us improve typing and writing in the future**:
|
To turn off **Send Microsoft info about how I write to help us improve typing and writing in the future**:
|
||||||
|
|
||||||
@ -1793,6 +1848,36 @@ For Windows 10 only, you can stop Enhanced Notifications:
|
|||||||
|
|
||||||
You can also use the registry to turn off Malicious Software Reporting Tool diagnostic data by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1.
|
You can also use the registry to turn off Malicious Software Reporting Tool diagnostic data by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1.
|
||||||
|
|
||||||
|
### <a href="" id="bkmk-defender-smartscreen"></a>23.1 Windows Defender SmartScreen
|
||||||
|
|
||||||
|
To disable Windows Defender Smartscreen:
|
||||||
|
|
||||||
|
- In Group Policy, configure - **Computer Configuration > Administrative Templates > Windows Components > Windows Defender SmartScreen > Explorer > Configure Windows Defender SmartScreen** : **Disable**
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- **Computer Configuration > Administrative Templates > Windows Components > File Explorer > Configure Windows Defender SmartScreen** : **Disable**
|
||||||
|
|
||||||
|
-and-
|
||||||
|
|
||||||
|
- **Computer Configuration > Administrative Templates > Windows Components > Windows Defender SmartScreen > Explorer > Configure app install control** : **Enable**
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- Create a REG_DWORD registry setting named **EnableSmartScreen** in **HKEY_LOCAL_MACHINE\Sofware\Policies\Microsoft\Windows\System** with a value of 0 (zero).
|
||||||
|
|
||||||
|
-and-
|
||||||
|
|
||||||
|
- Create a REG_DWORD registry setting named **ConfigureAppInstallControlEnabled** in **HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen** with a value of 1.
|
||||||
|
|
||||||
|
-and-
|
||||||
|
|
||||||
|
- Create a SZ registry setting named **ConfigureAppInstallControl** in **HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\SmartScreen** with a value of **Anywhere**.
|
||||||
|
|
||||||
|
-or-
|
||||||
|
|
||||||
|
- Apply the Browser/AllowSmartScreen MDM policy from the [Policy CSP](https://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) where 0 is turned off and 1 is turned on.
|
||||||
|
|
||||||
### <a href="" id="bkmk-wmp"></a>24. Windows Media Player
|
### <a href="" id="bkmk-wmp"></a>24. Windows Media Player
|
||||||
|
|
||||||
To remove Windows Media Player on Windows 10:
|
To remove Windows Media Player on Windows 10:
|
||||||
|
@ -145,13 +145,9 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper
|
|||||||
|
|
||||||
## Certificates
|
## Certificates
|
||||||
|
|
||||||
The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to [turn off traffic to this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update), but that is not recommended because when root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses.
|
The following endpoint is used by the Automatic Root Certificates Update component to automatically check the list of trusted authorities on Windows Update to see if an update is available. It is possible to [turn off traffic to this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#automatic-root-certificates-update), but that is not recommended because when root certificates are updated over time, applications and websites may stop working because they did not receive an updated root certificate the application uses.
|
||||||
|
|
||||||
| Source process | Protocol | Destination | Applies from Windows 10 version |
|
Additionally, it is used to download certificates that are publicly known to be fraudulent.
|
||||||
|----------------|----------|------------|----------------------------------|
|
|
||||||
| svchost | HTTP | ctldl.windowsupdate.com | 1709 |
|
|
||||||
|
|
||||||
The following endpoints are used to download certificates that are publicly known to be fraudulent.
|
|
||||||
These settings are critical for both Windows security and the overall security of the Internet.
|
These settings are critical for both Windows security and the overall security of the Internet.
|
||||||
We do not recommend blocking this endpoint.
|
We do not recommend blocking this endpoint.
|
||||||
If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.
|
If traffic to this endpoint is turned off, Windows no longer automatically downloads certificates known to be fraudulent, which increases the attack vector on the device.
|
||||||
|
@ -8,7 +8,7 @@ ms.mktglfcycl: explore
|
|||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.pagetype: security
|
ms.pagetype: security
|
||||||
ms.author: justinha
|
ms.author: justinha
|
||||||
ms.date: 06/18/2018
|
ms.date: 11/08/2018
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -24,6 +24,10 @@ With the increase of employee-owned devices in the enterprise, there’s also an
|
|||||||
|
|
||||||
Windows Information Protection (WIP), previously known as enterprise data protection (EDP), helps to protect against this potential data leakage without otherwise interfering with the employee experience. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps. Finally, another data protection technology, Azure Rights Management also works alongside WIP to extend data protection for data that leaves the device, such as when email attachments are sent from an enterprise aware version of a rights management mail client.
|
Windows Information Protection (WIP), previously known as enterprise data protection (EDP), helps to protect against this potential data leakage without otherwise interfering with the employee experience. WIP also helps to protect enterprise apps and data against accidental data leak on enterprise-owned devices and personal devices that employees bring to work without requiring changes to your environment or other apps. Finally, another data protection technology, Azure Rights Management also works alongside WIP to extend data protection for data that leaves the device, such as when email attachments are sent from an enterprise aware version of a rights management mail client.
|
||||||
|
|
||||||
|
## Video: Protect enterprise data from being accidentally copied to the wrong place
|
||||||
|
|
||||||
|
> [!Video https://www.microsoft.com/en-us/videoplayer/embed/RE2IGhh]
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
You’ll need this software to run WIP in your enterprise:
|
You’ll need this software to run WIP in your enterprise:
|
||||||
|
|
||||||
|
@ -186,7 +186,7 @@
|
|||||||
### [Configure and manage capabilities](windows-defender-atp/onboard.md)
|
### [Configure and manage capabilities](windows-defender-atp/onboard.md)
|
||||||
#### [Configure attack surface reduction](windows-defender-atp/configure-attack-surface-reduction.md)
|
#### [Configure attack surface reduction](windows-defender-atp/configure-attack-surface-reduction.md)
|
||||||
##### [Hardware-based isolation](windows-defender-application-guard/install-wd-app-guard.md)
|
##### [Hardware-based isolation](windows-defender-application-guard/install-wd-app-guard.md)
|
||||||
###### [Confguration settings](windows-defender-application-guard/configure-wd-app-guard.md)
|
###### [Configuration settings](windows-defender-application-guard/configure-wd-app-guard.md)
|
||||||
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
##### [Application control](windows-defender-application-control/windows-defender-application-control.md)
|
||||||
##### [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
##### [Device control](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md)
|
||||||
###### [Memory integrity](windows-defender-exploit-guard/memory-integrity.md)
|
###### [Memory integrity](windows-defender-exploit-guard/memory-integrity.md)
|
||||||
|
@ -63,8 +63,8 @@ To further reinforce the security perimeter of your network, Windows Defender AT
|
|||||||
|
|
||||||
<a name="edr"></a>
|
<a name="edr"></a>
|
||||||
|
|
||||||
**[Endpoint protection and response](windows-defender-atp/overview-endpoint-detection-response.md)**<br>
|
**[Endpoint detection and response](windows-defender-atp/overview-endpoint-detection-response.md)**<br>
|
||||||
Endpoint protection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
||||||
|
|
||||||
- [Alerts](windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md)
|
- [Alerts](windows-defender-atp/alerts-queue-windows-defender-advanced-threat-protection.md)
|
||||||
- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline)
|
- [Historical endpoint data](windows-defender-atp/investigate-machines-windows-defender-advanced-threat-protection.md#machine-timeline)
|
||||||
|
@ -1,14 +1,14 @@
|
|||||||
---
|
---
|
||||||
title: Top scoring in industry antivirus tests
|
title: Top scoring in industry antivirus tests
|
||||||
description: Windows Defender Antivirus consistently achieves high scores in independent tests. View the latest scores and analysis.
|
description: Windows Defender Antivirus consistently achieves high scores in independent tests. View the latest scores and analysis.
|
||||||
keywords: security, malware, av-comparatives, av-test, av, antivirus
|
keywords: security, malware, av-comparatives, av-test, av, antivirus, windows, defender, scores
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
ms.mktglfcycl: secure
|
ms.mktglfcycl: secure
|
||||||
ms.sitesec: library
|
ms.sitesec: library
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.author: ellevin
|
ms.author: ellevin
|
||||||
author: levinec
|
author: levinec
|
||||||
ms.date: 09/05/2018
|
ms.date: 11/07/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Top scoring in industry antivirus tests
|
# Top scoring in industry antivirus tests
|
||||||
@ -18,18 +18,16 @@ ms.date: 09/05/2018
|
|||||||
We want to be transparent and have gathered top industry reports that demonstrate our enterprise antivirus capabilities. Note that these tests only provide results for antivirus and do not test for additional security protections.
|
We want to be transparent and have gathered top industry reports that demonstrate our enterprise antivirus capabilities. Note that these tests only provide results for antivirus and do not test for additional security protections.
|
||||||
|
|
||||||
In the real world, millions of devices are protected from cyberattacks every day, sometimes [milliseconds after a campaign starts](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign?ocid=cx-docs-avreports). Windows Defender Antivirus is part of the [next generation](https://www.youtube.com/watch?v=Xy3MOxkX_o4) Windows Defender Advanced Threat Protection ([Windows Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports)) security stack which addresses the latest and most sophisticated threats today. In many cases, customers might not even know they were protected. That's because Windows Defender Antivirus detects and stops malware at first sight by using [machine learning](https://cloudblogs.microsoft.com/microsoftsecure/2018/06/07/machine-learning-vs-social-engineering?ocid=cx-docs-avreports), [artificial intelligence](https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak?ocid=cx-docs-avreports), behavioral analysis, and other advanced technologies.
|
In the real world, millions of devices are protected from cyberattacks every day, sometimes [milliseconds after a campaign starts](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/07/behavior-monitoring-combined-with-machine-learning-spoils-a-massive-dofoil-coin-mining-campaign?ocid=cx-docs-avreports). Windows Defender Antivirus is part of the [next generation](https://www.youtube.com/watch?v=Xy3MOxkX_o4) Windows Defender Advanced Threat Protection ([Windows Defender ATP](https://www.microsoft.com/WindowsForBusiness/windows-atp?ocid=cx-docs-avreports)) security stack which addresses the latest and most sophisticated threats today. In many cases, customers might not even know they were protected. That's because Windows Defender Antivirus detects and stops malware at first sight by using [machine learning](https://cloudblogs.microsoft.com/microsoftsecure/2018/06/07/machine-learning-vs-social-engineering?ocid=cx-docs-avreports), [artificial intelligence](https://cloudblogs.microsoft.com/microsoftsecure/2018/02/14/how-artificial-intelligence-stopped-an-emotet-outbreak?ocid=cx-docs-avreports), behavioral analysis, and other advanced technologies.
|
||||||
|
|
||||||
> [!TIP]
|
|
||||||
> Learn why [Windows Defender Antivirus is the most deployed in the enterprise](https://cloudblogs.microsoft.com/microsoftsecure/2018/03/22/why-windows-defender-antivirus-is-the-most-deployed-in-the-enterprise?ocid=cx-docs-avreports).
|
|
||||||
|
|
||||||
<br></br><br></br>
|
<br></br><br></br>
|
||||||

|

|
||||||
|
|
||||||
## AV-TEST: Perfect protection score of 6.0/6.0 in the latest test
|
## AV-TEST: Perfect protection score of 6.0/6.0 in the latest test
|
||||||
|
|
||||||
The AV-TEST Product Review and Certification Report tests on three categories: protection, performance, and usability. The scores listed below are for the Protection category which has two scores: Real-World Testing and the AV-TEST reference set (known as "Prevalent Malware").
|
The AV-TEST Product Review and Certification Report tests on three categories: protection, performance, and usability. The scores listed below are for the Protection category which has two scores: Real-World Testing and the AV-TEST reference set (known as "Prevalent Malware").
|
||||||
|
> [!NOTE]
|
||||||
|
> [Download our latest analysis: Examining the AV-TEST July-August results](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y)
|
||||||
|
|
||||||
### July-August 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/august-2018/microsoft-windows-defender-antivirus-4.12--4.18-183212/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y) <sup>**Latest**</sup>
|
### July-August 2018 AV-TEST Business User test: [Protection score 6.0/6.0](https://www.av-test.org/en/antivirus/business-windows-client/windows-10/august-2018/microsoft-windows-defender-antivirus-4.12--4.18-183212/) | [Analysis](https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2IL3Y)
|
||||||
|
|
||||||
Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 20,022 malware samples. With the latest results, Windows Defender Antivirus has achieved 100% on 14 of the 16 most recent antivirus tests (combined "Real-World" and "Prevalent malware").
|
Windows Defender Antivirus achieved an overall Protection score of 6.0/6.0, detecting 100% of 20,022 malware samples. With the latest results, Windows Defender Antivirus has achieved 100% on 14 of the 16 most recent antivirus tests (combined "Real-World" and "Prevalent malware").
|
||||||
|
|
||||||
|
@ -25,7 +25,7 @@ Jenxcus (also known as Dunihi), Gamarue (also known as Androm), and Bondat have
|
|||||||
|
|
||||||
* **Gamarue** typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. We’ve seen it distribute other malware such as infostealers, spammers, clickers, downloaders, and rogues.
|
* **Gamarue** typically arrives through spam campaigns, exploits, downloaders, social networking sites, and removable drives. When Gamarue infects a device, it becomes a distribution channel for other malware. We’ve seen it distribute other malware such as infostealers, spammers, clickers, downloaders, and rogues.
|
||||||
|
|
||||||
* **Bondat** typically arrives through fictitious Nullsoft Sciptable Install System (NSIS) Java installers and removable drives. When Bondat infects a system, it gathers information about the machine such as device name, Globally Unique Identifier (GUID), and OS build. It then sends that information to a remote server.
|
* **Bondat** typically arrives through fictitious Nullsoft Scriptable Install System (NSIS), Java installers, and removable drives. When Bondat infects a system, it gathers information about the machine such as device name, Globally Unique Identifier (GUID), and OS build. It then sends that information to a remote server.
|
||||||
|
|
||||||
Both Bondat and Gamarue have clever ways of obscuring themselves to evade detection. By hiding what they are doing, they try to avoid detection by security software.
|
Both Bondat and Gamarue have clever ways of obscuring themselves to evade detection. By hiding what they are doing, they try to avoid detection by security software.
|
||||||
|
|
||||||
@ -45,4 +45,4 @@ Download [Microsoft Security Essentials](https://www.microsoft.com/download/deta
|
|||||||
|
|
||||||
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
|
In case threat removal is unsuccessful, read about [troubleshooting malware detection and removal problems](https://www.microsoft.com/wdsi/help/troubleshooting-infection).
|
||||||
|
|
||||||
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
|
For more general tips, see [prevent malware infection](prevent-malware-infection.md).
|
||||||
|
@ -113,4 +113,4 @@ To effectively build queries that span multiple tables, you need to understand t
|
|||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)
|
- [Query data using Advanced hunting](advanced-hunting-windows-defender-advanced-threat-protection.md)
|
||||||
- [Advanced hunting query language best practices](/advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md)
|
- [Advanced hunting query language best practices](advanced-hunting-best-practices-windows-defender-advanced-threat-protection.md)
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 09/13/2018
|
ms.date: 11/09/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Use basic permissions to access the portal
|
# Use basic permissions to access the portal
|
||||||
@ -79,9 +79,10 @@ For more information see, [Manage Azure AD group and role membership](https://te
|
|||||||
|
|
||||||
6. Select **Manage** > **Directory role**.
|
6. Select **Manage** > **Directory role**.
|
||||||
|
|
||||||
7. Under **Directory role**, select **Limited administrator**, then **Security Reader** or **Security Administrator**.
|
7. Select **Add role** and choose the role you'd like to assign, then click **Select**.
|
||||||
|
|
||||||

|
|
||||||
|

|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md)
|
- [Manage portal access using RBAC](rbac-windows-defender-advanced-threat-protection.md)
|
||||||
|
After Width: | Height: | Size: 103 KiB |
@ -54,14 +54,11 @@ Some actor profiles include a link to download a more comprehensive threat intel
|
|||||||
The detailed alert profile helps you understand who the attackers are, who they target, what techniques, tools, and procedures (TTPs) they use, which geolocations they are active in, and finally, what recommended actions you may take. In many cases, you can download a more detailed Threat Intelligence report about this attacker or campaign for offline reading.
|
The detailed alert profile helps you understand who the attackers are, who they target, what techniques, tools, and procedures (TTPs) they use, which geolocations they are active in, and finally, what recommended actions you may take. In many cases, you can download a more detailed Threat Intelligence report about this attacker or campaign for offline reading.
|
||||||
|
|
||||||
## Alert process tree
|
## Alert process tree
|
||||||
The **Alert process tree** takes alert triage and investigation to the next level, displaying the alert and related evidence, together with other events that occurred within the same execution context and time. This rich triage context of the alert and surrounding events is available on the alert page.
|
The **Alert process tree** takes alert triage and investigation to the next level, displaying the aggregated alert and surrounding evidence that occurred within the same execution context and time period. This rich triage and investigation context is available on the alert page.
|
||||||
|
|
||||||

|

|
||||||
|
|
||||||
The **Alert process tree** expands to display the execution path of the alert, its evidence, and related events that occurred in the minutes - before and after - the alert.
|
The **Alert process tree** expands to display the execution path of the alert and related evidence that occurred around the same period. Items marked with a thunderbolt icon should be given priority during investigation.
|
||||||
|
|
||||||
The alert and related events or evidence have circles with thunderbolt icons inside them.
|
|
||||||
|
|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>The alert process tree might not be available in some alerts.
|
>The alert process tree might not be available in some alerts.
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 07/01/2018
|
ms.date: 11/06/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Minimum requirements for Windows Defender ATP
|
# Minimum requirements for Windows Defender ATP
|
||||||
@ -30,7 +30,9 @@ Windows Defender Advanced Threat Protection requires one of the following Micros
|
|||||||
- Windows 10 Education E5
|
- Windows 10 Education E5
|
||||||
- Microsoft 365 E5 (M365 E5) which includes Windows 10 Enterprise E5
|
- Microsoft 365 E5 (M365 E5) which includes Windows 10 Enterprise E5
|
||||||
|
|
||||||
For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us/Licensing/product-licensing/windows10.aspx#tab=2).
|
For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/en-us/windowsforbusiness/compare).
|
||||||
|
|
||||||
|
For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://wincom.blob.core.windows.net/documents/Windows10_Commercial_Comparison.pdf).
|
||||||
|
|
||||||
|
|
||||||
## Related topic
|
## Related topic
|
||||||
|
@ -42,7 +42,7 @@ For more information, see [Windows 10 Licensing](https://www.microsoft.com/en-us
|
|||||||
- Windows 7 SP1 Pro
|
- Windows 7 SP1 Pro
|
||||||
- Windows 8.1 Enterprise
|
- Windows 8.1 Enterprise
|
||||||
- Windows 8.1 Pro
|
- Windows 8.1 Pro
|
||||||
- Windows 10
|
- Windows 10, version 1607 or later
|
||||||
- Windows 10 Enterprise
|
- Windows 10 Enterprise
|
||||||
- Windows 10 Education
|
- Windows 10 Education
|
||||||
- Windows 10 Pro
|
- Windows 10 Pro
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 02/13/2018
|
ms.date: 11/08/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Troubleshoot SIEM tool integration issues
|
# Troubleshoot SIEM tool integration issues
|
||||||
@ -67,6 +67,12 @@ If you encounter an error when trying to get a refresh token when using the thre
|
|||||||
|
|
||||||
6. Click **Save**.
|
6. Click **Save**.
|
||||||
|
|
||||||
|
## Error while enabling the SIEM connector application
|
||||||
|
If you encounter an error when trying to enable the SIEM connector application, check the pop-up blocker settings of your browser. It might be blocking the new window being opened when you enable the capability.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootsiem-belowfoldlink)
|
>Want to experience Windows Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-troubleshootsiem-belowfoldlink)
|
||||||
|
|
||||||
## Related topics
|
## Related topics
|
||||||
|
@ -11,7 +11,7 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 10/26/2018
|
ms.date: 11/07/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
# Windows Defender Advanced Threat Protection
|
# Windows Defender Advanced Threat Protection
|
||||||
@ -76,8 +76,8 @@ To further reinforce the security perimeter of your network, Windows Defender AT
|
|||||||
|
|
||||||
<a name="edr"></a>
|
<a name="edr"></a>
|
||||||
|
|
||||||
**[Endpoint protection and response](overview-endpoint-detection-response.md)**<br>
|
**[Endpoint detection and response](overview-endpoint-detection-response.md)**<br>
|
||||||
Endpoint protection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars.
|
||||||
|
|
||||||
<a name="ai"></a>
|
<a name="ai"></a>
|
||||||
|
|
||||||
|
@ -58,7 +58,7 @@ Block JavaScript or VBScript from launching downloaded executable content | [!in
|
|||||||
Block executable content from email client and webmail | [!include[Check mark no](images/svg/check-no.svg)] | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550
|
Block executable content from email client and webmail | [!include[Check mark no](images/svg/check-no.svg)] | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550
|
||||||
Block executable files from running unless they meet a prevalence, age, or trusted list criteria | [!include[Check mark yes](images/svg/check-yes.svg)] | 01443614-cd74-433a-b99e-2ecdc07bfc25
|
Block executable files from running unless they meet a prevalence, age, or trusted list criteria | [!include[Check mark yes](images/svg/check-yes.svg)] | 01443614-cd74-433a-b99e-2ecdc07bfc25
|
||||||
Use advanced protection against ransomware | [!include[Check mark yes](images/svg/check-yes.svg)] | c1db55ab-c21a-4637-bb3f-a12568109d35
|
Use advanced protection against ransomware | [!include[Check mark yes](images/svg/check-yes.svg)] | c1db55ab-c21a-4637-bb3f-a12568109d35
|
||||||
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | [!include[Check mark no](images/svg/check-no.svg)] | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
Block credential stealing from the Windows local security authority subsystem (lsass.exe) | [!include[Check mark yes](images/svg/check-yes.svg)] | 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2
|
||||||
Block process creations originating from PSExec and WMI commands | [!include[Check mark yes](images/svg/check-yes.svg)] | d1e49aac-8f56-4280-b9ba-993a6d77406c
|
Block process creations originating from PSExec and WMI commands | [!include[Check mark yes](images/svg/check-yes.svg)] | d1e49aac-8f56-4280-b9ba-993a6d77406c
|
||||||
Block untrusted and unsigned processes that run from USB | [!include[Check mark yes](images/svg/check-yes.svg)] | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
|
Block untrusted and unsigned processes that run from USB | [!include[Check mark yes](images/svg/check-yes.svg)] | b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4
|
||||||
Block Office communication applications from creating child processes | [!include[Check mark yes](images/svg/check-yes.svg)] | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
Block Office communication applications from creating child processes | [!include[Check mark yes](images/svg/check-yes.svg)] | 26190899-1602-49e8-8b27-eb1d0a1ce869
|
||||||
|