diff --git a/.openpublishing.redirection.windows-configuration.json b/.openpublishing.redirection.windows-configuration.json index ae975b34f1..971d493152 100644 --- a/.openpublishing.redirection.windows-configuration.json +++ b/.openpublishing.redirection.windows-configuration.json @@ -167,7 +167,7 @@ }, { "source_path": "windows/configuration/stop-employees-from-using-the-windows-store.md", - "redirect_url": "/windows/configuration/stop-employees-from-using-microsoft-store", + "redirect_url": "/windows/configuration/store", "redirect_document_id": false }, { @@ -282,7 +282,7 @@ }, { "source_path": "windows/configuration/configure-windows-10-taskbar.md", - "redirect_url": "/windows/configuration/taskbar/configure-windows-10-taskbar", + "redirect_url": "/windows/configuration/taskbar/", "redirect_document_id": false }, { @@ -297,7 +297,7 @@ }, { "source_path": "windows/configuration/customize-taskbar-windows-11.md", - "redirect_url": "/windows/configuration/taskbar/customize-taskbar-windows-11", + "redirect_url": "/windows/configuration/taskbar", "redirect_document_id": false }, { @@ -392,7 +392,7 @@ }, { "source_path": "windows/configuration/manage-tips-and-suggestions.md", - "redirect_url": "/windows/configuration/tips/manage-tips-and-suggestions", + "redirect_url": "/windows/configuration/", "redirect_document_id": false }, { @@ -432,7 +432,12 @@ }, { "source_path": "windows/configuration/stop-employees-from-using-microsoft-store.md", - "redirect_url": "/windows/configuration/store/stop-employees-from-using-microsoft-store", + "redirect_url": "/windows/configuration/store", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/store/stop-employees-from-using-microsoft-store.md", + "redirect_url": "/windows/configuration/store", "redirect_document_id": false }, { @@ -442,7 +447,7 @@ }, { "source_path": "windows/configuration/supported-csp-taskbar-windows.md", - "redirect_url": "/windows/configuration/taskbar/supported-csp-taskbar-windows", + "redirect_url": "/windows/configuration/taskbar/policy-settings", "redirect_document_id": false }, { @@ -750,9 +755,14 @@ "redirect_url": "/windows/configuration/assigned-access/configuration-file", "redirect_document_id": false }, + { + "source_path": "windows/configuration/assigned-access/create-xml.md", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", + "redirect_document_id": false + }, { "source_path": "windows/configuration/kiosk/lock-down-windows-11-to-specific-apps.md", - "redirect_url": "/windows/configuration/assigned-access/create-xml", + "redirect_url": "/windows/configuration/assigned-access/configuration-file", "redirect_document_id": false }, { @@ -832,12 +842,27 @@ }, { "source_path": "windows/configuration/taskbar/configure-windows-10-taskbar.md", - "redirect_url": "/windows/configuration/taskbar", + "redirect_url": "/windows/configuration/taskbar/", "redirect_document_id": false }, { "source_path": "windows/configuration/taskbar/customize-taskbar-windows-11.md", - "redirect_url": "/windows/configuration/taskbar", + "redirect_url": "/windows/configuration/taskbar/", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/tips/manage-tips-and-suggestions.md", + "redirect_url": "/windows/configuration", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/configure.md", + "redirect_url": "/windows/configuration/taskbar/", + "redirect_document_id": false + }, + { + "source_path": "windows/configuration/taskbar/supported-csp-taskbar-windows.md", + "redirect_url": "/windows/configuration/taskbar/policy-settings", "redirect_document_id": false } ] diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index d9cf189c9a..647b90ac50 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -16,13 +16,19 @@ ms.date: 01/18/2024 The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. Starting in Windows 10, version 1809, it's also supported in Windows 10 Pro. > [!NOTE] +> To manage BitLocker through CSP except to enable and disable it using the `RequireDeviceEncryption` policy, one of the following licenses must be assigned to your users regardless of your management platform: > -> - Settings are enforced only at the time encryption is started. Encryption isn't restarted with settings changes. -> - You must send all the settings together in a single SyncML to be effective. +> - Windows 10/11 Enterprise E3 or E5 (included in Microsoft 365 F3, E3, and E5). +> - Windows 10/11 Enterprise A3 or A5 (included in Microsoft 365 A3 and A5). A `Get` operation on any of the settings, except for `RequireDeviceEncryption` and `RequireStorageCardEncryption`, returns the setting configured by the admin. For RequireDeviceEncryption and RequireStorageCardEncryption, the Get operation returns the actual status of enforcement to the admin, such as if Trusted Platform Module (TPM) protection is required and if encryption is required. And if the device has BitLocker enabled but with password protector, the status reported is 0. A Get operation on RequireDeviceEncryption doesn't verify that a minimum PIN length is enforced (SystemDrivesMinimumPINLength). + +> [!NOTE] +> +> - Settings are enforced only at the time encryption is started. Encryption isn't restarted with settings changes. +> - You must send all the settings together in a single SyncML to be effective. @@ -654,7 +660,7 @@ Sample value for this node to enable this policy is: `` **Example**: -To disable this policy, use hte following SyncML: +To disable this policy, use the following SyncML: ```xml diff --git a/windows/client-management/mdm/clouddesktop-csp.md b/windows/client-management/mdm/clouddesktop-csp.md index 8e70090f67..e249d20ca8 100644 --- a/windows/client-management/mdm/clouddesktop-csp.md +++ b/windows/client-management/mdm/clouddesktop-csp.md @@ -1,7 +1,7 @@ --- title: CloudDesktop CSP description: Learn more about the CloudDesktop CSP. -ms.date: 01/18/2024 +ms.date: 03/05/2024 --- @@ -29,7 +29,7 @@ The following list shows the CloudDesktop configuration service provider nodes: | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
❌ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | diff --git a/windows/client-management/mdm/clouddesktop-ddf-file.md b/windows/client-management/mdm/clouddesktop-ddf-file.md index 60be060ee6..98427f9e32 100644 --- a/windows/client-management/mdm/clouddesktop-ddf-file.md +++ b/windows/client-management/mdm/clouddesktop-ddf-file.md @@ -1,7 +1,7 @@ --- title: CloudDesktop DDF file description: View the XML file containing the device description framework (DDF) for the CloudDesktop configuration service provider. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -38,9 +38,9 @@ The following XML file contains the device description framework (DDF) for the C - 99.9.99999 - 9.9 - 0x4;0x30;0x31;0x7E;0x88;0xA1;0xA2;0xA4;0xA5;0xBC;0xBF;0xCD;0xD2; + 10.0.22621.3235 + 1.0 + 0x4;0x30;0x31;0x7E;0x87;0x88;0x88*;0xA1;0xA2;0xA4;0xA5;0xB4;0xBC;0xBD;0xBF; @@ -68,8 +68,8 @@ The following XML file contains the device description framework (DDF) for the C - 99.9.99999 - 9.9 + 10.0.22621.3235 + 1.0 diff --git a/windows/client-management/mdm/personalization-csp.md b/windows/client-management/mdm/personalization-csp.md index 70775b2f69..614e47b8a9 100644 --- a/windows/client-management/mdm/personalization-csp.md +++ b/windows/client-management/mdm/personalization-csp.md @@ -1,7 +1,7 @@ --- title: Personalization CSP description: Learn more about the Personalization CSP. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -9,8 +9,6 @@ ms.date: 01/31/2024 # Personalization CSP -[!INCLUDE [Windows Insider tip](includes/mdm-insider-csp-note.md)] - The Personalization CSP can set the lock screen, desktop background images and company branding on sign-in screen ([BootToCloud mode](policy-csp-clouddesktop.md#boottocloudmode) only). Setting these policies also prevents the user from changing the image. You can also use the Personalization settings in a provisioning package. @@ -38,7 +36,7 @@ The following list shows the Personalization configuration service provider node | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -77,7 +75,7 @@ This represents the status of the Company Logo. 1 - Successfully downloaded or c | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -116,7 +114,7 @@ An http or https Url to a jpg, jpeg or png image that needs to be downloaded and | Scope | Editions | Applicable OS | |:--|:--|:--| -| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows Insider Preview | +| ✅ Device
❌ User | ✅ Pro
✅ Enterprise
✅ Education
✅ Windows SE
✅ IoT Enterprise / IoT Enterprise LTSC | ✅ Windows 11, version 22H2 [10.0.22621.3235] and later | @@ -127,7 +125,7 @@ An http or https Url to a jpg, jpeg or png image that needs to be downloaded and -This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen. +The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only. diff --git a/windows/client-management/mdm/personalization-ddf.md b/windows/client-management/mdm/personalization-ddf.md index 07040a6851..87ccb6cf93 100644 --- a/windows/client-management/mdm/personalization-ddf.md +++ b/windows/client-management/mdm/personalization-ddf.md @@ -1,7 +1,7 @@ --- title: Personalization DDF file description: View the XML file containing the device description framework (DDF) for the Personalization configuration service provider. -ms.date: 01/31/2024 +ms.date: 03/05/2024 --- @@ -42,7 +42,7 @@ The following XML file contains the device description framework (DDF) for the P 10.0.16299 1.0 - 0x4;0x1B;0x30;0x31;0x48;0x54;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x88;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xBC;0xBF;0xCA;0xCB;0xCD;0xCF;0xD2; + 0x4;0x1B;0x30;0x31;0x48;0x54;0x77;0x79;0x7A;0x7D;0x7E;0x81;0x82;0x87;0x88;0x88*;0x8A;0x8B;0xA1;0xA2;0xA4;0xA5;0xAB;0xAC;0xAF;0xB4;0xBC;0xBD;0xBF;0xCA;0xCB; @@ -101,7 +101,7 @@ The following XML file contains the device description framework (DDF) for the P - A http or https Url to a jpg, jpeg or png image that neeeds to be downloaded and used as the Lock Screen Image or a file Url to a local image on the file system that needs to be used as the Lock Screen Image. + A http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Lock Screen Image or a file Url to a local image on the file system that needs to be used as the Lock Screen Image. @@ -148,7 +148,7 @@ The following XML file contains the device description framework (DDF) for the P - A http or https Url to a jpg, jpeg or png image that neeeds to be downloaded and used as the Company Logo or a file Url to a local image on the file system that needs to be used as the Company Logo. This setting is currently available for boot to cloud shared pc mode only. + A http or https Url to a jpg, jpeg or png image that needs to be downloaded and used as the Company Logo or a file Url to a local image on the file system that needs to be used as the Company Logo. This setting is currently available for boot to cloud shared pc mode only. @@ -162,7 +162,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 @@ -189,7 +189,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 @@ -203,7 +203,7 @@ The following XML file contains the device description framework (DDF) for the P - This represents the name of the company. It can be at most 30 characters long. This setting is currently available only for boot to cloud shared pc mode to display the company name on sign-in screen. + The name of the company to be displayed on the sign-in screen. This setting is currently available for boot to cloud shared pc mode only. @@ -217,7 +217,7 @@ The following XML file contains the device description framework (DDF) for the P - 99.9.99999 + 10.0.22621.3235 2.0 diff --git a/windows/client-management/mdm/policies-in-policy-csp-supported-by-hololens2.md b/windows/client-management/mdm/policies-in-policy-csp-supported-by-hololens2.md index 8a1244f15d..c0c0fd2588 100644 --- a/windows/client-management/mdm/policies-in-policy-csp-supported-by-hololens2.md +++ b/windows/client-management/mdm/policies-in-policy-csp-supported-by-hololens2.md @@ -39,6 +39,10 @@ ms.date: 02/03/2023 - [DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#dosethourstolimitforegrounddownloadbandwidth) 10 - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#dosethourstolimitbackgrounddownloadbandwidth) 10 - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#dosethourstolimitbackgrounddownloadbandwidth) 10 +- [Device/{TenantId}/Policies/EnableWindowsHelloProvisioningForSecurityKeys](passportforwork-csp.md#devicetenantidpoliciesenablewindowshelloprovisioningforsecuritykeys) 12 +- [DeviceInstallation/AllowInstallationOfMatchingDeviceIDs](policy-csp-deviceinstallation.md#allowinstallationofmatchingdeviceids) 12 +- [DeviceInstallation/DeviceInstall_Removable_Deny](policy-csp-admx-deviceinstallation.md#deviceinstall_removable_deny) 12 +- [DeviceInstallation/EnableInstallationPolicyLayering](policy-csp-deviceinstallation.md#enableinstallationpolicylayering) 12 - [DeviceLock/AllowIdleReturnWithoutPassword](policy-csp-devicelock.md#allowidlereturnwithoutpassword) - [DeviceLock/AllowSimpleDevicePassword](policy-csp-devicelock.md#allowsimpledevicepassword) - [DeviceLock/AlphanumericDevicePasswordRequired](policy-csp-devicelock.md#alphanumericdevicepasswordrequired) @@ -59,12 +63,18 @@ ms.date: 02/03/2023 - [MixedReality/ConfigureMovingPlatform](policy-csp-mixedreality.md#configuremovingplatform) *[Feb. 2022 Servicing release](/hololens/hololens-release-notes#windows-holographic-version-21h2---february-2022-update) - [MixedReality/ConfigureNtpClient](./policy-csp-mixedreality.md#configurentpclient) 12 - [MixedReality/DisallowNetworkConnectivityPassivePolling](./policy-csp-mixedreality.md#disallownetworkconnectivitypassivepolling) 12 +- [MixedReality/EnableStartMenuWristTap](./policy-csp-mixedreality.md#enablestartmenuwristtap)12 +- [MixedReality/EnableStartMenuSingleHandGesture](./policy-csp-mixedreality.md#enablestartmenusinglehandgesture) 12 +- [MixedReality/EnableStartMenuVoiceCommand](./policy-csp-mixedreality.md#enablestartmenuvoicecommand) 12 - [MixedReality/FallbackDiagnostics](./policy-csp-mixedreality.md#fallbackdiagnostics) 9 - [MixedReality/ManualDownDirectionDisabled](policy-csp-mixedreality.md#manualdowndirectiondisabled) *[Feb. 2022 Servicing release](/hololens/hololens-release-notes#windows-holographic-version-21h2---february-2022-update) - [MixedReality/MicrophoneDisabled](./policy-csp-mixedreality.md#microphonedisabled) 9 - [MixedReality/NtpClientEnabled](./policy-csp-mixedreality.md#ntpclientenabled) 12 +- [MixedReality/PreferLogonAsOtherUser](./policy-csp-mixedreality.md#preferlogonasotheruser) 12 - [MixedReality/SkipCalibrationDuringSetup](./policy-csp-mixedreality.md#skipcalibrationduringsetup) 12 - [MixedReality/SkipTrainingDuringSetup](./policy-csp-mixedreality.md#skiptrainingduringsetup) 12 +- [MixedReality/RequireStartIconHold](./policy-csp-mixedreality.md#requirestarticonhold) 12 +- [MixedReality/RequireStartIconVisible](./policy-csp-mixedreality.md#requirestarticonvisible) 12 - [MixedReality/VisitorAutoLogon](policy-csp-mixedreality.md#visitorautologon) 10 - [MixedReality/VolumeButtonDisabled](./policy-csp-mixedreality.md#volumebuttondisabled) 9 - [Power/DisplayOffTimeoutOnBattery](./policy-csp-power.md#displayofftimeoutonbattery) 9, 14 @@ -91,9 +101,9 @@ ms.date: 02/03/2023 - [Privacy/LetAppsAccessGazeInput_ForceDenyTheseApps](policy-csp-privacy.md#letappsaccessgazeinput_forcedenytheseapps) 8 - [Privacy/LetAppsAccessGazeInput_UserInControlOfTheseApps](policy-csp-privacy.md#letappsaccessgazeinput_userincontroloftheseapps) 8 - [Privacy/LetAppsAccessLocation](policy-csp-privacy.md#letappsaccesslocation) -- [Privacy/LetAppsAccessLocation_ForceAllowTheseApps](/windows/client-management/mdm/policy-csp-privacy) 12 -- [Privacy/LetAppsAccessLocation_ForceDenyTheseApps](/windows/client-management/mdm/policy-csp-privacy) 12 -- [Privacy/LetAppsAccessLocation_UserInControlOfTheseApps](/windows/client-management/mdm/policy-csp-privacy) 12 +- [Privacy/LetAppsAccessLocation_ForceAllowTheseApps](policy-csp-privacy.md#letappsaccesslocation_forceallowtheseapps) 12 +- [Privacy/LetAppsAccessLocation_ForceDenyTheseApps](policy-csp-privacy.md#letappsaccesslocation_forcedenytheseapps) 12 +- [Privacy/LetAppsAccessLocation_UserInControlOfTheseApps](policy-csp-privacy.md#letappsaccesslocation_userincontroloftheseapps) 12 - [Privacy/LetAppsAccessMicrophone](policy-csp-privacy.md#letappsaccessmicrophone) - [Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps](policy-csp-privacy.md#letappsaccessmicrophone_forceallowtheseapps) 8 - [Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps](policy-csp-privacy.md#letappsaccessmicrophone_forcedenytheseapps) 8 @@ -113,8 +123,8 @@ ms.date: 02/03/2023 - [System/AllowLocation](policy-csp-system.md#allowlocation) - [System/AllowStorageCard](policy-csp-system.md#allowstoragecard) - [System/AllowTelemetry](policy-csp-system.md#allowtelemetry) -- [System/ConfigureTelemetryOptInSettingsUx](/windows/client-management/mdm/policy-csp-system) 12 -- [System/DisableDeviceDelete](/windows/client-management/mdm/policy-csp-system) 12 +- [System/ConfigureTelemetryOptInSettingsUx](policy-csp-system.md#configuretelemetryoptinsettingsux) 12 +- [System/DisableDeviceDelete](policy-csp-system.md#disabledevicedelete) 12 - [TimeLanguageSettings/ConfigureTimeZone](./policy-csp-timelanguagesettings.md#configuretimezone) 9 - [Update/ActiveHoursEnd](./policy-csp-update.md#activehoursend) 9 - [Update/ActiveHoursMaxRange](./policy-csp-update.md#activehoursmaxrange) 9 @@ -165,6 +175,3 @@ Footnotes: [Policy CSP](policy-configuration-service-provider.md) [Full HoloLens CSP Details](/windows/client-management/mdm/configuration-service-provider-support) - - - diff --git a/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md b/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md index 961d33806c..4f5ce43c2e 100644 --- a/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md +++ b/windows/configuration/assigned-access/includes/quickstart-kiosk-ps.md @@ -24,11 +24,6 @@ $assignedAccessConfiguration = @" "@ -$eventLogFilterHashTable = @{ - ProviderName = "Microsoft-Windows-AssignedAccess"; - StartTime = Get-Date -Millisecond 0 -} - $namespaceName="root\cimv2\mdm\dmmap" $className="MDM_AssignedAccess" $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className diff --git a/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md index 48b5655a82..35a15c446f 100644 --- a/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md +++ b/windows/configuration/assigned-access/includes/quickstart-restricted-experience-ps.md @@ -62,11 +62,6 @@ $assignedAccessConfiguration = @" "@ -$eventLogFilterHashTable = @{ - ProviderName = "Microsoft-Windows-AssignedAccess"; - StartTime = Get-Date -Millisecond 0 -} - $namespaceName="root\cimv2\mdm\dmmap" $className="MDM_AssignedAccess" $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className @@ -124,11 +119,6 @@ $assignedAccessConfiguration = @" "@ -$eventLogFilterHashTable = @{ - ProviderName = "Microsoft-Windows-AssignedAccess"; - StartTime = Get-Date -Millisecond 0 -} - $namespaceName="root\cimv2\mdm\dmmap" $className="MDM_AssignedAccess" $obj = Get-CimInstance -Namespace $namespaceName -ClassName $className diff --git a/windows/configuration/index.yml b/windows/configuration/index.yml index 8ca14120c5..c71df35e46 100644 --- a/windows/configuration/index.yml +++ b/windows/configuration/index.yml @@ -24,7 +24,7 @@ landingContent: - text: Customize the Windows Start menu layout url: start/customize-and-export-start-layout.md - text: Customize the Windows taskbar - url: taskbar/configure.md + url: taskbar/index.md - text: Configure Windows Spotlight on the lock screen url: lock-screen/windows-spotlight.md - text: Accessibility information for IT pros @@ -32,14 +32,16 @@ landingContent: - title: Configure a Windows kiosk linkLists: - - linkListType: how-to-guide + - linkListType: concept links: - - text: Configure kiosks and restricted user experiences - url: assigned-access/index.md - text: What is Assigned Access? url: assigned-access/overview.md - text: What is Shell Launcher? url: assigned-access/shell-launcher/index.md + - linkListType: how-to-guide + links: + - text: Configure kiosks and restricted user experiences + url: assigned-access/index.md - linkListType: quickstart links: - text: Configure a kiosk with Assigned Access @@ -48,13 +50,27 @@ landingContent: url: assigned-access/shell-launcher/quickstart-kiosk.md - text: Configure a restricted user experience with Assigned Access url: assigned-access/quickstart-restricted-user-experience.md + - linkListType: reference + links: + - text: Assigned Access XML Schema Definition (XSD) + url: assigned-access/xsd.md + - text: Shell Launcher XML Schema Definition (XSD) + url: assigned-access/shell-launcher/xsd.md - title: Configure shared devices linkLists: + - linkListType: concept + links: + - text: Shared devices concepts + url: /windows/configuration/shared-pc/shared-devices-concepts - linkListType: how-to-guide links: - - text: Manage multi-user and guest devices - url: shared-devices-concepts.md + - text: Configure a shared or guest Windows device + url: /windows/configuration/shared-pc/set-up-shared-or-guest-pc + - linkListType: reference + links: + - text: Shared PC technical reference + url: /windows/configuration/shared-pc/shared-pc-technical - title: Use provisioning packages linkLists: diff --git a/windows/configuration/store/images/store-blocked.png b/windows/configuration/store/images/store-blocked.png new file mode 100644 index 0000000000..c45c074f34 Binary files /dev/null and b/windows/configuration/store/images/store-blocked.png differ diff --git a/windows/configuration/store/index.md b/windows/configuration/store/index.md new file mode 100644 index 0000000000..09c92aea0f --- /dev/null +++ b/windows/configuration/store/index.md @@ -0,0 +1,66 @@ +--- +title: Configure access to the Microsoft Store app +description: Learn how to configure access to the Microsoft Store app. +ms.topic: how-to +ms.date: 03/13/2024 +--- + +# Configure access to the Microsoft Store app + +Microsoft Store is a digital distribution platform that provides a way for users to install applications on Windows devices. For some organizations, business policies require blocking access to Microsoft Store. + +This article describes how to configure access to the Microsoft Store app in your organization. + +## Prevent access to the Microsoft Store app + +You can use configuration service provider (CSP) or group policy (GPO) settings to configure access to the Microsoft Store app. The CSP configuration is available to Windows Enterprise and Education editions only. + +[!INCLUDE [tab-intro](../../../includes/configure/tab-intro.md)] + +#### [:::image type="icon" source="../images/icons/intune.svg" border="false"::: **Intune/CSP**](#tab/intune) + +[!INCLUDE [intune-settings-catalog-1](../../../includes/configure/intune-settings-catalog-1.md)] + +| Category | Setting name | Value | +|--|--|--| +| **Administrative Templates > Windows Components > Store** | Turn off the Store application| **Enabled**| + +[!INCLUDE [intune-settings-catalog-2](../../../includes/configure/intune-settings-catalog-2.md)] + +Alternatively, you can configure devices using a [custom policy][INT-1] with the [Policy CSP][CSP-1]. + +| Setting | +|--| +|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_WindowsStore/RemoveWindowsStore_2`
- **Data type:** string
- **Value:** ``| + +#### [:::image type="icon" source="../images/icons/group-policy.svg" border="false"::: **GPO**](#tab/gpo) + +[!INCLUDE [gpo-settings-1](../../../includes/configure/gpo-settings-1.md)] + +| Group policy path | Group policy setting | Value | +| - | - | - | +| **Computer Configuration\Administrative Templates\Windows Components\Store** | Turn off the Store application| **Enabled**| + +[!INCLUDE [gpo-settings-2](../../../includes/configure/gpo-settings-2.md)] + +--- + +## User experience + +When you turn off the Microsoft Store application, users get the following message when they open it: + +:::image type="content" source="images/store-blocked.png" alt-text="Screenshot of the Microsoft Store app blocked access." border="false"::: + +## Considerations + +Here are some considerations when you prevent access to the Microsoft Store app: + +- Microsoft Store applications keep updating automatically, by default +- Users might still be able to install applications using Windows Package Manager (winget), or other methods, if they don't need to acquire the package from Microsoft Store +- Devices managed by Microsoft Intune can still install applications sourced from Microsoft Store, even if you block access to the Microsoft Store app. To learn more, see [Add Microsoft Store apps to Microsoft Intune][INT-2] + + + +[CSP-1]: /windows/client-management/mdm/policy-csp-admx-windowsstore +[INT-1]: /mem/intune/configuration/settings-catalog +[INT-2]: /mem/intune/apps/store-apps-microsoft diff --git a/windows/configuration/store/stop-employees-from-using-microsoft-store.md b/windows/configuration/store/stop-employees-from-using-microsoft-store.md deleted file mode 100644 index a70a6b5922..0000000000 --- a/windows/configuration/store/stop-employees-from-using-microsoft-store.md +++ /dev/null @@ -1,107 +0,0 @@ ---- -title: Configure access to Microsoft Store -description: Learn how to configure access to Microsoft Store for client computers and mobile devices in your organization. -ms.topic: conceptual -ms.date: 11/29/2022 ---- - -# Configure access to Microsoft Store - -IT pros can configure access to Microsoft Store for client computers in their organization. For some organizations, business policies require blocking access to Microsoft Store. - -> [!IMPORTANT] -> All executable code including Microsoft Store applications should have an update and maintenance plan. Organizations that use Microsoft Store applications should ensure that the applications can be updated through the Microsoft Store over the internet, through the [Private Store](/microsoft-store/distribute-apps-from-your-private-store), or [distributed offline](/microsoft-store/distribute-offline-apps) to keep the applications up to date. - -## Options to configure access to Microsoft Store - -You can use either AppLocker or Group Policy to configure access to Microsoft Store. For Windows 10, configuring access to Microsoft Store is only supported on Windows 10 Enterprise edition. - -## Block Microsoft Store using AppLocker - -Applies to: Windows 10 Enterprise, Windows 10 Education - -AppLocker provides policy-based access control management for applications. You can block access to Microsoft Store app with AppLocker by creating a rule for packaged apps. You'll give the name of the Microsoft Store app as the packaged app that you want to block from client computers. - -For more information on AppLocker, see [What is AppLocker?](/windows/device-security/applocker/what-is-applocker) For more information on creating an AppLocker rule for app packages, see [Create a rule for packaged apps](/windows/device-security/applocker/create-a-rule-for-packaged-apps). - -**To block Microsoft Store using AppLocker:** - -1. Enter **`secpol`** in the search bar to find and start AppLocker. - -1. In the console tree of the snap-in, select **Application Control Policies**, select **AppLocker**, and then select **Packaged app Rules**. - -1. On the **Action** menu, or by right-clicking on **Packaged app Rules**, select **Create New Rule**. - -1. On **Before You Begin**, select **Next**. - -1. On **Permissions**, select the action (allow or deny) and the user or group that the rule should apply to, and then select **Next**. - -1. On **Publisher**, you can select **Use an installed app package as a reference**, and then select **Select**. - -1. On **Select applications**, find and select **Store** under **Applications** column, and then select **OK**. Select **Next**. - - [Create a rule for packaged apps](/windows/device-security/applocker/create-a-rule-for-packaged-apps) has more information on reference options and setting the scope on packaged app rules. - -1. Optional: On **Exceptions**, specify conditions by which to exclude files from being affected by the rule. Conditions allow you to add exceptions based on the same rule reference and rule scope as you set before. Select **Next**. - -## Block Microsoft Store using configuration service provider - -Applies to: Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education - -If you have Windows 10 devices in your organization that are managed using a mobile device management (MDM) system, such as Microsoft Intune, you can block access to Microsoft Store app using the following configuration service providers (CSPs): - -- [Policy CSP](/windows/client-management/mdm/policy-configuration-service-provider) -- [AppLocker CSP](/windows/client-management/mdm/applocker-csp) - -For more information, see [Configure an MDM provider](/microsoft-store/configure-mdm-provider-microsoft-store-for-business). - -For more information on the rules available via AppLocker on the different supported operating systems, see [Operating system requirements](/windows/security/threat-protection/windows-defender-application-control/applocker/requirements-to-use-applocker#operating-system-requirements). - -> [!IMPORTANT] -> If you block access to the Store using CSP, you need to also configure [AllowAppStoreAutoUpdate](/windows/client-management/mdm/policy-csp-applicationmanagement#applicationmanagement-allowappstoreautoupdate) to enable in-box store apps to update while still blocking access to the store. - -## Block Microsoft Store using Group Policy - -Applies to: Windows 10 Enterprise, Windows 10 Education - -> [!NOTE] -> Not supported on Windows 10 Pro, starting with version 151. For more info, see [Knowledge Base article #3135657](/troubleshoot/windows-client/group-policy/cannot-disable-microsoft-store). - -You can also use Group Policy to manage access to Microsoft Store. - -**To block Microsoft Store using Group Policy:** - -1. Enter **`gpedit`** in the search bar to find and start Group Policy Editor. - -1. In the console tree of the snap-in, select **Computer Configuration**, select **Administrative Templates**, select **Windows Components**, and then select **Store**. - -1. In the Setting pane, select **Turn off the Store application**, and then select **Edit policy setting**. - -1. On the **Turn off the Store application** setting page, select **Enabled**, and then select **OK**. - -> [!IMPORTANT] -> When you enable the policy to **Turn off the Store application**, it turns off app updates from the Microsoft Store. To allow store apps to update, disable the policy to **Turn off automatic download and install of Updates**. This policy is found under **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Store**. This configuration allows in-box store apps to update while still blocking access to the store. - -## Show private store only using Group Policy - -Applies to Windows 10 Enterprise, Windows 10 Education - -If you're using Microsoft Store for Business and you want employees to only see apps you're managing in your private store, you can use Group Policy to show only the private store. Microsoft Store app will still be available, but employees can't view or purchase apps. Employees can view and install apps that the admin has added to your organization's private store. - -**To show private store only in Microsoft Store app:** - -1. Enter **`gpedit`** in the search bar, and then select **Edit group policy (Control panel)** to find and start Group Policy Editor. - -1. In the console tree of the snap-in, go to **User Configuration** or **Computer Configuration** > **Administrative Templates** > **Windows Components**, and then select **Store**. - -1. Right-click **Only display the private store within the Microsoft Store app** in the right pane, and select **Edit**. - - The **Only display the private store within the Microsoft Store app** policy settings will open. - -1. On the **Only display the private store within the Microsoft Store app** setting page, select **Enabled**, and then select **OK**. - -## Related articles - -[Distribute apps using your private store](/microsoft-store/distribute-apps-from-your-private-store) - -[Manage access to private store](/microsoft-store/manage-access-to-private-store) diff --git a/windows/configuration/taskbar/configure.md b/windows/configuration/taskbar/index.md similarity index 100% rename from windows/configuration/taskbar/configure.md rename to windows/configuration/taskbar/index.md diff --git a/windows/configuration/taskbar/supported-csp-taskbar-windows.md b/windows/configuration/taskbar/policy-settings.md similarity index 100% rename from windows/configuration/taskbar/supported-csp-taskbar-windows.md rename to windows/configuration/taskbar/policy-settings.md diff --git a/windows/configuration/taskbar/toc.yml b/windows/configuration/taskbar/toc.yml index 906f16ce7c..c3601e77ec 100644 --- a/windows/configuration/taskbar/toc.yml +++ b/windows/configuration/taskbar/toc.yml @@ -1,5 +1,5 @@ items: - name: Customize the Taskbar - href: configure.md + href: index.md - name: Supported Taskbar CSPs - href: supported-csp-taskbar-windows.md \ No newline at end of file + href: policy-settings.md \ No newline at end of file diff --git a/windows/configuration/tips/manage-tips-and-suggestions.md b/windows/configuration/tips/manage-tips-and-suggestions.md deleted file mode 100644 index 41d0fa25af..0000000000 --- a/windows/configuration/tips/manage-tips-and-suggestions.md +++ /dev/null @@ -1,32 +0,0 @@ ---- -title: Manage Windows 10 and Microsoft Store tips, fun facts, and suggestions -description: Windows 10 provides organizations with various options to manage user experiences to provide a consistent and predictable experience for employees. -ms.topic: how-to -ms.date: 09/20/2017 ---- - -# Manage Windows 10 and Microsoft Store tips, fun fact and suggestions - -Windows includes user experience features that provide useful tips, "fun facts", and suggestions as you use Windows, and app suggestions from the Microsoft Store. These features are designed to help people get the most out of their Windows experience by, for example, sharing new features, providing more details on the features they use, or sharing content available in the Microsoft Store. Examples of such user experiences include: - -* **Windows Spotlight on the lock screen**: Daily updated images on the lock screen that can include more facts and tips in "hotspots" that are revealed on hover. -* **Start menu app suggestions**: App suggestions in Start that recommend productivity tool or utilities from the Microsoft Store. -* **Additional apps on Start**: More apps preinstalled on the Start screen, which can enhance the user's experience. -* **Windows tips**: Contextual tips that appear based on specific user actions to reveal related Windows features or help users complete a scenario. -* **Microsoft account notifications**: For users who have a connected Microsoft account, toast notifications about their account like parental control notifications or subscription expiration. - ->[!TIP] -> On all Windows desktop editions, users can directly enable and disable Windows tips, "fun facts", and suggestions and Microsoft Store suggestions. For example, users are able to select personal photos for the lock screen as opposed to the images provided by Microsoft, or turn off tips, "fun facts", or suggestions as they use Windows. - -Windows 10 provides organizations the ability to centrally manage the type of content provided by these features through Group Policy or mobile device management (MDM). The following table describes how administrators can manage suggestions and tips in Windows 10 commercial and education editions. - -## Options available to manage Windows 10 tips and "fun facts" and Microsoft Store suggestions - -| Windows 10 edition | Disable | Show Microsoft apps only | Show Microsoft and popular third-party apps | -|--|--|--|--| -| Windows 10 Pro | No | Yes | Yes (default) | -| Windows 10 Enterprise | Yes | Yes | Yes (default) | -| Windows 10 Pro Education | Yes (default) | Yes | No (setting can't be changed) | -| Windows 10 Education | Yes (default) | Yes | No (setting can't be changed) | - -[Learn more about policy settings for Windows Spotlight.](../lock-screen/windows-spotlight.md) diff --git a/windows/configuration/toc.yml b/windows/configuration/toc.yml index 60dc6990dc..25256515be 100644 --- a/windows/configuration/toc.yml +++ b/windows/configuration/toc.yml @@ -13,12 +13,10 @@ items: href: lock-screen/windows-spotlight.md - name: Microsoft Store items: - - name: Configure access to the Microsoft Store - href: store/stop-employees-from-using-microsoft-store.md + - name: Configure access to Microsoft Store + href: store/index.md - name: Find the AUMID of an installed app href: store/find-aumid.md - - name: Manage Microsoft Store tips, "fun facts", and suggestions - href: tips/manage-tips-and-suggestions.md - name: Cellular settings href: cellular/provisioning-apn.md - name: Kiosks and restricted user experiences diff --git a/windows/deployment/update/update-other-microsoft-products.md b/windows/deployment/update/update-other-microsoft-products.md index 1479c86008..0d05bd2cd3 100644 --- a/windows/deployment/update/update-other-microsoft-products.md +++ b/windows/deployment/update/update-other-microsoft-products.md @@ -11,7 +11,7 @@ manager: aaroncz appliesto: - ✅ Windows 11 - ✅ Windows 10 -ms.date: 03/11/2024 +ms.date: 03/14/2024 --- # Update other Microsoft products @@ -70,7 +70,6 @@ The following is a list of other Microsoft products that might be updated: - Windows Azure Pack - Windows Azure Service Bus - Windows Embedded Developer Update -- Windows Intune - Windows Live Sign-in Assistant - Windows Small Business Server - Zune diff --git a/windows/security/identity-protection/hello-for-business/images/fingerprint.svg b/windows/security/identity-protection/hello-for-business/images/fingerprint.svg index e2b816716a..2494d65659 100644 --- a/windows/security/identity-protection/hello-for-business/images/fingerprint.svg +++ b/windows/security/identity-protection/hello-for-business/images/fingerprint.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/hello.svg b/windows/security/identity-protection/hello-for-business/images/hello.svg index 5601c82127..a4fa1ca0df 100644 --- a/windows/security/identity-protection/hello-for-business/images/hello.svg +++ b/windows/security/identity-protection/hello-for-business/images/hello.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/iris.svg b/windows/security/identity-protection/hello-for-business/images/iris.svg index 871cac50d5..465902e0b3 100644 --- a/windows/security/identity-protection/hello-for-business/images/iris.svg +++ b/windows/security/identity-protection/hello-for-business/images/iris.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/pin.svg b/windows/security/identity-protection/hello-for-business/images/pin.svg index a34b2fa5db..a5bfdc4148 100644 --- a/windows/security/identity-protection/hello-for-business/images/pin.svg +++ b/windows/security/identity-protection/hello-for-business/images/pin.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/hello-for-business/images/smartcard.svg b/windows/security/identity-protection/hello-for-business/images/smartcard.svg index c9d40368b5..d1924ffebb 100644 --- a/windows/security/identity-protection/hello-for-business/images/smartcard.svg +++ b/windows/security/identity-protection/hello-for-business/images/smartcard.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/identity-protection/passkeys/images/laptop.svg b/windows/security/identity-protection/passkeys/images/laptop.svg index 2440c97fd5..5b8d16655e 100644 --- a/windows/security/identity-protection/passkeys/images/laptop.svg +++ b/windows/security/identity-protection/passkeys/images/laptop.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/phone.svg b/windows/security/identity-protection/passkeys/images/phone.svg index acb1dce81f..d701cabb0d 100644 --- a/windows/security/identity-protection/passkeys/images/phone.svg +++ b/windows/security/identity-protection/passkeys/images/phone.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/qr-code.svg b/windows/security/identity-protection/passkeys/images/qr-code.svg index d84c521351..b52c264ab3 100644 --- a/windows/security/identity-protection/passkeys/images/qr-code.svg +++ b/windows/security/identity-protection/passkeys/images/qr-code.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/passkeys/images/usb.svg b/windows/security/identity-protection/passkeys/images/usb.svg index 18027400c1..ab1ccbc8d9 100644 --- a/windows/security/identity-protection/passkeys/images/usb.svg +++ b/windows/security/identity-protection/passkeys/images/usb.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/identity-protection/remote-credential-guard.md b/windows/security/identity-protection/remote-credential-guard.md index 4461530e2b..e07f9e5739 100644 --- a/windows/security/identity-protection/remote-credential-guard.md +++ b/windows/security/identity-protection/remote-credential-guard.md @@ -169,7 +169,7 @@ Alternatively, you can configure devices using a [custom policy][INT-3] with the | Setting | |--| -|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
- **Data type:** string
- **Value:** ``

Possible values for `RestrictedRemoteAdministrationDrop` are:
- `0`: Disabled
- `1`: Require Restricted Admin
- `2`: Require Remote Credential Guard
- `3`: Restrict credential delegation | +|- **OMA-URI:** `./Device/Vendor/MSFT/Policy/Config/ADMX_CredSsp/RestrictedRemoteAdministration`
- **Data type:** string
- **Value:** ``

Possible values for `RestrictedRemoteAdministrationDrop` are:
- `0`: Disabled
- `1`: Require Restricted Admin
- `2`: Require Remote Credential Guard
- `3`: Restrict credential delegation | #### [:::image type="icon" source="../images/icons/group-policy.svg" border="false"::: **GPO**](#tab/gpo) diff --git a/windows/security/images/icons/accessibility.svg b/windows/security/images/icons/accessibility.svg index 21a6b4f235..5cd9234699 100644 --- a/windows/security/images/icons/accessibility.svg +++ b/windows/security/images/icons/accessibility.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/activation.svg b/windows/security/images/icons/activation.svg deleted file mode 100644 index 0060e89a0b..0000000000 --- a/windows/security/images/icons/activation.svg +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/windows/security/images/icons/certificate.svg b/windows/security/images/icons/certificate.svg index 0060e89a0b..956bfc1e42 100644 --- a/windows/security/images/icons/certificate.svg +++ b/windows/security/images/icons/certificate.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/cmd.svg b/windows/security/images/icons/cmd.svg new file mode 100644 index 0000000000..e712a4fff5 --- /dev/null +++ b/windows/security/images/icons/cmd.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/security/images/icons/control-panel.svg b/windows/security/images/icons/control-panel.svg new file mode 100644 index 0000000000..6eebbe9be8 --- /dev/null +++ b/windows/security/images/icons/control-panel.svg @@ -0,0 +1,9 @@ + + + + + + + + + diff --git a/windows/security/images/icons/drive.svg b/windows/security/images/icons/drive.svg new file mode 100644 index 0000000000..0293932c8e --- /dev/null +++ b/windows/security/images/icons/drive.svg @@ -0,0 +1,75 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/face.svg b/windows/security/images/icons/face.svg new file mode 100644 index 0000000000..a4fa1ca0df --- /dev/null +++ b/windows/security/images/icons/face.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/feedback.svg b/windows/security/images/icons/feedback.svg index 2ecd143695..cd887f3a0f 100644 --- a/windows/security/images/icons/feedback.svg +++ b/windows/security/images/icons/feedback.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/fingerprint.svg b/windows/security/images/icons/fingerprint.svg new file mode 100644 index 0000000000..2494d65659 --- /dev/null +++ b/windows/security/images/icons/fingerprint.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/folder.svg b/windows/security/images/icons/folder.svg new file mode 100644 index 0000000000..468edaf961 --- /dev/null +++ b/windows/security/images/icons/folder.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/gear.svg b/windows/security/images/icons/gear.svg index caca268bea..36da6757f2 100644 --- a/windows/security/images/icons/gear.svg +++ b/windows/security/images/icons/gear.svg @@ -1,10 +1,3 @@ - - - - - - - - + diff --git a/windows/security/images/icons/group-policy.svg b/windows/security/images/icons/group-policy.svg index c9cb511415..e6ec2d2c2e 100644 --- a/windows/security/images/icons/group-policy.svg +++ b/windows/security/images/icons/group-policy.svg @@ -1,9 +1,14 @@ - - + + + + - + - + + + + diff --git a/windows/security/images/icons/information.svg b/windows/security/images/icons/information.svg index bc692eabb9..4a33944103 100644 --- a/windows/security/images/icons/information.svg +++ b/windows/security/images/icons/information.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/insider.svg b/windows/security/images/icons/insider.svg new file mode 100644 index 0000000000..fa002fa2a1 --- /dev/null +++ b/windows/security/images/icons/insider.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/intune.svg b/windows/security/images/icons/intune.svg index 6e0d938aed..22148b48fb 100644 --- a/windows/security/images/icons/intune.svg +++ b/windows/security/images/icons/intune.svg @@ -1,24 +1,23 @@ - - - - - - - - - - - - - - - - Icon-intune-329 - - - - - - - - \ No newline at end of file + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/iris.svg b/windows/security/images/icons/iris.svg new file mode 100644 index 0000000000..465902e0b3 --- /dev/null +++ b/windows/security/images/icons/iris.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/key.svg b/windows/security/images/icons/key.svg index c9df33c18f..62e4755d33 100644 --- a/windows/security/images/icons/key.svg +++ b/windows/security/images/icons/key.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/kiosk.svg b/windows/security/images/icons/kiosk.svg new file mode 100644 index 0000000000..f975677d19 --- /dev/null +++ b/windows/security/images/icons/kiosk.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/laptop.svg b/windows/security/images/icons/laptop.svg new file mode 100644 index 0000000000..5b8d16655e --- /dev/null +++ b/windows/security/images/icons/laptop.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/license.svg b/windows/security/images/icons/license.svg deleted file mode 100644 index 4be1c3b5f7..0000000000 --- a/windows/security/images/icons/license.svg +++ /dev/null @@ -1,3 +0,0 @@ - - - diff --git a/windows/security/images/icons/lock.svg b/windows/security/images/icons/lock.svg new file mode 100644 index 0000000000..ccd1850fbb --- /dev/null +++ b/windows/security/images/icons/lock.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/locked-drive.svg b/windows/security/images/icons/locked-drive.svg new file mode 100644 index 0000000000..59a6edbe09 --- /dev/null +++ b/windows/security/images/icons/locked-drive.svg @@ -0,0 +1,351 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/os-drive.svg b/windows/security/images/icons/os-drive.svg new file mode 100644 index 0000000000..504abbd5a9 --- /dev/null +++ b/windows/security/images/icons/os-drive.svg @@ -0,0 +1,129 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/phone.svg b/windows/security/images/icons/phone.svg new file mode 100644 index 0000000000..d701cabb0d --- /dev/null +++ b/windows/security/images/icons/phone.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/pin-code.svg b/windows/security/images/icons/pin-code.svg new file mode 100644 index 0000000000..a5bfdc4148 --- /dev/null +++ b/windows/security/images/icons/pin-code.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/pin.svg b/windows/security/images/icons/pin.svg new file mode 100644 index 0000000000..64426df32c --- /dev/null +++ b/windows/security/images/icons/pin.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/power.svg b/windows/security/images/icons/power.svg new file mode 100644 index 0000000000..e74606b72c --- /dev/null +++ b/windows/security/images/icons/power.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/powershell.svg b/windows/security/images/icons/powershell.svg index b23a99c61d..3d90e2ff6f 100644 --- a/windows/security/images/icons/powershell.svg +++ b/windows/security/images/icons/powershell.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/images/icons/provisioning-package.svg b/windows/security/images/icons/provisioning-package.svg index dbbad7d780..99c1148922 100644 --- a/windows/security/images/icons/provisioning-package.svg +++ b/windows/security/images/icons/provisioning-package.svg @@ -1,3 +1,3 @@ - - - \ No newline at end of file + + + diff --git a/windows/security/images/icons/qr-code.svg b/windows/security/images/icons/qr-code.svg new file mode 100644 index 0000000000..b52c264ab3 --- /dev/null +++ b/windows/security/images/icons/qr-code.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/registry.svg b/windows/security/images/icons/registry.svg index bc4aa2f534..667bce7438 100644 --- a/windows/security/images/icons/registry.svg +++ b/windows/security/images/icons/registry.svg @@ -1,9 +1,9 @@ - + - + - + diff --git a/windows/security/images/icons/rocket.svg b/windows/security/images/icons/rocket.svg new file mode 100644 index 0000000000..ee39fb57aa --- /dev/null +++ b/windows/security/images/icons/rocket.svg @@ -0,0 +1,155 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/sc.svg b/windows/security/images/icons/sc.svg new file mode 100644 index 0000000000..d1924ffebb --- /dev/null +++ b/windows/security/images/icons/sc.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/settings-app.svg b/windows/security/images/icons/settings-app.svg new file mode 100644 index 0000000000..d62d13fb54 --- /dev/null +++ b/windows/security/images/icons/settings-app.svg @@ -0,0 +1,24 @@ + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/settings.svg b/windows/security/images/icons/settings.svg index 9ec19d16aa..36da6757f2 100644 --- a/windows/security/images/icons/settings.svg +++ b/windows/security/images/icons/settings.svg @@ -1,19 +1,3 @@ - - - - - - - - - - - - - - - - - + diff --git a/windows/security/images/icons/start.svg b/windows/security/images/icons/start.svg new file mode 100644 index 0000000000..a3e6c3d8e8 --- /dev/null +++ b/windows/security/images/icons/start.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/subscription.svg b/windows/security/images/icons/subscription.svg index 4be1c3b5f7..ffa73c424e 100644 --- a/windows/security/images/icons/subscription.svg +++ b/windows/security/images/icons/subscription.svg @@ -1,3 +1,3 @@ - - + + diff --git a/windows/security/images/icons/unlocked-drive.svg b/windows/security/images/icons/unlocked-drive.svg new file mode 100644 index 0000000000..a8464ec134 --- /dev/null +++ b/windows/security/images/icons/unlocked-drive.svg @@ -0,0 +1,120 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/windows/security/images/icons/usb.svg b/windows/security/images/icons/usb.svg new file mode 100644 index 0000000000..ab1ccbc8d9 --- /dev/null +++ b/windows/security/images/icons/usb.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/user.svg b/windows/security/images/icons/user.svg new file mode 100644 index 0000000000..76c0b2ce5d --- /dev/null +++ b/windows/security/images/icons/user.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/images/icons/vsc.svg b/windows/security/images/icons/vsc.svg new file mode 100644 index 0000000000..cbf23de89e --- /dev/null +++ b/windows/security/images/icons/vsc.svg @@ -0,0 +1,3 @@ + + + diff --git a/windows/security/licensing-and-edition-requirements.md b/windows/security/licensing-and-edition-requirements.md index e2ef744996..5514543d97 100644 --- a/windows/security/licensing-and-edition-requirements.md +++ b/windows/security/licensing-and-edition-requirements.md @@ -19,7 +19,7 @@ Select one of the two tabs to learn about licensing requirements to use the secu [!INCLUDE [licensing-requirements](../../includes/licensing/_licensing-requirements.md)] -#### [:::image type="icon" source="images/icons/activation.svg" border="false"::: **Edition requirements**](#tab/edition) +#### [:::image type="icon" source="images/icons/subscription.svg" border="false"::: **Edition requirements**](#tab/edition) [!INCLUDE [_edition-requirements](../../includes/licensing/_edition-requirements.md)] diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg index 0cddf31701..e712a4fff5 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/cmd.svg @@ -1,9 +1,9 @@ - - - - - - - - + + + + + + + + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg index 3f526ed38d..6eebbe9be8 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/controlpanel.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg index fdd0ac46fd..0293932c8e 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/drive.svg @@ -1,35 +1,35 @@ - - + + - - - - - - - + + + + + + + - + - + - + - + @@ -37,38 +37,38 @@ - + - + - + - + - + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg index 9c1d764581..59a6edbe09 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/locked-drive.svg @@ -1,83 +1,83 @@ - - + + - - - - - - - + + + + + + + - + - + - + - + - + - + - + - + - + - - - - + + + + - - + + - - + + - + - - - - + + + + - - + + - - + + - + - - - + + + @@ -95,16 +95,16 @@ - + - + - - - + + + @@ -122,13 +122,13 @@ - + - - + + @@ -148,19 +148,19 @@ - + - + - + @@ -168,74 +168,74 @@ - + - + - + - + - + - + - + - + - + - + - + - + - + - + - + @@ -243,42 +243,42 @@ - + - + - + - + - + - + - + - + - + @@ -286,51 +286,51 @@ - + - + - + - + - + - + - + - + - + - + - + - + @@ -341,10 +341,10 @@ - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg index 4b4f7f766f..504abbd5a9 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/os-drive.svg @@ -1,57 +1,57 @@ - - + + - - - - - - - + + + + + + + - + - - + + - - + + - + - + - + - + - + - + - + - + - + - + - + - + @@ -59,19 +59,19 @@ - + - + - + @@ -79,50 +79,50 @@ - + - + - + - + - + - + - + - + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg index b23a99c61d..3d90e2ff6f 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/powershell.svg @@ -1,9 +1,9 @@ - - + + - + - + diff --git a/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg b/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg index 94f06bf78b..a8464ec134 100644 --- a/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg +++ b/windows/security/operating-system-security/data-protection/bitlocker/images/unlocked-drive.svg @@ -1,73 +1,71 @@ - - - + + - - - - - - - + + + + + + + - + - - + + - - + + - + - + - + - + - + - + - + - + - + - + - + - - + - + - + - + @@ -75,50 +73,47 @@ - + - + - + - + - + - + - + - + - - - - + diff --git a/windows/whats-new/deprecated-features.md b/windows/whats-new/deprecated-features.md index 2d05aca4c7..4b4df97331 100644 --- a/windows/whats-new/deprecated-features.md +++ b/windows/whats-new/deprecated-features.md @@ -1,7 +1,7 @@ --- title: Deprecated features in the Windows client description: Review the list of features that Microsoft is no longer actively developing in Windows 10 and Windows 11. -ms.date: 03/07/2024 +ms.date: 03/14/2024 ms.service: windows-client ms.subservice: itpro-fundamentals ms.localizationpriority: medium @@ -47,6 +47,7 @@ The features in this article are no longer being actively developed, and might b | Feature | Details and mitigation | Deprecation announced | |---|---|---| +| TLS server authentication certificates using RSA keys with key lengths shorter than 2048 bits | Support for certificates using RSA keys with key lengths shorter than 2048 bits will be deprecated. Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer. For more information, see [Transitioning of Cryptographic Algorithms and Key Sizes - Discussion Paper (nist.gov)](https://csrc.nist.gov/CSRC/media/Projects/Key-Management/documents/transitions/Transitioning_CryptoAlgos_070209.pdf). This deprecation focuses on ensuring that all RSA certificates used for TLS server authentication must have key lengths greater than or equal to 2048 bits to be considered valid by Windows.

TLS certificates issued by enterprise or test certification authorities (CA) aren't impacted with this change. However, we recommend that they be updated to RSA keys greater than or equal to 2048 bits as a security best practice. This change is necessary to preserve security of Windows customers using certificates for authentication and cryptographic purposes.| March 2024| | Test Base | [Test Base for Microsoft 365](/microsoft-365/test-base/overview), an Azure cloud service for application testing, is deprecated. The service will be retired in the future and will be no longer available for use after retirement. | March 2024 | | Windows Mixed Reality | [Windows Mixed Reality](/windows/mixed-reality/enthusiast-guide/before-you-start) is deprecated and will be removed in Windows 11, version 24H2. This deprecation includes the [Mixed Reality Portal](/windows/mixed-reality/enthusiast-guide/install-windows-mixed-reality) app, [Windows Mixed Reality for SteamVR](/windows/mixed-reality/enthusiast-guide/using-steamvr-with-windows-mixed-reality), and Steam VR Beta. Existing Windows Mixed Reality devices will continue to work with Steam through November 2026, if users remain on their current released version of Windows 11, version 23H2. After November 2026, Windows Mixed Reality will no longer receive security updates, nonsecurity updates, bug fixes, technical support, or online technical content updates.

This deprecation doesn't affect HoloLens. We remain committed to HoloLens and our enterprise customers. | December 2023 | | Microsoft Defender Application Guard for Edge | [Microsoft Defender Application Guard](/windows/security/application-security/application-isolation/microsoft-defender-application-guard/md-app-guard-overview), including the [Windows Isolated App Launcher APIs](/windows/win32/api/isolatedapplauncher/), is being deprecated for Microsoft Edge for Business and [will no longer be updated](feature-lifecycle.md). Please download the [Microsoft Edge For Business Security Whitepaper](https://edgestatic.azureedge.net/shared/cms/pdfs/Microsoft_Edge_Security_Whitepaper_v2.pdf) to learn more about Edge for Business security capabilities. | December 2023 | diff --git a/windows/whats-new/windows-11-plan.md b/windows/whats-new/windows-11-plan.md index fbb1d4e367..d8b9301431 100644 --- a/windows/whats-new/windows-11-plan.md +++ b/windows/whats-new/windows-11-plan.md @@ -99,15 +99,13 @@ It's important that organizations have adequate time to plan for Windows 11. Mic Microsoft's compatibility promise for Windows 10 is maintained for Windows 11. Data from the App Assure program shows that Windows 10 compatibility rates are over 99.7% for enterprise organizations, including line of business (LOB) apps. Microsoft remains committed to ensuring that the apps you rely upon continue to work as expected when you upgrade. Windows 11 is subject to the same app compatibility validation requirements that are in place for Windows 10 today, for both feature and quality updates. -#### App Assure and Test Base for Microsoft 365 +#### App Assure -If you run into compatibility issues or want to ensure that your organization's applications are compatible from day one, App Assure and Test Base for Microsoft 365 can help. +If you run into compatibility issues or want to ensure that your organization's applications are compatible from day one, App Assure can help. - **App Assure**: With enrollment in the [App Assure](/windows/compatibility/app-assure) service, any app compatibility issues that you find with Windows 11 can be resolved. Microsoft will help you remedy application issues at no cost. Since 2018, App Assure has evaluated almost 800,000 apps, and subscriptions are free for eligible customers with 150+ seats. -- **Test Base for Microsoft 365**: [Test Base](https://portal.azure.com/?feature.Win11=true%2F#view/Microsoft_Azure_Marketplace/GalleryItemDetailsBladeNopdl/id/Microsoft.TestBase) is a cloud testing platform that can help you evaluate applications readiness for Windows 11 upgrade or migration. IT administrators, software publishers, and system integrators can find desired test cases throughout the entire Windows validation lifecycle. Tests include, but aren't limited to, in-place upgrade validation, monthly quality updates, and tests against Windows preview features. - -You might already be using App Assure and Test Base in your Windows 10 environment. Both of these tools will continue to function with Windows 11. +You might already be using App Assure in your Windows 10 environment. The tool will continue to function with Windows 11. ## Next steps diff --git a/windows/whats-new/windows-11-requirements.md b/windows/whats-new/windows-11-requirements.md index d2de462f2e..62733bd8d1 100644 --- a/windows/whats-new/windows-11-requirements.md +++ b/windows/whats-new/windows-11-requirements.md @@ -11,7 +11,7 @@ ms.collection: - highpri - tier1 ms.subservice: itpro-fundamentals -ms.date: 02/13/2023 +ms.date: 03/13/2024 appliesto: - ✅ Windows 11 @@ -120,10 +120,8 @@ The following configuration requirements apply to VMs running Windows 11. ## Next steps +- [What's new in Windows 11](/windows/whats-new/windows-11-overview) - [Plan for Windows 11](windows-11-plan.md) - [Prepare for Windows 11](windows-11-prepare.md) - -## See also - - [Windows minimum hardware requirements](/windows-hardware/design/minimum/minimum-hardware-requirements-overview) -- [What's new in Windows 11 overview](/windows/whats-new/windows-11-overview) +